Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order_List.scr.exe

Overview

General Information

Sample name:Order_List.scr.exe
Analysis ID:1586804
MD5:78a62a23291a3c7907e947bc9f270e09
SHA1:a28a2db1cacca688a66a00ecd840aedeaef484d4
SHA256:3652dcdb4eaff1a11ff293eedb80363e024bda7a33f1e1c17b082dfd4cea5a86
Tags:exeuser-lowmal3
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Order_List.scr.exe (PID: 1548 cmdline: "C:\Users\user\Desktop\Order_List.scr.exe" MD5: 78A62A23291A3C7907E947BC9F270E09)
    • powershell.exe (PID: 5960 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1408 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 5944 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5696 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Order_List.scr.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\Order_List.scr.exe" MD5: 78A62A23291A3C7907E947BC9F270E09)
  • FTlLqTRGrXZr.exe (PID: 6320 cmdline: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe MD5: 78A62A23291A3C7907E947BC9F270E09)
    • schtasks.exe (PID: 7292 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • FTlLqTRGrXZr.exe (PID: 7344 cmdline: "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe" MD5: 78A62A23291A3C7907E947BC9F270E09)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7888110857:AAH_lE30nomQfyzYUPPXbGWeGI9ffBUijsQ/sendMessage?chat_id=7222025033", "Token": "7888110857:AAH_lE30nomQfyzYUPPXbGWeGI9ffBUijsQ", "Chat_id": "7222025033", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2209588956.0000000005D20000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x148c4:$a1: get_encryptedPassword
          • 0x14bb0:$a2: get_encryptedUsername
          • 0x146d0:$a3: get_timePasswordChanged
          • 0x147cb:$a4: get_passwordField
          • 0x148da:$a5: set_encryptedPassword
          • 0x15fe7:$a7: get_logins
          • 0x15f4a:$a10: KeyLoggerEventArgs
          • 0x15bb5:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Order_List.scr.exe.5d20000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.Order_List.scr.exe.5d20000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.Order_List.scr.exe.4349970.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Order_List.scr.exe.4349970.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                  0.2.Order_List.scr.exe.4349970.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x12cc4:$a1: get_encryptedPassword
                  • 0x12fb0:$a2: get_encryptedUsername
                  • 0x12ad0:$a3: get_timePasswordChanged
                  • 0x12bcb:$a4: get_passwordField
                  • 0x12cda:$a5: set_encryptedPassword
                  • 0x143e7:$a7: get_logins
                  • 0x1434a:$a10: KeyLoggerEventArgs
                  • 0x13fb5:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 23 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Order_List.scr.exe", ParentImage: C:\Users\user\Desktop\Order_List.scr.exe, ParentProcessId: 1548, ParentProcessName: Order_List.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", ProcessId: 5960, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Order_List.scr.exe", ParentImage: C:\Users\user\Desktop\Order_List.scr.exe, ParentProcessId: 1548, ParentProcessName: Order_List.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", ProcessId: 5960, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe, ParentImage: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe, ParentProcessId: 6320, ParentProcessName: FTlLqTRGrXZr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp", ProcessId: 7292, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Order_List.scr.exe", ParentImage: C:\Users\user\Desktop\Order_List.scr.exe, ParentProcessId: 1548, ParentProcessName: Order_List.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", ProcessId: 5696, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Order_List.scr.exe", ParentImage: C:\Users\user\Desktop\Order_List.scr.exe, ParentProcessId: 1548, ParentProcessName: Order_List.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe", ProcessId: 5960, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Order_List.scr.exe", ParentImage: C:\Users\user\Desktop\Order_List.scr.exe, ParentProcessId: 1548, ParentProcessName: Order_List.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp", ProcessId: 5696, ProcessName: schtasks.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-09T16:39:07.278025+010028033053Unknown Traffic192.168.2.649730104.21.64.1443TCP
                  2025-01-09T16:39:08.783110+010028033053Unknown Traffic192.168.2.649737104.21.64.1443TCP
                  2025-01-09T16:39:11.835557+010028033053Unknown Traffic192.168.2.649762104.21.64.1443TCP
                  2025-01-09T16:39:13.260564+010028033053Unknown Traffic192.168.2.649775104.21.64.1443TCP
                  2025-01-09T16:39:14.249800+010028033053Unknown Traffic192.168.2.649783104.21.64.1443TCP
                  2025-01-09T16:39:14.669333+010028033053Unknown Traffic192.168.2.649789104.21.64.1443TCP
                  2025-01-09T16:39:16.895405+010028033053Unknown Traffic192.168.2.649802104.21.64.1443TCP
                  2025-01-09T16:39:19.396707+010028033053Unknown Traffic192.168.2.649813104.21.64.1443TCP
                  2025-01-09T16:39:24.383897+010028033053Unknown Traffic192.168.2.649846104.21.64.1443TCP
                  2025-01-09T16:39:26.004692+010028033053Unknown Traffic192.168.2.649858104.21.64.1443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-09T16:39:05.437709+010028032742Potentially Bad Traffic192.168.2.649716132.226.8.16980TCP
                  2025-01-09T16:39:06.812648+010028032742Potentially Bad Traffic192.168.2.649716132.226.8.16980TCP
                  2025-01-09T16:39:08.140840+010028032742Potentially Bad Traffic192.168.2.649731132.226.8.16980TCP
                  2025-01-09T16:39:12.703288+010028032742Potentially Bad Traffic192.168.2.649768132.226.8.16980TCP
                  2025-01-09T16:39:13.640790+010028032742Potentially Bad Traffic192.168.2.649768132.226.8.16980TCP
                  2025-01-09T16:39:15.140772+010028032742Potentially Bad Traffic192.168.2.649790132.226.8.16980TCP
                  2025-01-09T16:39:18.436587+010028032742Potentially Bad Traffic192.168.2.649807132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7888110857:AAH_lE30nomQfyzYUPPXbGWeGI9ffBUijsQ/sendMessage?chat_id=7222025033", "Token": "7888110857:AAH_lE30nomQfyzYUPPXbGWeGI9ffBUijsQ", "Chat_id": "7222025033", "Version": "5.1"}
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeReversingLabs: Detection: 71%
                  Source: Order_List.scr.exeReversingLabs: Detection: 71%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeJoe Sandbox ML: detected
                  Source: Order_List.scr.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Order_List.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49719 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49776 version: TLS 1.0
                  Source: Order_List.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 014BF1F6h9_2_014BF007
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 014BFB80h9_2_014BF007
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_014BE528
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_014BEB5B
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_014BED3C
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8C041h9_2_05D8BD98
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D81011h9_2_05D80D60
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8F009h9_2_05D8ED60
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8B791h9_2_05D8B4E8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8E759h9_2_05D8E4B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D80751h9_2_05D804A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8DEA9h9_2_05D8DC00
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8DA51h9_2_05D8D7A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8D1A1h9_2_05D8CEF8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8C8F1h9_2_05D8C648
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8F8B9h9_2_05D8F610
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D81A38h9_2_05D81620
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D81471h9_2_05D811C0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8C499h9_2_05D8C1F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8F461h9_2_05D8F1B8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8BBE9h9_2_05D8B940
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D81A38h9_2_05D81966
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8EBB1h9_2_05D8E908
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D80BB1h9_2_05D80900
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8E301h9_2_05D8E058
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D802F1h9_2_05D80040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8D5F9h9_2_05D8D350
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8CD49h9_2_05D8CAA0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 05D8FD11h9_2_05D8FA68
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA8945h9_2_06EA8608
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA6171h9_2_06EA5EC8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA58C1h9_2_06EA5618
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA6A21h9_2_06EA6778
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA7751h9_2_06EA74A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA0741h9_2_06EA0498
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA0FF1h9_2_06EA0D48
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA8001h9_2_06EA7D58
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA5D19h9_2_06EA5A70
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA6E79h9_2_06EA6BD0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06EA33A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06EA33B8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA65C9h9_2_06EA6320
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA0B99h9_2_06EA08F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA02E9h9_2_06EA0040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA72FAh9_2_06EA7050
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA8459h9_2_06EA81B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA5441h9_2_06EA5198
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 4x nop then jmp 06EA7BA9h9_2_06EA7900
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 0106F1F6h14_2_0106F007
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_0106E528
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 0106FB80h14_2_0106F788
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05738D4Dh14_2_05738A10
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05730FF1h14_2_05730D48
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05737FB1h14_2_05737D08
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05738861h14_2_057385B8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05735849h14_2_057355A0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05737702h14_2_05737458
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05730741h14_2_05730498
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 057369D1h14_2_05736728
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05737281h14_2_05736FD8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_057337C0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_057337B0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05736121h14_2_05735E78
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05738409h14_2_05738160
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 057302E9h14_2_05730040
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05730B99h14_2_057308F0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05737B59h14_2_057378B0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05736E29h14_2_05736B80
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05735CC9h14_2_05735A20
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then jmp 05736579h14_2_057362D0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_05733AD6

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49731 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49790 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49768 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49716 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49807 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49762 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49730 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49737 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49789 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49858 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49813 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49775 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49846 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49802 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49783 -> 104.21.64.1:443
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49719 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49776 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000329B000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C8B000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: Order_List.scr.exe, 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: Order_List.scr.exe, FTlLqTRGrXZr.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: Order_List.scr.exe, FTlLqTRGrXZr.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                  Source: Order_List.scr.exe, FTlLqTRGrXZr.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: Order_List.scr.exe, 00000000.00000002.2206154442.000000000338D000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000B.00000002.2277645088.00000000023F8000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: Order_List.scr.exe, 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189H
                  Source: Order_List.scr.exe, FTlLqTRGrXZr.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800

                  System Summary

                  barindex
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: initial sampleStatic PE information: Filename: Order_List.scr.exe
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_01993E0C0_2_01993E0C
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_019970180_2_01997018
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_0586C5700_2_0586C570
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_0586F39E0_2_0586F39E
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_0586A8100_2_0586A810
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_0586A8200_2_0586A820
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_059100400_2_05910040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_05910DFB0_2_05910DFB
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_05910E080_2_05910E08
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014B61089_2_014B6108
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BC1909_2_014BC190
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BF0079_2_014BF007
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BB3289_2_014BB328
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BC4709_2_014BC470
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BC7549_2_014BC754
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014B67309_2_014B6730
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014B98589_2_014B9858
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BBBD39_2_014BBBD3
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BCA349_2_014BCA34
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014B4AD99_2_014B4AD9
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BBEB09_2_014BBEB0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014B35789_2_014B3578
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BE5179_2_014BE517
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_014BE5289_2_014BE528
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D87D909_2_05D87D90
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D884609_2_05D88460
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D838709_2_05D83870
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D873E89_2_05D873E8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8BD989_2_05D8BD98
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8BD889_2_05D8BD88
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8ED509_2_05D8ED50
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D80D519_2_05D80D51
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D80D609_2_05D80D60
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8ED609_2_05D8ED60
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8B4D79_2_05D8B4D7
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8B4E89_2_05D8B4E8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D804909_2_05D80490
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E4B09_2_05D8E4B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D804A09_2_05D804A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E4A09_2_05D8E4A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8DC009_2_05D8DC00
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8D7989_2_05D8D798
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8D7A89_2_05D8D7A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8CEF89_2_05D8CEF8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8CEE99_2_05D8CEE9
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8C6489_2_05D8C648
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8F6109_2_05D8F610
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8F6009_2_05D8F600
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8C6389_2_05D8C638
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D811C09_2_05D811C0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8C1F09_2_05D8C1F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8C1E09_2_05D8C1E0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8F1B89_2_05D8F1B8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D811B09_2_05D811B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8F1A99_2_05D8F1A9
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8B9409_2_05D8B940
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E9089_2_05D8E908
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D809009_2_05D80900
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8B9309_2_05D8B930
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E8F89_2_05D8E8F8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D808F09_2_05D808F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E0589_2_05D8E058
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8E0499_2_05D8E049
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D800409_2_05D80040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D838609_2_05D83860
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D800079_2_05D80007
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8DBF19_2_05D8DBF1
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8D3509_2_05D8D350
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8D3409_2_05D8D340
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8CA909_2_05D8CA90
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8CAA09_2_05D8CAA0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8FA599_2_05D8FA59
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D8FA689_2_05D8FA68
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAB6E89_2_06EAB6E8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAD6709_2_06EAD670
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA86089_2_06EA8608
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA8C579_2_06EA8C57
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAA4089_2_06EAA408
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EABD389_2_06EABD38
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAAA589_2_06EAAA58
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAC3889_2_06EAC388
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAB0A09_2_06EAB0A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAD0289_2_06EAD028
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAC9D89_2_06EAC9D8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA11A09_2_06EA11A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAB6E39_2_06EAB6E3
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA5EC89_2_06EA5EC8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA5EB89_2_06EA5EB8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAD66B9_2_06EAD66B
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA56099_2_06EA5609
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA56189_2_06EA5618
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA67789_2_06EA6778
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA37309_2_06EA3730
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA74A89_2_06EA74A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA04889_2_06EA0488
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA04989_2_06EA0498
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA74979_2_06EA7497
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA44309_2_06EA4430
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA85FB9_2_06EA85FB
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA0D489_2_06EA0D48
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA7D489_2_06EA7D48
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA7D589_2_06EA7D58
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA0D399_2_06EA0D39
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EABD379_2_06EABD37
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA5A609_2_06EA5A60
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA5A709_2_06EA5A70
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAAA4F9_2_06EAAA4F
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAA3F89_2_06EAA3F8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA6BC19_2_06EA6BC1
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA6BD09_2_06EA6BD0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA33A89_2_06EA33A8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA33B89_2_06EA33B8
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAC3879_2_06EAC387
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA63209_2_06EA6320
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA63119_2_06EA6311
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA08E09_2_06EA08E0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA08F09_2_06EA08F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA78F09_2_06EA78F0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA28B09_2_06EA28B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA00409_2_06EA0040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA70409_2_06EA7040
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA70509_2_06EA7050
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA00219_2_06EA0021
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAD0279_2_06EAD027
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA28079_2_06EA2807
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA28159_2_06EA2815
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EAC9D39_2_06EAC9D3
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA81A09_2_06EA81A0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA81B09_2_06EA81B0
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA518A9_2_06EA518A
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA51989_2_06EA5198
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA11919_2_06EA1191
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_06EA79009_2_06EA7900
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_00803E0C11_2_00803E0C
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0080701811_2_00807018
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_069124E811_2_069124E8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_06914A2011_2_06914A20
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691D6A811_2_0691D6A8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_069124D711_2_069124D7
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691D27011_2_0691D270
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_06911E0011_2_06911E00
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691CE3811_2_0691CE38
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_06911DF111_2_06911DF1
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691EDE011_2_0691EDE0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691E99811_2_0691E998
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0691E9A811_2_0691E9A8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106610814_2_01066108
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106C19014_2_0106C190
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106F00714_2_0106F007
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106B32814_2_0106B328
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106C47314_2_0106C473
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106673014_2_01066730
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106C75214_2_0106C752
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106985814_2_01069858
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106CA3214_2_0106CA32
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_01064AD914_2_01064AD9
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106BEB214_2_0106BEB2
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106E51714_2_0106E517
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106E52814_2_0106E528
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106357214_2_01063572
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0106B4F214_2_0106B4F2
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573BD4014_2_0573BD40
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573A41014_2_0573A410
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573D67814_2_0573D678
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573B6F014_2_0573B6F0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573C9E014_2_0573C9E0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573905914_2_05739059
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573D03014_2_0573D030
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573B0A814_2_0573B0A8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573C39014_2_0573C390
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573AA6014_2_0573AA60
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05738A1014_2_05738A10
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05730D4814_2_05730D48
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573BD3014_2_0573BD30
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05730D3914_2_05730D39
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05737D0814_2_05737D08
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057385B814_2_057385B8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057355A014_2_057355A0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057385A814_2_057385A8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573559314_2_05735593
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573745814_2_05737458
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573744814_2_05737448
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05732C1114_2_05732C11
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573A40014_2_0573A400
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05732C0F14_2_05732C0F
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05737CF814_2_05737CF8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05732CB814_2_05732CB8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573049814_2_05730498
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573048814_2_05730488
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573672814_2_05736728
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573671B14_2_0573671B
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05736FD814_2_05736FD8
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057337C014_2_057337C0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05736FC914_2_05736FC9
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057337B014_2_057337B0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05735E7814_2_05735E78
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573D66B14_2_0573D66B
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05735E6814_2_05735E68
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573B6E114_2_0573B6E1
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573816014_2_05738160
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573815014_2_05738150
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573C9D014_2_0573C9D0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057311A014_2_057311A0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573119114_2_05731191
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573004014_2_05730040
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573483814_2_05734838
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573D02014_2_0573D020
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573000714_2_05730007
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057308F014_2_057308F0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057308E014_2_057308E0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057378B014_2_057378B0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573B09714_2_0573B097
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573789F14_2_0573789F
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05736B7314_2_05736B73
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05733B3814_2_05733B38
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05736B8014_2_05736B80
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573C38014_2_0573C380
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_0573AA5714_2_0573AA57
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05735A2014_2_05735A20
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05735A1314_2_05735A13
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_05738A0414_2_05738A04
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057362D014_2_057362D0
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 14_2_057362C014_2_057362C0
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe 3652DCDB4EAFF1A11FF293EEDB80363E024BDA7A33F1E1C17B082DFD4CEA5A86
                  Source: Order_List.scr.exeStatic PE information: invalid certificate
                  Source: Order_List.scr.exe, 00000000.00000002.2207129697.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000002.2202146272.000000000144E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000000.2125682278.0000000000F42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDIXo.exe: vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000002.2210177325.0000000007900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000002.2206154442.000000000338D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000002.2209588956.0000000005D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000009.00000002.4604844263.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Order_List.scr.exe
                  Source: Order_List.scr.exe, 00000009.00000002.4604593123.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order_List.scr.exe
                  Source: Order_List.scr.exeBinary or memory string: OriginalFilenameDIXo.exe: vs Order_List.scr.exe
                  Source: Order_List.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Order_List.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: FTlLqTRGrXZr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@2/2
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3648:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2732:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5008:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMutant created: \Sessions\1\BaseNamedObjects\laoeILYAWbYsBdVIYEa
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7300:120:WilError_03
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5251.tmpJump to behavior
                  Source: Order_List.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Order_List.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Order_List.scr.exe, 00000009.00000002.4607797930.000000000342D000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000341D000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000343B000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4611428258.000000000426F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003463000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000346F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4610371320.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Order_List.scr.exeReversingLabs: Detection: 71%
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile read: C:\Users\user\Desktop\Order_List.scr.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Order_List.scr.exe "C:\Users\user\Desktop\Order_List.scr.exe"
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Users\user\Desktop\Order_List.scr.exe "C:\Users\user\Desktop\Order_List.scr.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Users\user\Desktop\Order_List.scr.exe "C:\Users\user\Desktop\Order_List.scr.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: schannel.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeSection loaded: dpapi.dll
                  Source: C:\Users\user\Desktop\Order_List.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeAutomated click: OK
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeAutomated click: OK
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Order_List.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Order_List.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 0_2_0199E5B4 push esp; retf 0_2_0199E5BD
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D82E78 push esp; iretd 9_2_05D82E79
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_0080E5B4 push esp; retf 11_2_0080E5BD
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeCode function: 11_2_06913A88 push esp; iretd 11_2_06913A89
                  Source: Order_List.scr.exeStatic PE information: section name: .text entropy: 7.446253940033166
                  Source: FTlLqTRGrXZr.exe.0.drStatic PE information: section name: .text entropy: 7.446253940033166
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 1950000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 3340000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 3150000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 82A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 92A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: C300000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 9450000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 14B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: 17C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 800000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 23B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 43B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 6920000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 7920000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: AE80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 7AB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 1060000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 2BD0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory allocated: 2900000 memory reserve | memory write watch
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599196Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598969Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598858Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598750Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598460Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598125Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598012Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597797Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597688Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597563Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597453Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597219Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597109Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596999Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596891Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596781Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596672Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596563Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596438Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596328Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596217Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596109Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595891Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595766Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595654Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595533Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595187Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595074Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594969Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594859Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594750Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594641Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594531Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594422Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594313Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594203Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599875
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599766
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599656
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599546
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599438
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599313
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599188
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599078
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598969
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598734
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598625
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598514
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598397
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598281
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598172
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598058
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597953
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597625
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597516
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597391
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597266
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597156
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597047
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596938
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596813
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596688
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596578
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596469
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596328
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596219
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596110
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595985
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595860
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595610
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595485
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595360
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595235
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595110
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594985
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594610
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594485
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594360
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594235
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7096Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 652Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7007Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 580Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeWindow / User API: threadDelayed 2021Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeWindow / User API: threadDelayed 7819Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeWindow / User API: threadDelayed 2273
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeWindow / User API: threadDelayed 7565
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 1280Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5532Thread sleep count: 7096 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7052Thread sleep count: 652 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6568Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1088Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5704Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7212Thread sleep count: 2021 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7212Thread sleep count: 7819 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599196s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -599094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598858s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598460s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598234s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598125s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -598012s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597797s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597688s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597344s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -597109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596999s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596217s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -596000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595654s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595533s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595406s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595297s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595187s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -595074s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exe TID: 7204Thread sleep time: -594203s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7196Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep count: 33 > 30
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -30437127721620741s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -600000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7432Thread sleep count: 2273 > 30
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599875s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7432Thread sleep count: 7565 > 30
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599766s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599656s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599546s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599438s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599313s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599188s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -599078s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598969s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598844s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598734s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598625s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598514s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598397s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598281s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598172s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -598058s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597953s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597844s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597735s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597625s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597516s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597391s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597266s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597156s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -597047s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596938s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596813s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596688s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596578s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596469s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596328s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596219s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -596110s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595985s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595860s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595735s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595610s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595485s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595360s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595235s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -595110s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594985s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594844s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594735s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594610s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594485s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594360s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe TID: 7428Thread sleep time: -594235s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599196Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598969Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598858Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598750Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598460Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598125Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 598012Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597797Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597688Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597563Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597453Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597219Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 597109Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596999Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596891Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596781Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596672Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596563Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596438Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596328Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596217Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596109Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595891Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595766Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595654Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595533Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595187Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 595074Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594969Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594859Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594750Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594641Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594531Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594422Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594313Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeThread delayed: delay time: 594203Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599875
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599766
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599656
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599546
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599438
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599313
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599188
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 599078
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598969
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598734
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598625
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598514
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598397
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598281
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598172
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 598058
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597953
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597625
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597516
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597391
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597266
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597156
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 597047
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596938
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596813
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596688
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596578
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596469
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596328
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596219
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 596110
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595985
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595860
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595610
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595485
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595360
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595235
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 595110
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594985
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594844
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594735
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594610
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594485
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594360
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeThread delayed: delay time: 594235
                  Source: Order_List.scr.exe, 00000009.00000002.4605952668.00000000015F6000.00000004.00000020.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4605651622.0000000000D78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeCode function: 9_2_05D87D90 LdrInitializeThunk,9_2_05D87D90
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeMemory written: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeProcess created: C:\Users\user\Desktop\Order_List.scr.exe "C:\Users\user\Desktop\Order_List.scr.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeProcess created: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Users\user\Desktop\Order_List.scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Users\user\Desktop\Order_List.scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Order_List.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.5d20000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.5d20000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2209588956.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4607797930.00000000033AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FTlLqTRGrXZr.exe PID: 7344, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Users\user\Desktop\Order_List.scr.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\Order_List.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                  Source: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FTlLqTRGrXZr.exe PID: 7344, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.5d20000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.5d20000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2209588956.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.436a390.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Order_List.scr.exe.4349970.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4607797930.00000000033AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 1548, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Order_List.scr.exe PID: 5900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FTlLqTRGrXZr.exe PID: 7344, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  1
                  Query Registry
                  Remote Services1
                  Email Collection
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  Scheduled Task/Job
                  11
                  Disable or Modify Tools
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  31
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS31
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput Capture13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                  Obfuscated Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Software Packing
                  Cached Domain Credentials1
                  System Network Configuration Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSync1
                  File and Directory Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem13
                  System Information Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586804 Sample: Order_List.scr.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 50 reallyfreegeoip.org 2->50 52 checkip.dyndns.org 2->52 54 checkip.dyndns.com 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Sigma detected: Scheduled temp file as task from temp location 2->60 64 9 other signatures 2->64 8 Order_List.scr.exe 7 2->8         started        12 FTlLqTRGrXZr.exe 5 2->12         started        signatures3 62 Tries to detect the country of the analysis system (by using the IP) 50->62 process4 file5 38 C:\Users\user\AppData\...\FTlLqTRGrXZr.exe, PE32 8->38 dropped 40 C:\Users\...\FTlLqTRGrXZr.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp5251.tmp, XML 8->42 dropped 44 C:\Users\user\...\Order_List.scr.exe.log, ASCII 8->44 dropped 66 Uses schtasks.exe or at.exe to add and modify task schedules 8->66 68 Adds a directory exclusion to Windows Defender 8->68 14 powershell.exe 23 8->14         started        17 Order_List.scr.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        70 Multi AV Scanner detection for dropped file 12->70 72 Machine Learning detection for dropped file 12->72 74 Injects a PE file into a foreign processes 12->74 24 FTlLqTRGrXZr.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 76 Loading BitLocker PowerShell Module 14->76 28 WmiPrvSE.exe 14->28         started        30 conhost.exe 14->30         started        46 checkip.dyndns.com 132.226.8.169, 49716, 49731, 49743 UTMEMUS United States 17->46 48 reallyfreegeoip.org 104.21.64.1, 443, 49719, 49730 CLOUDFLARENETUS United States 17->48 32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        78 Tries to steal Mail credentials (via file / registry access) 24->78 80 Tries to harvest and steal browser information (history, passwords, etc) 24->80 36 conhost.exe 26->36         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Order_List.scr.exe71%ReversingLabsWin32.Trojan.Znyonm
                  Order_List.scr.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe71%ReversingLabsWin32.Trojan.Znyonm
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.64.1
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.orgOrder_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189HOrder_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.orgOrder_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000329B000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C8B000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.comOrder_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder_List.scr.exe, 00000000.00000002.2206154442.000000000338D000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000B.00000002.2277645088.00000000023F8000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0Order_List.scr.exe, FTlLqTRGrXZr.exe.0.drfalse
                                        high
                                        http://checkip.dyndns.org/qOrder_List.scr.exe, 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                          high
                                          https://reallyfreegeoip.org/xml/8.46.123.189$Order_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032EA000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgOrder_List.scr.exe, 00000009.00000002.4607797930.0000000003363000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003347000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003390000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000339F000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.000000000333A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D2A000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D45000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D37000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D53000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002D80000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org/xml/Order_List.scr.exe, 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Order_List.scr.exe, 00000009.00000002.4607797930.00000000032A7000.00000004.00000800.00020000.00000000.sdmp, FTlLqTRGrXZr.exe, 0000000E.00000002.4607215864.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                132.226.8.169
                                                checkip.dyndns.comUnited States
                                                16989UTMEMUSfalse
                                                104.21.64.1
                                                reallyfreegeoip.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                Joe Sandbox version:42.0.0 Malachite
                                                Analysis ID:1586804
                                                Start date and time:2025-01-09 16:38:06 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 9m 11s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:17
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:Order_List.scr.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@19/15@2/2
                                                EGA Information:
                                                • Successful, ratio: 75%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 256
                                                • Number of non-executed functions: 50
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 184.28.90.27, 13.107.246.45, 20.12.23.50, 20.109.210.53
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target FTlLqTRGrXZr.exe, PID 7344 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtCreateKey calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • VT rate limit hit for: Order_List.scr.exe
                                                TimeTypeDescription
                                                10:38:57API Interceptor8884498x Sleep call for process: Order_List.scr.exe modified
                                                10:39:03API Interceptor30x Sleep call for process: powershell.exe modified
                                                10:39:06API Interceptor6339002x Sleep call for process: FTlLqTRGrXZr.exe modified
                                                16:39:05Task SchedulerRun new task: FTlLqTRGrXZr path: C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                132.226.8.169fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • checkip.dyndns.org/
                                                pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                • checkip.dyndns.org/
                                                PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • checkip.dyndns.org/
                                                104.21.64.1QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                • www.mzkd6gp5.top/3u0p/
                                                Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                                • ordrr.statementquo.com/QCbxA/
                                                SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                • adsfirm.com/administrator/index.php
                                                PO2412010.exeGet hashmaliciousFormBookBrowse
                                                • www.bser101pp.buzz/v89f/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                reallyfreegeoip.orgNuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.16.1
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.96.1
                                                Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.80.1
                                                Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.96.1
                                                December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                • 104.21.48.1
                                                JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.112.1
                                                PO.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.112.1
                                                BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                checkip.dyndns.comNuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 193.122.130.0
                                                fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.8.169
                                                Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.247.73
                                                Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 193.122.6.168
                                                December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                • 193.122.6.168
                                                JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                PO.exeGet hashmaliciousMassLogger RATBrowse
                                                • 193.122.6.168
                                                BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                UTMEMUSfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.8.169
                                                Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.247.73
                                                JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 132.226.8.169
                                                oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.247.73
                                                fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                miori.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 132.224.247.83
                                                CLOUDFLARENETUSNuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.16.1
                                                Benefit_401k_2025_Enrollment.pdfGet hashmaliciousUnknownBrowse
                                                • 172.64.155.59
                                                https://ccml.io/Get hashmaliciousUnknownBrowse
                                                • 104.17.24.14
                                                http://readermodeext.infoGet hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                https://bryf.atchirlisc.ru/EeMAGvIe/Get hashmaliciousHTMLPhisherBrowse
                                                • 172.64.41.3
                                                http://readermodeext.infoGet hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.96.1
                                                Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.80.1
                                                Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.96.1
                                                24EPV9vjc5.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.174.91
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                54328bd36c14bd82ddaa0c04b25ed9adNuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.64.1
                                                CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.64.1
                                                Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.64.1
                                                Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.64.1
                                                December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                • 104.21.64.1
                                                JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.64.1
                                                PO.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.64.1
                                                BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.64.1
                                                pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.64.1
                                                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 104.21.64.1
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exeNew order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                  Process:C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  Process:C:\Users\user\Desktop\Order_List.scr.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                  Malicious:true
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2232
                                                  Entropy (8bit):5.380134126512796
                                                  Encrypted:false
                                                  SSDEEP:48:+WSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeoPUyus:+LHxvIIwLgZ2KRHWLOugYs
                                                  MD5:9E8278CA2A1E910E91C9CADDD5751BE5
                                                  SHA1:C07C44FB0217420F4D23DF44FAC0FB95CFB38B0D
                                                  SHA-256:92B7A368F86D7BF972194EC5475B027C101B81DE2AB3A554E070F92D22DB39FD
                                                  SHA-512:1646CC72DD2879D59CC08909C31738B8742888CA198C0A1F315C12608B2C3FB147485C03642DA86F91C630817563182DEA5038F585545B78DF82F230693D36C8
                                                  Malicious:false
                                                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Users\user\Desktop\Order_List.scr.exe
                                                  File Type:XML 1.0 document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1599
                                                  Entropy (8bit):5.104546477340978
                                                  Encrypted:false
                                                  SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLUVLxv:cge7QYrFdOFzOzN33ODOiDdKrsuTy1v
                                                  MD5:65E0B83BF406D606441352BD16A5A64E
                                                  SHA1:46B6D456552767C9309DF9024F654B3E3C1266D8
                                                  SHA-256:B170C4DE145504A92A3448967D18B2BD6EE79B33261B537F1515D2D3264DB627
                                                  SHA-512:0D4C73222648347750EE3B6C9D457383DB9442C5515F48651ACBC09A6D7EF1D3CB1DE38CABE86FB13CFE17A0782302CC64D38903C762D3AE2CE1DDCD491F957D
                                                  Malicious:true
                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                  Process:C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  File Type:XML 1.0 document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1599
                                                  Entropy (8bit):5.104546477340978
                                                  Encrypted:false
                                                  SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLUVLxv:cge7QYrFdOFzOzN33ODOiDdKrsuTy1v
                                                  MD5:65E0B83BF406D606441352BD16A5A64E
                                                  SHA1:46B6D456552767C9309DF9024F654B3E3C1266D8
                                                  SHA-256:B170C4DE145504A92A3448967D18B2BD6EE79B33261B537F1515D2D3264DB627
                                                  SHA-512:0D4C73222648347750EE3B6C9D457383DB9442C5515F48651ACBC09A6D7EF1D3CB1DE38CABE86FB13CFE17A0782302CC64D38903C762D3AE2CE1DDCD491F957D
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                  Process:C:\Users\user\Desktop\Order_List.scr.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):706056
                                                  Entropy (8bit):7.444668333539724
                                                  Encrypted:false
                                                  SSDEEP:12288:xTWMWYMV+I4MVKWsXW+KiXe39JZArWHEkznuJVGZdkR:d/GRgjXWLYrvWA
                                                  MD5:78A62A23291A3C7907E947BC9F270E09
                                                  SHA1:A28A2DB1CACCA688A66A00ECD840AEDEAEF484D4
                                                  SHA-256:3652DCDB4EAFF1A11FF293EEDB80363E024BDA7A33F1E1C17B082DFD4CEA5A86
                                                  SHA-512:F690A98DDE16B8D5DB12ACC15B5BCF56B8F869773CAF080C16C5ED74A7A182252CFCCDFD3E1068D7761917E5F58DE6B03FBC452FDCFCEA2FE0D15BD3CB300FCA
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                  Joe Sandbox View:
                                                  • Filename: New order 2025.msg, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....|g..............0..r.............. ........@.. ....................................`.....................................O.......l................6........................................................... ............... ..H............text....p... ...r.................. ..`.rsrc...l............t..............@..@.reloc..............................@..B........................H.......PB...7......4....y...............................................0............}.....r...p(....}.....r...p(....}.....s....}......}......}.....(.......( .....{.....r7..pr9..p~5...%-.&~4.....R...s....%.5...(...+(...+~6...%-.&~4.....S...s....%.6...(...+...G...%..(...+s.....%.rK..p.%.rY..p...H...(....rs..p ............%...%...(.....*...0..(..........}.....{....o.....s ...... ....(!...&*F...}......(.....*...0..............{.....X..}.....s*...}......{....o"....o#...t.......(
                                                  Process:C:\Users\user\Desktop\Order_List.scr.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.444668333539724
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:Order_List.scr.exe
                                                  File size:706'056 bytes
                                                  MD5:78a62a23291a3c7907e947bc9f270e09
                                                  SHA1:a28a2db1cacca688a66a00ecd840aedeaef484d4
                                                  SHA256:3652dcdb4eaff1a11ff293eedb80363e024bda7a33f1e1c17b082dfd4cea5a86
                                                  SHA512:f690a98dde16b8d5db12acc15b5bcf56b8f869773caf080c16c5ed74a7a182252cfccdfd3e1068d7761917e5f58de6b03fbc452fdcfcea2fe0d15bd3cb300fca
                                                  SSDEEP:12288:xTWMWYMV+I4MVKWsXW+KiXe39JZArWHEkznuJVGZdkR:d/GRgjXWLYrvWA
                                                  TLSH:08E48C5A0356E4C1D0D606BC24E3FBB782544D489A21C6C247ECFEA73AA3A5D790F1DB
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....|g..............0..r............... ........@.. ....................................`................................
                                                  Icon Hash:13294d96922b2b0f
                                                  Entrypoint:0x4a90da
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x677CCDCC [Tue Jan 7 06:46:36 2025 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Signature Valid:false
                                                  Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                  Signature Validation Error:The digital signature of the object did not verify
                                                  Error Number:-2146869232
                                                  Not Before, Not After
                                                  • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                                  Subject Chain
                                                  • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                  Version:3
                                                  Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                  Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                  Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                  Serial:7C1118CBBADC95DA3752C46E47A27438
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa90880x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x196c.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xa90000x3608
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xa70e00xa7200597c0a44777c7d6571bb78cac904f11eFalse0.7947027510284218data7.446253940033166IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xaa0000x196c0x1a002e8f7e86b31d4636742e8272abc18f8dFalse0.6536959134615384data6.005585155554715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xac0000xc0x200bb315e5ebdd80561b3fc0870db6d3134False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xaa0e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.8129432624113475
                                                  RT_ICON0xaa5600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.7136491557223265
                                                  RT_GROUP_ICON0xab6180x22data0.9411764705882353
                                                  RT_VERSION0xab64c0x31cdata0.43090452261306533
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2025-01-09T16:39:05.437709+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649716132.226.8.16980TCP
                                                  2025-01-09T16:39:06.812648+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649716132.226.8.16980TCP
                                                  2025-01-09T16:39:07.278025+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649730104.21.64.1443TCP
                                                  2025-01-09T16:39:08.140840+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649731132.226.8.16980TCP
                                                  2025-01-09T16:39:08.783110+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649737104.21.64.1443TCP
                                                  2025-01-09T16:39:11.835557+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649762104.21.64.1443TCP
                                                  2025-01-09T16:39:12.703288+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649768132.226.8.16980TCP
                                                  2025-01-09T16:39:13.260564+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649775104.21.64.1443TCP
                                                  2025-01-09T16:39:13.640790+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649768132.226.8.16980TCP
                                                  2025-01-09T16:39:14.249800+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649783104.21.64.1443TCP
                                                  2025-01-09T16:39:14.669333+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649789104.21.64.1443TCP
                                                  2025-01-09T16:39:15.140772+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649790132.226.8.16980TCP
                                                  2025-01-09T16:39:16.895405+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649802104.21.64.1443TCP
                                                  2025-01-09T16:39:18.436587+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649807132.226.8.16980TCP
                                                  2025-01-09T16:39:19.396707+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649813104.21.64.1443TCP
                                                  2025-01-09T16:39:24.383897+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649846104.21.64.1443TCP
                                                  2025-01-09T16:39:26.004692+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649858104.21.64.1443TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 9, 2025 16:39:04.324104071 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:04.328928947 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:04.329075098 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:04.329226017 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:04.333997011 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:05.108402014 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:05.133994102 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:05.138799906 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:05.389518976 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:05.437709093 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:05.542476892 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:05.542516947 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:05.543154001 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:05.609174013 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:05.609190941 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.071629047 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.071732998 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.074285030 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.074292898 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.074600935 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.125144005 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.234447956 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.279334068 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.369990110 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.370055914 CET44349719104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.370126963 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.377459049 CET49719443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.386919975 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:06.391777039 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:06.665838957 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:06.668648005 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.668692112 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.669029951 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.669223070 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:06.669241905 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:06.812648058 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.126661062 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:07.129075050 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:07.129112959 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:07.278040886 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:07.278098106 CET44349730104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:07.278146029 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:07.278614998 CET49730443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:07.281910896 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.282876015 CET4973180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.286932945 CET8049716132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:07.287039042 CET4971680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.287635088 CET8049731132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:07.287714005 CET4973180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.287803888 CET4973180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:07.292522907 CET8049731132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:08.079632044 CET8049731132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:08.083367109 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.083429098 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.086477041 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.140840054 CET4973180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:08.150475025 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.150527000 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.632577896 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.634105921 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.634131908 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.783109903 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.783181906 CET44349737104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:08.783387899 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.783724070 CET49737443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:08.788094044 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:08.792881012 CET8049743132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:08.792989969 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:08.793040991 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:08.797800064 CET8049743132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:09.596795082 CET8049743132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:09.599965096 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:09.600004911 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:09.600063086 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:09.600912094 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:09.600923061 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:09.703288078 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.065862894 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:10.067547083 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:10.067579985 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:10.219182968 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:10.219252110 CET44349750104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:10.219516039 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:10.219873905 CET49750443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:10.223412991 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.224540949 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.228359938 CET8049743132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:10.228420019 CET4974380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.229382992 CET8049756132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:10.229449034 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.229569912 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:10.234352112 CET8049756132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.059631109 CET8049756132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.061378956 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.061408043 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.061467886 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.061830044 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.061845064 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.109575033 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.532299995 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.533792019 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.533828020 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.587076902 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.593621969 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.593719959 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.594033003 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.598860025 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.835576057 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.835648060 CET44349762104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:11.835942030 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.836359978 CET49762443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:11.839764118 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.840990067 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.844842911 CET8049756132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.844899893 CET4975680192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.845765114 CET8049769132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:11.845827103 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.845901966 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:11.850600958 CET8049769132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:12.387860060 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:12.391467094 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:12.396248102 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:12.648720980 CET8049769132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:12.649838924 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.649868965 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:12.649955988 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.650248051 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.650255919 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:12.656164885 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:12.694304943 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.694344997 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:12.694516897 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.699152946 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:12.699166059 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:12.703284979 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:12.703288078 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.107171059 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.117660999 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.117706060 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.157325983 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.157464027 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.159363985 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.159377098 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.161251068 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.203260899 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.216144085 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.259322882 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.260585070 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.260656118 CET44349775104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.260703087 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.261181116 CET49775443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.264672041 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.266037941 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.269696951 CET8049769132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:13.269745111 CET4976980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.271037102 CET8049782132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:13.271095991 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.271212101 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.276006937 CET8049782132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:13.323295116 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.323378086 CET44349776104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.323420048 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.326333046 CET49776443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.330225945 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:13.335095882 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:13.592492104 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:13.595391989 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.595428944 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.595503092 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.595799923 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:13.595813990 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:13.640789986 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.059542894 CET8049782132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.060812950 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.060861111 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.060940027 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.061180115 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.061197996 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.081252098 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.083153009 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.083180904 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.109540939 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.249891043 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.250049114 CET44349783104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.250257015 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.250896931 CET49783443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.255951881 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.257328987 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.261039019 CET8049768132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.261194944 CET4976880192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.262121916 CET8049790132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.262228966 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.262495041 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.267257929 CET8049790132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.541240931 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.545521975 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.545561075 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.669361115 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.669431925 CET44349789104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:14.669930935 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.670017004 CET49789443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:14.673306942 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.674938917 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.678333044 CET8049782132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.678527117 CET4978280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.679702044 CET8049793132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:14.679892063 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.680147886 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:14.684895992 CET8049793132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:15.092946053 CET8049790132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:15.094263077 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.094294071 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:15.097728014 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.097728014 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.097764015 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:15.140772104 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:15.490457058 CET8049793132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:15.491763115 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.491796970 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:15.491862059 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.492202044 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.492213964 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:15.531656027 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:15.928788900 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:15.930434942 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:15.930474997 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.535389900 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.535455942 CET44349800104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.535554886 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:16.535907984 CET49800443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:16.539194107 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:16.540590048 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:16.544125080 CET8049790132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:16.544193983 CET4979080192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:16.545437098 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:16.545569897 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:16.545597076 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:16.550421000 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:16.711138010 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.712647915 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:16.712676048 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.895342112 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.895411968 CET44349802104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:16.895661116 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:16.895961046 CET49802443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:18.435931921 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:18.436458111 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:18.436587095 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:18.436901093 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:18.436935902 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:18.437201023 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:18.437241077 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:18.437866926 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:18.437912941 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:18.437974930 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:18.438278913 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:18.438288927 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:19.207645893 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:19.217411041 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:19.217500925 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:19.396800995 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:19.396970034 CET44349813104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:19.397116899 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:19.397455931 CET49813443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:19.402008057 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:19.406867981 CET8049819132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:19.407155037 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:19.407155037 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:19.411976099 CET8049819132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:20.213387012 CET8049819132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:20.214936018 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.214981079 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.215334892 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.215605021 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.215620041 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.265898943 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.795824051 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.798589945 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.798629999 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.938739061 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.938900948 CET44349825104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:20.939028978 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.939760923 CET49825443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:20.944289923 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.945450068 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.949246883 CET8049819132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:20.949318886 CET4981980192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.950309038 CET8049831132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:20.950376987 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.950530052 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:20.956126928 CET8049831132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:21.863544941 CET8049831132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:21.865107059 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:21.865144014 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:21.865269899 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:21.865508080 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:21.865516901 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:21.906436920 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.396214008 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:22.398134947 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:22.398178101 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:22.542514086 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:22.542586088 CET44349838104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:22.542665005 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:22.543147087 CET49838443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:22.546363115 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.551305056 CET8049831132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:22.551321983 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.551366091 CET4983180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.556174040 CET8049842132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:22.556371927 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.556435108 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:22.564443111 CET8049842132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:23.787107944 CET8049842132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:23.788438082 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:23.788491964 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:23.789906979 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:23.790226936 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:23.790241003 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:23.828536987 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.246759892 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:24.248522997 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:24.248609066 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:24.383991957 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:24.384164095 CET44349846104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:24.384241104 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:24.384639978 CET49846443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:24.388025999 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.389089108 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.392976046 CET8049842132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:24.393259048 CET4984280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.393865108 CET8049852132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:24.393953085 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.394098997 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:24.398960114 CET8049852132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:25.188147068 CET8049852132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:39:25.190484047 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:25.190526962 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:25.190963984 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:25.190963984 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:25.191001892 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:25.234576941 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:39:25.672802925 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:25.674365044 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:25.674382925 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:26.004766941 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:26.004911900 CET44349858104.21.64.1192.168.2.6
                                                  Jan 9, 2025 16:39:26.004992962 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:39:26.016736031 CET49858443192.168.2.6104.21.64.1
                                                  Jan 9, 2025 16:40:13.080948114 CET8049731132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:40:13.081007004 CET4973180192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:20.450439930 CET8049793132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:40:20.450490952 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:22.439243078 CET8049807132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:40:22.439320087 CET4980780192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:30.345988035 CET8049852132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:40:30.349658012 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:30.551332951 CET8049852132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:40:30.552952051 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:55.500807047 CET4979380192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:40:55.506128073 CET8049793132.226.8.169192.168.2.6
                                                  Jan 9, 2025 16:41:05.203572035 CET4985280192.168.2.6132.226.8.169
                                                  Jan 9, 2025 16:41:05.208532095 CET8049852132.226.8.169192.168.2.6
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 9, 2025 16:39:04.309930086 CET5144353192.168.2.61.1.1.1
                                                  Jan 9, 2025 16:39:04.318228960 CET53514431.1.1.1192.168.2.6
                                                  Jan 9, 2025 16:39:05.473973989 CET5658653192.168.2.61.1.1.1
                                                  Jan 9, 2025 16:39:05.481153011 CET53565861.1.1.1192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 9, 2025 16:39:04.309930086 CET192.168.2.61.1.1.10x154bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.473973989 CET192.168.2.61.1.1.10x9d76Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:04.318228960 CET1.1.1.1192.168.2.60x154bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                  Jan 9, 2025 16:39:05.481153011 CET1.1.1.1192.168.2.60x9d76No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                  • reallyfreegeoip.org
                                                  • checkip.dyndns.org
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649716132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:04.329226017 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:05.108402014 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:04 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:05.133994102 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:05.389518976 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:05 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:06.386919975 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:06.665838957 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:06 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.649731132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:07.287803888 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:08.079632044 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:07 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.649743132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:08.793040991 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:09.596795082 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:09 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.649756132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:10.229569912 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:11.059631109 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:10 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.649768132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:11.594033003 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:12.387860060 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:12 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:12.391467094 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:12.656164885 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:12 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:13.330225945 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:13.592492104 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:13 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.649769132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:11.845901966 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:12.648720980 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:12 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.649782132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:13.271212101 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:14.059542894 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:13 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.649790132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:14.262495041 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:15.092946053 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:14 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.649793132.226.8.169805900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:14.680147886 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:15.490457058 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:15 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.649807132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:16.545597076 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 9, 2025 16:39:18.435931921 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:17 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:18.436458111 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:17 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:18.436901093 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:17 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                  Jan 9, 2025 16:39:18.437201023 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:17 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.649819132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:19.407155037 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:20.213387012 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:20 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.649831132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:20.950530052 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:21.863544941 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:21 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.649842132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:22.556435108 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:23.787107944 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:23 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.649852132.226.8.169807344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 9, 2025 16:39:24.394098997 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 9, 2025 16:39:25.188147068 CET273INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:25 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 104
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649719104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:06 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:06 UTC859INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:06 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751935
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7Ul6cLm4xigoX5ObmCfBOu%2FlOgdB0vQss9RgyD2NTQT8UVMfuSowspW%2Bph%2F%2B95SwNfQrLwr6xyd4P3EN%2BM5N8YY826FJXuhwFbgNQa71E4OYFQITw6T93jYj1EH99ziVtE2E8jEA"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584a469867c6a-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2029&min_rtt=2026&rtt_var=767&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1419543&cwnd=218&unsent_bytes=0&cid=f436573e2faf3ffb&ts=309&x=0"
                                                  2025-01-09 15:39:06 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.649730104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:07 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:07 UTC859INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:07 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751936
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DFm%2F6s6tKAz%2BfqVDsZMlI%2FGNkOEgenT83fCafJ5yHVFch%2B6r3qpCiLO3y8tZbdsQLnqJwMAaVvkCRaVu517y2dJJiUw%2BBEaTYxcUdJvMvRy5tvC1ZTOd3QQMFDAyuLGktm3BTu9t"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584aa18b18ca1-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1940&min_rtt=1937&rtt_var=733&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1486005&cwnd=168&unsent_bytes=0&cid=bf79d8a5c51c403a&ts=158&x=0"
                                                  2025-01-09 15:39:07 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.649737104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:08 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:08 UTC855INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:08 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751937
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BefR0tVer40s6%2B3EAjyKh8pVKHTGihy2VKTrsagRqGCzmaKv2hk8RtryQ5Db1Nmfa0VEvmGwQuG7OgfePxA26d%2F%2BHoDfzPtIDotfLwcxzfw6QbJddAk5ZhT3npZ05oSJCxb84wAr"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584b38aee8ca1-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1963&min_rtt=1955&rtt_var=750&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1443400&cwnd=168&unsent_bytes=0&cid=ef8ed7f2c6702aba&ts=153&x=0"
                                                  2025-01-09 15:39:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.649750104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:10 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:10 UTC857INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:10 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751939
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rcRa2RCH0pbIu2ffiZFIH08oPnItwWaP4fZM%2FrbIWBfuFR7n1EukIoDzTn1BlM8ERh%2BmHv%2Frm%2FxHcDLLpDtUqunGKMjNivVwdHRhhDss0nZl5Z6nobtCkh9nhDhJ8FLPpQ4KrAS3"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584bc783042e9-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1727&min_rtt=1721&rtt_var=658&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1645997&cwnd=240&unsent_bytes=0&cid=d9fa0962f091fc31&ts=159&x=0"
                                                  2025-01-09 15:39:10 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.649762104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:11 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:11 UTC855INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:11 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751940
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iU%2FWGnzHU6afu6EkR36xo0iElF0ehZO3bSFZAtu2ue19nhe7Wmu11Duo2JNdxk%2BI01RuI65IreTyhHngHrTuH5g3cGphMgLo3bw3GAMu2UO5m4lSWNUAO5aolfJLC71%2FwGnAwMWj"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584c5bee18ca1-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2092&min_rtt=2016&rtt_var=810&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1448412&cwnd=168&unsent_bytes=0&cid=3239c07cacf3bca9&ts=171&x=0"
                                                  2025-01-09 15:39:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.649775104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:13 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:13 UTC857INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:13 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751942
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5Fi8cibrzyPDOqKg%2BNF2uF6E%2BcYj1FIsbpXc7cZEv4WDlXHoRIvENKzIRUjuzZLVDyeVQ71CbQBsJXpNeUqr%2F%2FsuekStBlRVt6rGv8NXYGkwgxNCvkbwDSCHMzRSPVL1n3k84lQB"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584cf8db1de95-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1589&min_rtt=1580&rtt_var=611&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1763285&cwnd=242&unsent_bytes=0&cid=1c2a77afd8edee77&ts=162&x=0"
                                                  2025-01-09 15:39:13 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.649776104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:13 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:13 UTC853INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:13 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751942
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Qvc8OB2nzqBAVcAVuhCKJTqRdetXNp8bXwddxKna%2BWrNRerhWCjlGI9rjxOFEFStW95zq8Uxyj9y2vu0hIopfxUvqZa4hGVBz5PUN3WbafIL%2BpSb7blZeD0NArPhBjksR29kAPxz"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584cfee5c7c6a-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1972&min_rtt=1966&rtt_var=749&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1449851&cwnd=218&unsent_bytes=0&cid=03e9fcdffe6dc482&ts=170&x=0"
                                                  2025-01-09 15:39:13 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.649783104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:14 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:14 UTC853INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:14 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751943
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cqdRYIk8aEGCCr4sa4u7yJxaMc%2FFEYmMqthhZdJpMtfjDD0EXYAYi6BQ3apOMD1UgLovYWD3CWo7FzMBCUX54RHbzLfkxkzNXSrHsKTYoNOzW5eAzeZoFVv%2FiLLq16QT0IC4TOLH"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584d569a74414-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1758&min_rtt=1756&rtt_var=663&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1645070&cwnd=180&unsent_bytes=0&cid=2e9ff54d9a413bc3&ts=177&x=0"
                                                  2025-01-09 15:39:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.649789104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:14 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:14 UTC851INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:14 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751943
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Rs1xkaIBvkDjDW9xZ9B0d9QqdGFncv3h3XArxAyS3pkzBdSvddNra9RayKukJs4j6eoxzRnlwzGuNw0Vv5a4y45gL3lROVa6i1SwHM1Sgv2Rl8ds5N9N%2BXFZ5sQJIEi5MKvJOL8"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584d85e124414-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1770&min_rtt=1767&rtt_var=670&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1624930&cwnd=180&unsent_bytes=0&cid=761f622596a73054&ts=131&x=0"
                                                  2025-01-09 15:39:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.649800104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:16 UTC857INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:16 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751945
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JKiiyMVCIXsOawTZwdBpMqTpYhKxkyfyjS6foXZyG3SMxZK03kIdOBfaSpXC0H8VnPQHwLW28aPWsy2QpID%2FskXkVC4XaPhceOws68DjlsZXc%2F2JL0Z3pAr4y5%2FnskQoyuK3NbiK"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584e2fcf47c6a-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=85720&min_rtt=82833&rtt_var=36837&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=27564&cwnd=218&unsent_bytes=0&cid=df42b2fb975587cd&ts=556&x=0"
                                                  2025-01-09 15:39:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.649802104.21.64.14435900C:\Users\user\Desktop\Order_List.scr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:16 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:16 UTC856INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:16 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751945
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6YWOdna7wEHlfy9kSqVWYZwRhYvzhx2wwPiXcmifhlRSNyrT6vTeqrmDbmT5U21diehZSn3gDfQSbV6gx5S6fYwr4%2F77U94g9KKcTOJfNL1ut9k7IeUXAuPS%2BC8uPAcV9z5C2AIj"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584e62c248ca1-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=60038&min_rtt=2050&rtt_var=35164&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1424390&cwnd=168&unsent_bytes=0&cid=954ef19a4ea44b08&ts=173&x=0"
                                                  2025-01-09 15:39:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.649813104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:19 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:19 UTC862INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:19 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751948
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zXHuauTr2Fda%2FEY1xwUslwvpXv7N201mzRyJVUV3%2Fr9SYa1OscXKTHii%2F%2BxgZmNNI4XtsDIJ9R93uRfS78d0J9Vld1gSb%2FfYJG2mkrwVgbBfnEYIk2epQInAuMqexTNGFaOd6izO"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584f5dc19de95-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=73478&min_rtt=14201&rtt_var=41810&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=205619&cwnd=242&unsent_bytes=0&cid=4b66819f07deaea9&ts=200&x=0"
                                                  2025-01-09 15:39:19 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.649825104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:20 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:20 UTC857INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:20 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751950
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FzxmBqyQ%2Fn9INW7gQBLd8DHLORc3YgkrJSc5FqjCgXzVldui43umN02Fm6AYL9gUnrHKFtW2oKcWlF8NWZoSP4liIAaMs8hyU%2BzDKQ6wip0HpZ6ydby%2B5RNkFqvEmMlfGtqiV9zT"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff584ff8aebde95-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1655&min_rtt=1643&rtt_var=625&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1777236&cwnd=242&unsent_bytes=0&cid=e0b49f7655492281&ts=273&x=0"
                                                  2025-01-09 15:39:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.649838104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:22 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-09 15:39:22 UTC865INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:22 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751951
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KX0R8itMpS%2BU2poXA4lcVs3zpA88pYGelEqkgWkg2QT%2BnHtA%2B1r2AUN5YfduRbE%2BCclvaoB9mzPqaBrhvkTDr%2B8pxHpDUMjIbgvyE6X3cBUi7XZFND%2Bb9Ol8INWbgKxmuw%2FkWyOS"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff585098efa42e9-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=20451&min_rtt=19557&rtt_var=9123&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=109301&cwnd=240&unsent_bytes=0&cid=e77a6eae2d477f65&ts=178&x=0"
                                                  2025-01-09 15:39:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  14192.168.2.649846104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:24 UTC859INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:24 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751953
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PtHYa6wzOR67Psu%2FFT%2FDJNUowg80WgVa6ycfRNbmN3PZzAHDJF58vN4NLuQGElQlffWG%2B1csmm5YCMjtneZsBztJZI2u790Cb%2BL4u2joCb5LgwrHZ85dbHaM8W4uqX3A4Dz%2FYPil"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff585150db94414-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1818&min_rtt=1812&rtt_var=684&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1611479&cwnd=180&unsent_bytes=0&cid=e6b187304d3ade4a&ts=136&x=0"
                                                  2025-01-09 15:39:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  15192.168.2.649858104.21.64.14437344C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-09 15:39:25 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2025-01-09 15:39:26 UTC853INHTTP/1.1 200 OK
                                                  Date: Thu, 09 Jan 2025 15:39:25 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  Age: 1751954
                                                  Cache-Control: max-age=31536000
                                                  cf-cache-status: HIT
                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6PtAcp8HoZISZ0E90rJhHQLMiYa0Di4Nu6H4Eq8GJWq2N2MgkiddEzypJCv%2BoM1wB%2BpfWAywXkJ2fc3hTNVZk9eFwhXFCEQ75aPslRMtTJrFxd0m2CvPhTBQLeE5kryWHcdYBfdN"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ff5851dff33de95-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1595&rtt_var=623&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1830721&cwnd=242&unsent_bytes=0&cid=1ba5f2ccea474bb2&ts=148&x=0"
                                                  2025-01-09 15:39:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:10:38:57
                                                  Start date:09/01/2025
                                                  Path:C:\Users\user\Desktop\Order_List.scr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Order_List.scr.exe"
                                                  Imagebase:0xf40000
                                                  File size:706'056 bytes
                                                  MD5 hash:78A62A23291A3C7907E947BC9F270E09
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2209588956.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2207129697.0000000004349000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order_List.scr.exe"
                                                  Imagebase:0xd60000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"
                                                  Imagebase:0xd60000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp5251.tmp"
                                                  Imagebase:0xd0000
                                                  File size:187'904 bytes
                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:10:39:02
                                                  Start date:09/01/2025
                                                  Path:C:\Users\user\Desktop\Order_List.scr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Order_List.scr.exe"
                                                  Imagebase:0xe40000
                                                  File size:706'056 bytes
                                                  MD5 hash:78A62A23291A3C7907E947BC9F270E09
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000009.00000002.4604593123.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4607797930.00000000033AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4607797930.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:10
                                                  Start time:10:39:04
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                  Imagebase:0x7ff717f30000
                                                  File size:496'640 bytes
                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:10:39:05
                                                  Start date:09/01/2025
                                                  Path:C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  Imagebase:0x10000
                                                  File size:706'056 bytes
                                                  MD5 hash:78A62A23291A3C7907E947BC9F270E09
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 71%, ReversingLabs
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:10:39:10
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTlLqTRGrXZr" /XML "C:\Users\user\AppData\Local\Temp\tmp6FCC.tmp"
                                                  Imagebase:0xd0000
                                                  File size:187'904 bytes
                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:10:39:10
                                                  Start date:09/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:10:39:10
                                                  Start date:09/01/2025
                                                  Path:C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Roaming\FTlLqTRGrXZr.exe"
                                                  Imagebase:0x780000
                                                  File size:706'056 bytes
                                                  MD5 hash:78A62A23291A3C7907E947BC9F270E09
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.4607215864.0000000002D8F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.4607215864.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:7.5%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:190
                                                    Total number of Limit Nodes:7
                                                    execution_graph 39004 199ddd8 39005 199de1e 39004->39005 39009 199dfa7 39005->39009 39013 199dfb8 39005->39013 39006 199df0b 39010 199dfb8 39009->39010 39017 199d6e0 39010->39017 39014 199dfbd 39013->39014 39015 199d6e0 DuplicateHandle 39014->39015 39016 199dfe6 39015->39016 39016->39006 39018 199e020 DuplicateHandle 39017->39018 39019 199dfe6 39018->39019 39019->39006 39174 16ad01c 39175 16ad034 39174->39175 39176 16ad08e 39175->39176 39181 5910a44 39175->39181 39190 5912868 39175->39190 39194 5912858 39175->39194 39198 59135c8 39175->39198 39182 5910a4f 39181->39182 39183 5913639 39182->39183 39185 5913629 39182->39185 39224 5910b6c 39183->39224 39208 5913750 39185->39208 39213 591382c 39185->39213 39219 5913760 39185->39219 39186 5913637 39191 591288e 39190->39191 39192 5910a44 CallWindowProcW 39191->39192 39193 59128af 39192->39193 39193->39176 39195 5912868 39194->39195 39196 5910a44 CallWindowProcW 39195->39196 39197 59128af 39196->39197 39197->39176 39199 59135cc 39198->39199 39200 5913575 39199->39200 39201 5913639 39199->39201 39203 5913629 39199->39203 39200->39176 39202 5910b6c CallWindowProcW 39201->39202 39204 5913637 39202->39204 39205 5913750 CallWindowProcW 39203->39205 39206 5913760 CallWindowProcW 39203->39206 39207 591382c CallWindowProcW 39203->39207 39205->39204 39206->39204 39207->39204 39210 5913754 39208->39210 39209 5913800 39209->39186 39228 5913818 39210->39228 39232 5913808 39210->39232 39214 59137ea 39213->39214 39215 591383a 39213->39215 39217 5913818 CallWindowProcW 39214->39217 39218 5913808 CallWindowProcW 39214->39218 39216 5913800 39216->39186 39217->39216 39218->39216 39221 5913761 39219->39221 39220 5913800 39220->39186 39222 5913818 CallWindowProcW 39221->39222 39223 5913808 CallWindowProcW 39221->39223 39222->39220 39223->39220 39225 5910b77 39224->39225 39226 5914d1a CallWindowProcW 39225->39226 39227 5914cc9 39225->39227 39226->39227 39227->39186 39229 5913819 39228->39229 39230 5913829 39229->39230 39236 5914c51 39229->39236 39230->39209 39233 591380c 39232->39233 39233->39232 39234 5913829 39233->39234 39235 5914c51 CallWindowProcW 39233->39235 39234->39209 39235->39234 39237 5910b6c CallWindowProcW 39236->39237 39238 5914c6a 39237->39238 39238->39230 39020 5917df8 39021 5917e25 39020->39021 39040 5917be4 39021->39040 39023 5917ef6 39024 5917be4 3 API calls 39023->39024 39025 5917ffc 39024->39025 39026 5917be4 3 API calls 39025->39026 39027 591802e 39026->39027 39044 5917c24 39027->39044 39030 5917c24 3 API calls 39031 5918092 39030->39031 39032 5917c24 3 API calls 39031->39032 39033 59180c4 39032->39033 39034 5917be4 3 API calls 39033->39034 39035 59180f6 39034->39035 39036 5917be4 3 API calls 39035->39036 39037 5918128 39036->39037 39038 5917c24 3 API calls 39037->39038 39039 591815a 39038->39039 39041 5917bef 39040->39041 39042 591a423 39041->39042 39048 1995e0c 39041->39048 39042->39023 39045 5917c2f 39044->39045 39170 591a01c 39045->39170 39047 5918060 39047->39030 39049 1995e17 39048->39049 39051 199936b 39049->39051 39055 199ba20 39049->39055 39050 19993a9 39050->39042 39051->39050 39059 199db10 39051->39059 39064 199db00 39051->39064 39069 199ba58 39055->39069 39072 199ba48 39055->39072 39056 199ba36 39056->39051 39060 199db15 39059->39060 39061 199db55 39060->39061 39088 199dcaf 39060->39088 39092 199dcc0 39060->39092 39061->39050 39066 199db10 39064->39066 39065 199db55 39065->39050 39066->39065 39067 199dcaf 3 API calls 39066->39067 39068 199dcc0 3 API calls 39066->39068 39067->39065 39068->39065 39076 199bb40 39069->39076 39070 199ba67 39070->39056 39073 199ba58 39072->39073 39075 199bb40 2 API calls 39073->39075 39074 199ba67 39074->39056 39075->39074 39077 199bb44 39076->39077 39078 199bb84 39077->39078 39080 199bb7c 39077->39080 39083 199bdd8 39077->39083 39078->39070 39079 199bd88 GetModuleHandleW 39081 199bdb5 39079->39081 39080->39078 39080->39079 39081->39070 39084 199bddc 39083->39084 39085 199bde1 39083->39085 39084->39085 39086 199bd88 GetModuleHandleW 39084->39086 39085->39080 39087 199bdb5 39086->39087 39087->39080 39089 199dcc0 39088->39089 39090 199dd07 39089->39090 39096 199d618 39089->39096 39090->39061 39093 199dcc5 39092->39093 39094 199d618 3 API calls 39093->39094 39095 199dd07 39093->39095 39094->39095 39095->39061 39098 199d623 39096->39098 39097 199e618 39098->39097 39100 199d744 39098->39100 39101 199d74f 39100->39101 39102 1995e0c 3 API calls 39101->39102 39103 199ea87 39102->39103 39109 59103b0 39103->39109 39114 5910528 39103->39114 39120 59103a0 39103->39120 39125 5910510 39103->39125 39104 199eac1 39104->39097 39110 59103e3 39109->39110 39111 5910500 39110->39111 39130 5911777 39110->39130 39138 5911788 39110->39138 39111->39104 39116 5910659 39114->39116 39117 5910559 39114->39117 39115 5910565 39115->39104 39116->39104 39117->39115 39118 5911777 CreateWindowExW 39117->39118 39119 5911788 CreateWindowExW 39117->39119 39118->39116 39119->39116 39122 59103b0 39120->39122 39121 5910500 39121->39104 39122->39121 39123 5911777 CreateWindowExW 39122->39123 39124 5911788 CreateWindowExW 39122->39124 39123->39121 39124->39121 39127 59104f3 39125->39127 39126 5910565 39126->39104 39127->39125 39127->39126 39128 5911777 CreateWindowExW 39127->39128 39129 5911788 CreateWindowExW 39127->39129 39128->39126 39129->39126 39131 5911780 39130->39131 39132 5911862 39131->39132 39146 5912573 39131->39146 39150 59125d3 39131->39150 39154 5912660 39131->39154 39158 5912550 39131->39158 39162 5912653 39131->39162 39132->39132 39139 5911789 39138->39139 39140 5911862 39139->39140 39141 5912550 CreateWindowExW 39139->39141 39142 5912660 CreateWindowExW 39139->39142 39143 59125d3 CreateWindowExW 39139->39143 39144 5912573 CreateWindowExW 39139->39144 39145 5912653 CreateWindowExW 39139->39145 39141->39140 39142->39140 39143->39140 39144->39140 39145->39140 39147 591257c 39146->39147 39166 5910a18 39147->39166 39151 59125d8 39150->39151 39152 5910a18 CreateWindowExW 39151->39152 39153 5912695 39152->39153 39153->39132 39155 5912678 39154->39155 39156 5910a18 CreateWindowExW 39155->39156 39157 5912695 39156->39157 39157->39132 39159 5912554 39158->39159 39160 5910a18 CreateWindowExW 39159->39160 39161 5912695 39160->39161 39161->39132 39163 5912658 39162->39163 39164 5910a18 CreateWindowExW 39163->39164 39165 5912695 39164->39165 39165->39132 39167 59126b0 CreateWindowExW 39166->39167 39169 59127d4 39167->39169 39169->39169 39171 591a027 39170->39171 39172 591b902 39171->39172 39173 1995e0c 3 API calls 39171->39173 39172->39047 39173->39172

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 444 586f39e-586f3a2 445 586fd65-586fd73 444->445 446 586f3a3-586f3b8 444->446 446->445 447 586f3b9-586f3c4 446->447 449 586f3ca-586f3d6 447->449 450 586f3e2-586f3f1 449->450 452 586f450-586f454 450->452 453 586f4fc-586f566 452->453 454 586f45a-586f463 452->454 453->445 492 586f56c-586fab3 453->492 455 586f35e-586f36a 454->455 456 586f469-586f47f 454->456 455->445 458 586f370-586f37c 455->458 462 586f4d1-586f4e3 456->462 463 586f481-586f484 456->463 459 586f3f3-586f3f9 458->459 460 586f37e-586f392 458->460 459->445 464 586f3ff-586f417 459->464 460->459 470 586f394-586f39d 460->470 474 586fca4-586fd5a 462->474 475 586f4e9-586f4ec 462->475 463->445 466 586f48a-586f4c7 463->466 464->445 473 586f41d-586f445 464->473 466->453 488 586f4c9-586f4cf 466->488 470->444 473->452 474->445 477 586f4ef-586f4f9 475->477 488->462 488->463 570 586fab5-586fabf 492->570 571 586faca-586fb5d 492->571 572 586fac5 570->572 573 586fb68-586fbfb 570->573 571->573 574 586fc06-586fc99 572->574 573->574 574->474
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: D
                                                    • API String ID: 0-2746444292
                                                    • Opcode ID: 122898029671c25434c7c85665ee340245e5b5c214cef3a1ae4e4279d69ee89c
                                                    • Instruction ID: 0cbd87a58023db379084c2e3c7b04beb2bfd96c8d7b946ec50d2e354ab84e162
                                                    • Opcode Fuzzy Hash: 122898029671c25434c7c85665ee340245e5b5c214cef3a1ae4e4279d69ee89c
                                                    • Instruction Fuzzy Hash: 4B52A574A002299FDB64DF64D898B9DBBB2FF89310F1081D9D509A73A5DB30AE85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fbabe47d4cbe241e1746be522b88dcc43b4290273bc492b293f8dfed305afc3c
                                                    • Instruction ID: 2930933a1ffb144efb481a94380314c51b9d0f1b8b75f5bfa3261205c1e97387
                                                    • Opcode Fuzzy Hash: fbabe47d4cbe241e1746be522b88dcc43b4290273bc492b293f8dfed305afc3c
                                                    • Instruction Fuzzy Hash: 7B524A75B00115DFDB18DF69C898A6EBBB2BF88710B158169E956DB360DB30EC42CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b03434b6dd0bab64807c50b64b790f7347181837ce9a4d497f556bef12fab3a
                                                    • Instruction ID: f4e21a6c051d89426ead9f5bc8b3f43c94ada6bd042a3afd9f89362798e34d04
                                                    • Opcode Fuzzy Hash: 7b03434b6dd0bab64807c50b64b790f7347181837ce9a4d497f556bef12fab3a
                                                    • Instruction Fuzzy Hash: D0A1A074E002199FDF15DFA9D844AAEBBF6FF88300F109169E908AB355DB346946CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 979d25e6cec133a13ce8c8d331b5dc0ae77c7a1ce7157ba8734cd6e33967d4f4
                                                    • Instruction ID: 84a74c7a0fef22d721abcfe6e26d746e7306c2d5a5e871e25b8d057befcfbd17
                                                    • Opcode Fuzzy Hash: 979d25e6cec133a13ce8c8d331b5dc0ae77c7a1ce7157ba8734cd6e33967d4f4
                                                    • Instruction Fuzzy Hash: C0A1A074E00219DFDB19DFA9D884AAEBBF6FF88300F109169E909A7355DB306945CF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1044 199bb40-199bb42 1045 199bb49-199bb4a 1044->1045 1046 199bb44-199bb48 1044->1046 1047 199bb4c-199bb50 1045->1047 1048 199bb51-199bb5f 1045->1048 1046->1045 1047->1048 1049 199bb8b-199bb8f 1048->1049 1050 199bb61-199bb6e call 199a554 1048->1050 1052 199bb91-199bb9b 1049->1052 1053 199bba3-199bbe4 1049->1053 1057 199bb70 1050->1057 1058 199bb84 1050->1058 1052->1053 1059 199bbf1-199bbff 1053->1059 1060 199bbe6-199bbee 1053->1060 1105 199bb76 call 199bdd8 1057->1105 1106 199bb76 call 199bde8 1057->1106 1058->1049 1061 199bc01-199bc06 1059->1061 1062 199bc23-199bc25 1059->1062 1060->1059 1064 199bc08-199bc0f call 199b554 1061->1064 1065 199bc11 1061->1065 1067 199bc28-199bc2f 1062->1067 1063 199bb7c-199bb7e 1063->1058 1066 199bcc0-199bd3a 1063->1066 1071 199bc13-199bc21 1064->1071 1065->1071 1098 199bd3c-199bd3e 1066->1098 1099 199bd41-199bd80 1066->1099 1068 199bc3c-199bc43 1067->1068 1069 199bc31-199bc39 1067->1069 1072 199bc50-199bc59 call 199b564 1068->1072 1073 199bc45-199bc4d 1068->1073 1069->1068 1071->1067 1079 199bc5b-199bc63 1072->1079 1080 199bc66-199bc6b 1072->1080 1073->1072 1079->1080 1081 199bc89-199bc96 1080->1081 1082 199bc6d-199bc74 1080->1082 1088 199bcb9-199bcbf 1081->1088 1089 199bc98-199bcb6 1081->1089 1082->1081 1084 199bc76-199bc86 call 199b574 call 199b584 1082->1084 1084->1081 1089->1088 1098->1099 1100 199bd88-199bdb3 GetModuleHandleW 1099->1100 1101 199bd82-199bd85 1099->1101 1102 199bdbc-199bdd0 1100->1102 1103 199bdb5-199bdbb 1100->1103 1101->1100 1103->1102 1105->1063 1106->1063
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7abc0a26a7ee4c9bbc6039e79f4d8c1a913406e1a5627abbb64e1be89f42cb7d
                                                    • Instruction ID: 09a24ce5896cb545180c4831b6122b363ca3bfa561dacc27d83c6488164b6fec
                                                    • Opcode Fuzzy Hash: 7abc0a26a7ee4c9bbc6039e79f4d8c1a913406e1a5627abbb64e1be89f42cb7d
                                                    • Instruction Fuzzy Hash: 39815770A00B458FEB24DF2DE444B5ABBF5FF88200F00892DD48ADBA41DB79E845CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1107 59125b0-5912632 1109 5912634-5912638 1107->1109 1110 5912639-59126b8 1107->1110 1109->1110 1113 5912643-5912651 1110->1113 1114 59126ba-59126ce 1110->1114 1116 59126d0-5912716 1113->1116 1114->1116 1117 5912721-5912728 1116->1117 1118 5912718-591271e 1116->1118 1119 5912733-591276b 1117->1119 1120 591272a-5912730 1117->1120 1118->1117 1121 5912773-59127d2 CreateWindowExW 1119->1121 1120->1119 1122 59127d4-59127da 1121->1122 1123 59127db-5912813 1121->1123 1122->1123 1127 5912820 1123->1127 1128 5912815-5912818 1123->1128 1129 5912821 1127->1129 1128->1127 1129->1129
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 0a36c528b72157ec7447186210ba07ab25b9123ad94d70075c883d8b84cbffb9
                                                    • Instruction ID: 0e7ae88f79a407bdd2e844d711234dda3987ccbbcd6974b21fed10fa2fccdd55
                                                    • Opcode Fuzzy Hash: 0a36c528b72157ec7447186210ba07ab25b9123ad94d70075c883d8b84cbffb9
                                                    • Instruction Fuzzy Hash: 785142B4D143599FDF05CFAAC840ADDBFB1BF48310F24815AE814AB251DB74A841CF54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1130 5912593-59126a6 1133 59126a8-59126aa 1130->1133 1134 59126ad-59126af 1130->1134 1135 59126b1-5912716 1133->1135 1136 59126ac 1133->1136 1134->1135 1137 5912721-5912728 1135->1137 1138 5912718-591271e 1135->1138 1136->1134 1139 5912733-591276b 1137->1139 1140 591272a-5912730 1137->1140 1138->1137 1141 5912773-59127d2 CreateWindowExW 1139->1141 1140->1139 1142 59127d4-59127da 1141->1142 1143 59127db-5912813 1141->1143 1142->1143 1147 5912820 1143->1147 1148 5912815-5912818 1143->1148 1149 5912821 1147->1149 1148->1147 1149->1149
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 233bf6e5c8eec9a7b9cff0edb6bf7726224ad5969fa5cdc39e56fb976c38160d
                                                    • Instruction ID: 7ee3b1e5fc92908bf30cc19ecf5fa2bfcebde429d322b5f440ec6536cc045e66
                                                    • Opcode Fuzzy Hash: 233bf6e5c8eec9a7b9cff0edb6bf7726224ad5969fa5cdc39e56fb976c38160d
                                                    • Instruction Fuzzy Hash: D851EFB5D04359DFDF14DF9AC884ADEBBB5BF88310F24812AE819AB250D774A841CF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1150 5912613-59126a6 1153 59126a8-59126aa 1150->1153 1154 59126ad-59126af 1150->1154 1155 59126b1-5912716 1153->1155 1156 59126ac 1153->1156 1154->1155 1157 5912721-5912728 1155->1157 1158 5912718-591271e 1155->1158 1156->1154 1159 5912733-591276b 1157->1159 1160 591272a-5912730 1157->1160 1158->1157 1161 5912773-59127d2 CreateWindowExW 1159->1161 1160->1159 1162 59127d4-59127da 1161->1162 1163 59127db-5912813 1161->1163 1162->1163 1167 5912820 1163->1167 1168 5912815-5912818 1163->1168 1169 5912821 1167->1169 1168->1167 1169->1169
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 10aaf0b63e297953a9f0224aafda8c79b301e34d0208e294be3bbcc6447508d0
                                                    • Instruction ID: 07088e087792727e976749e9d743317b861c1af6c241857abcf803be506262b6
                                                    • Opcode Fuzzy Hash: 10aaf0b63e297953a9f0224aafda8c79b301e34d0208e294be3bbcc6447508d0
                                                    • Instruction Fuzzy Hash: B351E1B5D00319DFDF14CF9AC884ADEBBB5BF48310F24812AE819AB250D774A841CF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1186 59125b3-59126b8 1190 5912643-5912651 1186->1190 1191 59126ba-59126ce 1186->1191 1193 59126d0-5912716 1190->1193 1191->1193 1194 5912721-5912728 1193->1194 1195 5912718-591271e 1193->1195 1196 5912733-591276b 1194->1196 1197 591272a-5912730 1194->1197 1195->1194 1198 5912773-59127d2 CreateWindowExW 1196->1198 1197->1196 1199 59127d4-59127da 1198->1199 1200 59127db-5912813 1198->1200 1199->1200 1204 5912820 1200->1204 1205 5912815-5912818 1200->1205 1206 5912821 1204->1206 1205->1204 1206->1206
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 182d5b950e70ca94ca640ab82a123068a1f1c004e327d163bdf6550040d65649
                                                    • Instruction ID: f82ded28891e53051dd5e1fd4ef28a41e230eea278c30d7087b836699cc08fff
                                                    • Opcode Fuzzy Hash: 182d5b950e70ca94ca640ab82a123068a1f1c004e327d163bdf6550040d65649
                                                    • Instruction Fuzzy Hash: 614120B5C04359DFDF14CF9AC884ADEBBB1BF88310F24811AE809AB250D774A881CF54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1170 5910a18-5912716 1173 5912721-5912728 1170->1173 1174 5912718-591271e 1170->1174 1175 5912733-59127d2 CreateWindowExW 1173->1175 1176 591272a-5912730 1173->1176 1174->1173 1178 59127d4-59127da 1175->1178 1179 59127db-5912813 1175->1179 1176->1175 1178->1179 1183 5912820 1179->1183 1184 5912815-5912818 1179->1184 1185 5912821 1183->1185 1184->1183 1185->1185
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 998ac6aba9a19005f7974076031ceeaa18563a29affe5230da6dab1ee843353a
                                                    • Instruction ID: bbb03c2d05fbf3ed9789fa701756d72f71f790d056b0b8e60706b0196572555f
                                                    • Opcode Fuzzy Hash: 998ac6aba9a19005f7974076031ceeaa18563a29affe5230da6dab1ee843353a
                                                    • Instruction Fuzzy Hash: 1751BEB5D103599FDF14DF9AC884ADEBBB5BF48310F24812AE819AB210D775A841CF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1207 59125d1-5912716 1210 5912721-5912728 1207->1210 1211 5912718-591271e 1207->1211 1212 5912733-591276b 1210->1212 1213 591272a-5912730 1210->1213 1211->1210 1214 5912773-59127d2 CreateWindowExW 1212->1214 1213->1212 1215 59127d4-59127da 1214->1215 1216 59127db-5912813 1214->1216 1215->1216 1220 5912820 1216->1220 1221 5912815-5912818 1216->1221 1222 5912821 1220->1222 1221->1220 1222->1222
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059127C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 929e2d21f0c0175c74b11fa7b5f9a22df3d2fdef76ea92c5ef65e069b82663ea
                                                    • Instruction ID: 3b45aa88f335f04b58637bcb2031cbb5a5f40990f2d75d1791618d1d7e5964c7
                                                    • Opcode Fuzzy Hash: 929e2d21f0c0175c74b11fa7b5f9a22df3d2fdef76ea92c5ef65e069b82663ea
                                                    • Instruction Fuzzy Hash: 8541FEB5C14319DFDF14CF99C884ADEBBB1BF88310F24851AE819AB210DB74A881CF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1223 199590c-199590e 1224 1995910-1995914 1223->1224 1225 1995915-1995916 1223->1225 1224->1225 1226 1995918-199591c 1225->1226 1227 199591d-19959d9 CreateActCtxA 1225->1227 1226->1227 1229 19959db-19959e1 1227->1229 1230 19959e2-1995a3c 1227->1230 1229->1230 1237 1995a4b-1995a4f 1230->1237 1238 1995a3e-1995a41 1230->1238 1239 1995a51-1995a5d 1237->1239 1240 1995a60 1237->1240 1238->1237 1239->1240 1242 1995a61 1240->1242 1242->1242
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 019959C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: bec688031fc636fb60c51ce6a749496295a796fbd360fd0ad4164e3ae6752d50
                                                    • Instruction ID: e34a6f781f4efe1d4e57ccfb49d4f9e415b8a22505e06352d7faa202ce577e06
                                                    • Opcode Fuzzy Hash: bec688031fc636fb60c51ce6a749496295a796fbd360fd0ad4164e3ae6752d50
                                                    • Instruction Fuzzy Hash: 2241EEB0C00719CBEF25CFA9C984B8EBBB5BF89314F60816AD408AB251DB756945CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1243 5910b6c-5914cbc 1246 5914cc2-5914cc7 1243->1246 1247 5914d6c-5914d8c call 5910a44 1243->1247 1248 5914cc9-5914d00 1246->1248 1249 5914d1a-5914d52 CallWindowProcW 1246->1249 1254 5914d8f-5914d9c 1247->1254 1257 5914d02-5914d08 1248->1257 1258 5914d09-5914d18 1248->1258 1251 5914d54-5914d5a 1249->1251 1252 5914d5b-5914d6a 1249->1252 1251->1252 1252->1254 1257->1258 1258->1254
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 05914D41
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: c9f6eb73821fb89debc19f26420fdeed0cd2f2f09933f29e8ee192eb69de7022
                                                    • Instruction ID: f3e039aad609b6f8b682c8e0121ccda09b491b072fff4dd81d6d671306353132
                                                    • Opcode Fuzzy Hash: c9f6eb73821fb89debc19f26420fdeed0cd2f2f09933f29e8ee192eb69de7022
                                                    • Instruction Fuzzy Hash: 9A4108B9900319CFDB14CF99C488AAABBF5FF8C314F248459D919AB321D774A941CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1260 1994514-19959d9 CreateActCtxA 1264 19959db-19959e1 1260->1264 1265 19959e2-1995a3c 1260->1265 1264->1265 1272 1995a4b-1995a4f 1265->1272 1273 1995a3e-1995a41 1265->1273 1274 1995a51-1995a5d 1272->1274 1275 1995a60 1272->1275 1273->1272 1274->1275 1277 1995a61 1275->1277 1277->1277
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 019959C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: dc2b723c7f35b38bedc28e63f5222d96017c6585b443525668da7def8e6dd16d
                                                    • Instruction ID: 745ea399b6b2ab788885245cf9702070cb08a79472090c557405f2c4741d98da
                                                    • Opcode Fuzzy Hash: dc2b723c7f35b38bedc28e63f5222d96017c6585b443525668da7def8e6dd16d
                                                    • Instruction Fuzzy Hash: D441D0B0C0071DCBEF25CFA9C984B9EBBB5BF49704F60816AD408AB251DB756945CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1278 199d6e0-199e0b4 DuplicateHandle 1280 199e0bd-199e0da 1278->1280 1281 199e0b6-199e0bc 1278->1281 1281->1280
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0199DFE6,?,?,?,?,?), ref: 0199E0A7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 41fdf7461de117b38326bcf727ce2d0d4b86c89ec6c10b73ebc1138dd50d59fd
                                                    • Instruction ID: 90de301a9bf444ed32a66f12bbda9f9281264d799d680e72ee386111539b4596
                                                    • Opcode Fuzzy Hash: 41fdf7461de117b38326bcf727ce2d0d4b86c89ec6c10b73ebc1138dd50d59fd
                                                    • Instruction Fuzzy Hash: 9E21D4B5904349DFDB10CF9AD584AEEBBF4FB48310F14841AE918A3350D379A950CFA5
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0199DFE6,?,?,?,?,?), ref: 0199E0A7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 90054087fa8b20bf411340c6b34698cfca2542575934a8d63e279de324df7da5
                                                    • Instruction ID: 7c2c5a370f91affdc36dde381279aff7cc4628575b91ee490218a8473bfe87d6
                                                    • Opcode Fuzzy Hash: 90054087fa8b20bf411340c6b34698cfca2542575934a8d63e279de324df7da5
                                                    • Instruction Fuzzy Hash: A621E0B5904349DFDF10CFA9D984BDEBBF5BB48320F14851AE918A3250C378A954CF65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1284 199bdd8-199bdda 1285 199bddc-199bde0 1284->1285 1286 199bde1-199bde2 1284->1286 1285->1286 1287 199bd88-199bdb3 GetModuleHandleW 1285->1287 1288 199bde9-199bdec 1286->1288 1289 199bde4-199bde6 1286->1289 1292 199bdbc-199bdd0 1287->1292 1293 199bdb5-199bdbb 1287->1293 1291 199bded-199bdfe call 199a554 1288->1291 1290 199bde8 1289->1290 1289->1291 1290->1288 1297 199be2e-199be33 1291->1297 1298 199be00-199be11 call 199b5a4 1291->1298 1293->1292 1301 199be13-199be1c call 199b5b0 1298->1301 1302 199be25-199be2c call 199b5bc 1298->1302 1306 199be21-199be23 1301->1306 1302->1297 1306->1297
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0199BDA6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 6adf7dd85cd5abd0bd90eb538110e5c2c56a5ae63f08154abd36357ec94e5f7d
                                                    • Instruction ID: e76bcf6d1210263f296cf0969d01676ab423267c982b32e1777047c1e9aa94f2
                                                    • Opcode Fuzzy Hash: 6adf7dd85cd5abd0bd90eb538110e5c2c56a5ae63f08154abd36357ec94e5f7d
                                                    • Instruction Fuzzy Hash: 1D11C4B56002054FEF109A5EE814BAABBEDEFC4321F14806AD50EE7251CA3C9805CBA2
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0199BDA6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2205792915.0000000001990000.00000040.00000800.00020000.00000000.sdmp, Offset: 01990000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1990000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 8aec9be04d7c9c9920235ed8de45a7742dd0534e14d67d0cdbfe751ce7590c6a
                                                    • Instruction ID: e5b0025ddeb6b7bb3aa0ba9384747c05bf9f05e2e2cf5c36ef3e2a6f23b6a07d
                                                    • Opcode Fuzzy Hash: 8aec9be04d7c9c9920235ed8de45a7742dd0534e14d67d0cdbfe751ce7590c6a
                                                    • Instruction Fuzzy Hash: F3110FB6C003498FDB10CF9AD444BDEFBF8AF88224F14841AD929B7200D379A545CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b270a8cb0a1e4c3660440a8f203f6d0833b5e0952d700463b3dfdb166918264c
                                                    • Instruction ID: 85cc18c980b43cd1ce1f321c0d6fd67af9efcfd947590f33bff3617a943da7cc
                                                    • Opcode Fuzzy Hash: b270a8cb0a1e4c3660440a8f203f6d0833b5e0952d700463b3dfdb166918264c
                                                    • Instruction Fuzzy Hash: 74613835B101199FCB14DF69D858AAE7BF2BB88715F148069E912EB3A0DB71DC41CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5bfce507183190557cb8d360b78cfe01414655f56c14d80ffc1f28d63533f192
                                                    • Instruction ID: 28f1a5e480c2fa28f6c286c07b04b3590479479279aef1fc3033a39b0f7de2c4
                                                    • Opcode Fuzzy Hash: 5bfce507183190557cb8d360b78cfe01414655f56c14d80ffc1f28d63533f192
                                                    • Instruction Fuzzy Hash: CE410434A0011ADFDF159F69D859AAE7BB7FB88311F148029FD0697290DB349C56CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa1061083f3b35e5efed23e3969ca2a03ccc0657accd9eeae0aad776ba8e89ff
                                                    • Instruction ID: 7ef825124286b00a2ea78b658be88bef2387f6385cc818faba9bba403048e956
                                                    • Opcode Fuzzy Hash: aa1061083f3b35e5efed23e3969ca2a03ccc0657accd9eeae0aad776ba8e89ff
                                                    • Instruction Fuzzy Hash: EC21C234A14209AFEB55ABB49C05BAE7F77EBC9301F11C465EA05DB280DE305E0587A5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204911157.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_16ad000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8ad9bcb96e91a127e66b6c2340a0722f839f92afb2b868780f4772c94df09b3b
                                                    • Instruction ID: 3ea4a13adf87e39311ee1a7db18a4a610238bae81d94a0a2e05848860c4e429e
                                                    • Opcode Fuzzy Hash: 8ad9bcb96e91a127e66b6c2340a0722f839f92afb2b868780f4772c94df09b3b
                                                    • Instruction Fuzzy Hash: 9F214FB1244200EFCB14DF68D9C0B26BBA1FB88314F60C56DE90A0B792C37AD807CE61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204911157.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_16ad000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb1bb01eb59f9037b87ee725b9db3b3fc09484075633a9e108201753365ad8eb
                                                    • Instruction ID: 319d035fbe3df74b35a923dead37d0e83d33363f15c0147dc7b8c2b1466ed60b
                                                    • Opcode Fuzzy Hash: eb1bb01eb59f9037b87ee725b9db3b3fc09484075633a9e108201753365ad8eb
                                                    • Instruction Fuzzy Hash: 59213475504200EFDB05DF94D9C0B2ABBA1FB84324F60C5ADEA0A4B752C77ADC06CE61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5a34d5af5a1aad5d4a25f68fe9ddc385ac9249c3a50a3aef8d63e1e8ef6e62be
                                                    • Instruction ID: 59f01ab1fcdf9124e08f82dceec46f1e8fe7af148cb0781367a78e324ae590b8
                                                    • Opcode Fuzzy Hash: 5a34d5af5a1aad5d4a25f68fe9ddc385ac9249c3a50a3aef8d63e1e8ef6e62be
                                                    • Instruction Fuzzy Hash: 7B21A134B14208AFEB55AB74DC06BAE7FB7EBC5602F10C466E905DB280DF305E0987A5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a07adf014f4302aaf4b5f7a6591d9fadea1563dd08811312c6b010f34b2cba2f
                                                    • Instruction ID: 747a89f0d7cc6ca40a7977133bad4a3aa2e7a8eb44c7caa0b669a9b7a8bbe550
                                                    • Opcode Fuzzy Hash: a07adf014f4302aaf4b5f7a6591d9fadea1563dd08811312c6b010f34b2cba2f
                                                    • Instruction Fuzzy Hash: 60213C75A042468FCB14DFE8C898A6EBBF1BF89214F1540A6ED45DB361D730DC81CB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204911157.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_16ad000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c009bc0a7e273c1b06584fc793d5240b01d9b988b0e2c8c0afdd91c8296e955c
                                                    • Instruction ID: f23d6ceaa8eeb7f6f5cc8c58f91ddaf79f4fe5e1fa9e10feba209a61b6b1cefe
                                                    • Opcode Fuzzy Hash: c009bc0a7e273c1b06584fc793d5240b01d9b988b0e2c8c0afdd91c8296e955c
                                                    • Instruction Fuzzy Hash: 382180755483809FCB02CF54D994B11BF71EB46314F28C5DAD8498F6A7C33A9846CB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9c76f2dec2f44e8dbee1732e1ec8d6ee06158c8a37b90a379db7820d0016b4c5
                                                    • Instruction ID: 1d911a8648a7e0d9b23be2b97250898a0069d800b58d7847005e3ca86693eae8
                                                    • Opcode Fuzzy Hash: 9c76f2dec2f44e8dbee1732e1ec8d6ee06158c8a37b90a379db7820d0016b4c5
                                                    • Instruction Fuzzy Hash: 90211235A00109EFCF04DFA4E949AED7BB2FB88311F144069EA02BB260DB319D55CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204911157.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_16ad000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction ID: f73afae1765df08e42817945fb3ce3860f6bf8efaf8ac82af146eaf65075a4dc
                                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction Fuzzy Hash: BA11BB75504280DFCB02CF54C9C4B15BBA1FB84224F24C6A9D9494B7A6C33AD80ACF61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204800401.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_169d000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: acd8d6ca330acea392ce828ec9bde825755f51ea586aa7828804addd7f2c7390
                                                    • Instruction ID: 17156d9894ef7d94c0bdb71fa5894831eb39e7ab93f1c26cd5b2ecdab1cbb733
                                                    • Opcode Fuzzy Hash: acd8d6ca330acea392ce828ec9bde825755f51ea586aa7828804addd7f2c7390
                                                    • Instruction Fuzzy Hash: 5701F7710043809BFB104EA9CDC4B3ABF9CDF41274F08C52AEE081E282C7799441CA71
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2204800401.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_169d000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1fe5c37bd290ba6c6ec21d8239f7bcbf03efbe5c4da45bf877327cdf26be19b
                                                    • Instruction ID: 599ed3f3fb41612b9ea52aabef7939008c35dad82669b6692c214b891786dee7
                                                    • Opcode Fuzzy Hash: e1fe5c37bd290ba6c6ec21d8239f7bcbf03efbe5c4da45bf877327cdf26be19b
                                                    • Instruction Fuzzy Hash: EEF062714053849FEB118E59DDC8B66FF9CEB81634F18C55AED085E286C3799844CBB1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b62d92a6e66d4d56e422d3890169cd9fe49921826af56032766de30042795045
                                                    • Instruction ID: e1b2943c428609ca73983d14d226c7f4a28453f3c9cca093bbb1e7ce860c161d
                                                    • Opcode Fuzzy Hash: b62d92a6e66d4d56e422d3890169cd9fe49921826af56032766de30042795045
                                                    • Instruction Fuzzy Hash: 4FE09235601105EADF206EE1AC886AB7F75FB99265F008432ED0596241DB30895686A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f298bbc270ce527744a09b7fe0fb07c71a511429c46b5611b5c8b2d345fbddec
                                                    • Instruction ID: 1d166469f0e5bbaff5e6a07d40aebc4b98c18c5773f1b141411bc90ddec455c1
                                                    • Opcode Fuzzy Hash: f298bbc270ce527744a09b7fe0fb07c71a511429c46b5611b5c8b2d345fbddec
                                                    • Instruction Fuzzy Hash: 601297B0401745EAD330EF65FC4C199BBB1B766324BB0E609D2616F2E9EBB8154ACF44
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 934cc01aa7aedf5eaf91475c6f01e86f49c41a68370b7041305d14c8f89f6f22
                                                    • Instruction ID: 9a4db95a8e09219b11463dc70d3b668d1a1ff690a59a49a2c8729a12ddc07436
                                                    • Opcode Fuzzy Hash: 934cc01aa7aedf5eaf91475c6f01e86f49c41a68370b7041305d14c8f89f6f22
                                                    • Instruction Fuzzy Hash: B8D1E435D20B5ACACB00EB64D9916E9B7B5FFD9300F20979AE40937210EF746AC5CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209041427.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5860000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f53fbeb07634fbb4ffdf29731f3b645c091f3125adf983cdd80c810eb19fd801
                                                    • Instruction ID: d28e7d2703bf311384df52bf866bb817d090d48d4d06ade80812428d92e75b45
                                                    • Opcode Fuzzy Hash: f53fbeb07634fbb4ffdf29731f3b645c091f3125adf983cdd80c810eb19fd801
                                                    • Instruction Fuzzy Hash: 07D1E435D20B5ACACB00EB64D9916A9B7B5FFD9300F20979AE40937210EF746AC5CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c09b57e4126c742e8a294fdba6ec282d037d7483b1f0b85200f6c2852f663c4d
                                                    • Instruction ID: de411c297f792370f50cc243a01d6311a33886ac655de30c6c980231cfcc3060
                                                    • Opcode Fuzzy Hash: c09b57e4126c742e8a294fdba6ec282d037d7483b1f0b85200f6c2852f663c4d
                                                    • Instruction Fuzzy Hash: 6CA18036E0021ACFCF15DFB4C8445AEB7B6FFC5300B15856AE806AB265DB32E946CB40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2209072743.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5910000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a2e5b08160ea49096351542f12addaadf007263ac45ce69bcc9ba3cd0d5898d
                                                    • Instruction ID: a38177995d2c083f3d2f2dd1583e1add23511d079b9123277d8f7bbab162c58c
                                                    • Opcode Fuzzy Hash: 6a2e5b08160ea49096351542f12addaadf007263ac45ce69bcc9ba3cd0d5898d
                                                    • Instruction Fuzzy Hash: 8CC1ECB0401745EAD720EF64FC4C199BBB1BBA6324FB0E719D1616B2E9EBB4144ACF44

                                                    Execution Graph

                                                    Execution Coverage:12.1%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:47.4%
                                                    Total number of Nodes:19
                                                    Total number of Limit Nodes:0
                                                    execution_graph 25467 14bced8 25468 14bcee4 25467->25468 25472 6ea85fb 25468->25472 25477 6ea8608 25468->25477 25469 14bd0b7 25473 6ea8603 25472->25473 25474 6ea873c 25473->25474 25482 5d87d90 25473->25482 25486 5d88174 25473->25486 25474->25469 25478 6ea862a 25477->25478 25479 6ea873c 25478->25479 25480 5d87d90 LdrInitializeThunk 25478->25480 25481 5d88174 LdrInitializeThunk 25478->25481 25479->25469 25480->25479 25481->25479 25484 5d87dc1 25482->25484 25483 5d87f21 25483->25474 25484->25483 25485 5d882b1 LdrInitializeThunk 25484->25485 25485->25483 25488 5d8802b 25486->25488 25487 5d882b1 LdrInitializeThunk 25489 5d882c9 25487->25489 25488->25487 25489->25474

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 984 5d87d90-5d87dbf 985 5d87dc1 984->985 986 5d87dc6-5d87e5c 984->986 985->986 988 5d87efb-5d87f01 986->988 989 5d87e61-5d87e74 988->989 990 5d87f07-5d87f1f 988->990 991 5d87e7b-5d87ecc 989->991 992 5d87e76 989->992 993 5d87f21-5d87f2e 990->993 994 5d87f33-5d87f46 990->994 1010 5d87ece-5d87edc 991->1010 1011 5d87edf-5d87ef1 991->1011 992->991 995 5d882c9-5d883c6 993->995 996 5d87f48 994->996 997 5d87f4d-5d87f69 994->997 1002 5d883c8-5d883cd 995->1002 1003 5d883ce-5d883d8 995->1003 996->997 1000 5d87f6b 997->1000 1001 5d87f70-5d87f94 997->1001 1000->1001 1007 5d87f9b-5d87fcd 1001->1007 1008 5d87f96 1001->1008 1002->1003 1016 5d87fcf 1007->1016 1017 5d87fd4-5d88016 1007->1017 1008->1007 1010->990 1013 5d87ef8 1011->1013 1014 5d87ef3 1011->1014 1013->988 1014->1013 1016->1017 1019 5d88018 1017->1019 1020 5d8801d-5d88026 1017->1020 1019->1020 1021 5d8824e-5d88254 1020->1021 1022 5d8825a-5d8826d 1021->1022 1023 5d8802b-5d88050 1021->1023 1024 5d8826f 1022->1024 1025 5d88274-5d8828f 1022->1025 1026 5d88052 1023->1026 1027 5d88057-5d8808e 1023->1027 1024->1025 1028 5d88291 1025->1028 1029 5d88296-5d882aa 1025->1029 1026->1027 1035 5d88090 1027->1035 1036 5d88095-5d880c7 1027->1036 1028->1029 1032 5d882ac 1029->1032 1033 5d882b1-5d882c7 LdrInitializeThunk 1029->1033 1032->1033 1033->995 1035->1036 1038 5d880c9-5d880ee 1036->1038 1039 5d8812b-5d8813e 1036->1039 1040 5d880f0 1038->1040 1041 5d880f5-5d88123 1038->1041 1042 5d88140 1039->1042 1043 5d88145-5d8816a 1039->1043 1040->1041 1041->1039 1042->1043 1046 5d88179-5d881b1 1043->1046 1047 5d8816c-5d8816d 1043->1047 1048 5d881b8-5d88219 call 5d87b70 1046->1048 1049 5d881b3 1046->1049 1047->1022 1055 5d8821b 1048->1055 1056 5d88220-5d88244 1048->1056 1049->1048 1055->1056 1059 5d8824b 1056->1059 1060 5d88246 1056->1060 1059->1021 1060->1059
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e8acce9d328aa225512fec10eaa53e98f48e1633470b11aca61fad170744207
                                                    • Instruction ID: 4d8e1070132bde9b84d01dd536f582ddbe91a4ff282c39a2013db6207115df2d
                                                    • Opcode Fuzzy Hash: 9e8acce9d328aa225512fec10eaa53e98f48e1633470b11aca61fad170744207
                                                    • Instruction Fuzzy Hash: 32F1F574E01218CFDB14DFA9D884BADBBB2FF84304F5482AAD448AB355DB719986CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6c136ae7cb421da0d2878cf5714a8b41edd4d227d4b9a7bee174b642a0763f4a
                                                    • Instruction ID: 376f7d144e3c0592ed648481c0b126377860051971ab268052afee5660e9fef3
                                                    • Opcode Fuzzy Hash: 6c136ae7cb421da0d2878cf5714a8b41edd4d227d4b9a7bee174b642a0763f4a
                                                    • Instruction Fuzzy Hash: 48726175A00209DFCB15CF68C984AEEBBF2FF88314F25855AE9059B3A1D731E941CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1429 6ea11a0-6ea11c0 1430 6ea11c2 1429->1430 1431 6ea11c7-6ea1240 1429->1431 1430->1431 1435 6ea128e-6ea12e1 1431->1435 1436 6ea1242-6ea1289 1431->1436 1443 6ea1329-6ea13dd 1435->1443 1444 6ea12e3-6ea1328 1435->1444 1436->1443 1591 6ea13e3 call 14b4dc8 1443->1591 1592 6ea13e3 call 14b4dc5 1443->1592 1444->1443 1454 6ea13e8-6ea140e 1456 6ea1fcf-6ea2004 1454->1456 1457 6ea1414-6ea1517 1454->1457 1467 6ea1fc2-6ea1fc8 1457->1467 1468 6ea1fce 1467->1468 1469 6ea151c-6ea15fa 1467->1469 1468->1456 1477 6ea15fc 1469->1477 1478 6ea1601-6ea166a 1469->1478 1477->1478 1482 6ea166c 1478->1482 1483 6ea1671-6ea1682 1478->1483 1482->1483 1484 6ea1688-6ea1692 1483->1484 1485 6ea170f-6ea1816 1483->1485 1486 6ea1699-6ea170e 1484->1486 1487 6ea1694 1484->1487 1503 6ea1818 1485->1503 1504 6ea181d-6ea1886 1485->1504 1486->1485 1487->1486 1503->1504 1508 6ea1888 1504->1508 1509 6ea188d-6ea189e 1504->1509 1508->1509 1510 6ea192b-6ea1adf 1509->1510 1511 6ea18a4-6ea18ae 1509->1511 1532 6ea1ae1 1510->1532 1533 6ea1ae6-6ea1b64 1510->1533 1512 6ea18b0 1511->1512 1513 6ea18b5-6ea192a 1511->1513 1512->1513 1513->1510 1532->1533 1537 6ea1b6b-6ea1b7c 1533->1537 1538 6ea1b66 1533->1538 1539 6ea1c09-6ea1ca2 1537->1539 1540 6ea1b82-6ea1b8c 1537->1540 1538->1537 1551 6ea1ca9-6ea1d21 1539->1551 1552 6ea1ca4 1539->1552 1541 6ea1b8e 1540->1541 1542 6ea1b93-6ea1c08 1540->1542 1541->1542 1542->1539 1558 6ea1d28-6ea1d39 1551->1558 1559 6ea1d23 1551->1559 1552->1551 1560 6ea1d3f-6ea1dd3 1558->1560 1561 6ea1e27-6ea1ebb 1558->1561 1559->1558 1575 6ea1dda-6ea1e26 1560->1575 1576 6ea1dd5 1560->1576 1570 6ea1fad-6ea1fb8 1561->1570 1571 6ea1ec1-6ea1fac 1561->1571 1573 6ea1fba 1570->1573 1574 6ea1fbf 1570->1574 1571->1570 1573->1574 1574->1467 1575->1561 1576->1575 1591->1454 1592->1454
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c5da495ed607ec66bbb0856a7bc89cb064cb2175986241a0046a45e9df31759
                                                    • Instruction ID: 8ca4665a64fcda03065230506ca5fbace3d7e7f353040e350732db70ccfcc402
                                                    • Opcode Fuzzy Hash: 8c5da495ed607ec66bbb0856a7bc89cb064cb2175986241a0046a45e9df31759
                                                    • Instruction Fuzzy Hash: 60826174E01228DFDB65DF69D894BDDBBB2BB89300F1081EA980DA7261DB745E85CF40

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1593 14bf007-14bf038 1594 14bf03a 1593->1594 1595 14bf03f-14bf0c1 1593->1595 1594->1595 1597 14bf127-14bf13d 1595->1597 1598 14bf13f-14bf189 call 14b0364 1597->1598 1599 14bf0c3-14bf0cc 1597->1599 1608 14bf18b-14bf1cc call 14b0384 1598->1608 1609 14bf1f4-14bf1f5 1598->1609 1600 14bf0ce 1599->1600 1601 14bf0d3-14bf11d call 14bbb4c 1599->1601 1600->1601 1610 14bf11f 1601->1610 1611 14bf124 1601->1611 1618 14bf1ee-14bf1ef 1608->1618 1619 14bf1ce-14bf1ec 1608->1619 1613 14bf1f6-14bf227 1609->1613 1610->1611 1611->1597 1617 14bf22e-14bf295 1613->1617 1625 14bf29b-14bf2bc 1617->1625 1626 14bfbe7-14bfc1d 1617->1626 1620 14bf1f0-14bf1f2 1618->1620 1619->1620 1620->1613 1629 14bfbc4-14bfbe0 1625->1629 1630 14bf2c1-14bf2ca 1629->1630 1631 14bfbe6 1629->1631 1632 14bf2cc 1630->1632 1633 14bf2d1-14bf337 call 14bb020 1630->1633 1631->1626 1632->1633 1638 14bf339 1633->1638 1639 14bf33e-14bf3c8 call 14bb030 1633->1639 1638->1639 1646 14bf3da-14bf3e1 1639->1646 1647 14bf3ca-14bf3d1 1639->1647 1650 14bf3e8-14bf3f5 1646->1650 1651 14bf3e3 1646->1651 1648 14bf3d8 1647->1648 1649 14bf3d3 1647->1649 1648->1650 1649->1648 1652 14bf3fc-14bf403 1650->1652 1653 14bf3f7 1650->1653 1651->1650 1654 14bf40a-14bf461 1652->1654 1655 14bf405 1652->1655 1653->1652 1658 14bf468-14bf47f 1654->1658 1659 14bf463 1654->1659 1655->1654 1660 14bf48a-14bf492 1658->1660 1661 14bf481-14bf488 1658->1661 1659->1658 1662 14bf493-14bf49d 1660->1662 1661->1662 1663 14bf49f 1662->1663 1664 14bf4a4-14bf4ad 1662->1664 1663->1664 1665 14bfb94-14bfb9a 1664->1665 1666 14bf4b2-14bf4be 1665->1666 1667 14bfba0-14bfbba 1665->1667 1668 14bf4c0 1666->1668 1669 14bf4c5-14bf4ca 1666->1669 1675 14bfbbc 1667->1675 1676 14bfbc1 1667->1676 1668->1669 1670 14bf50d-14bf50f 1669->1670 1671 14bf4cc-14bf4d8 1669->1671 1677 14bf515-14bf529 1670->1677 1673 14bf4da 1671->1673 1674 14bf4df-14bf4e4 1671->1674 1673->1674 1674->1670 1678 14bf4e6-14bf4f3 1674->1678 1675->1676 1676->1629 1679 14bf52f-14bf544 1677->1679 1680 14bfb72-14bfb7f 1677->1680 1681 14bf4fa-14bf50b 1678->1681 1682 14bf4f5 1678->1682 1683 14bf54b-14bf5d1 1679->1683 1684 14bf546 1679->1684 1685 14bfb80-14bfb8a 1680->1685 1681->1677 1682->1681 1692 14bf5fb 1683->1692 1693 14bf5d3-14bf5f9 1683->1693 1684->1683 1686 14bfb8c 1685->1686 1687 14bfb91 1685->1687 1686->1687 1687->1665 1694 14bf605-14bf625 1692->1694 1693->1694 1696 14bf62b-14bf635 1694->1696 1697 14bf7a4-14bf7a9 1694->1697 1698 14bf63c-14bf665 1696->1698 1699 14bf637 1696->1699 1700 14bf7ab-14bf7cb 1697->1700 1701 14bf80d-14bf80f 1697->1701 1703 14bf67f-14bf681 1698->1703 1704 14bf667-14bf671 1698->1704 1699->1698 1711 14bf7cd-14bf7f3 1700->1711 1712 14bf7f5 1700->1712 1702 14bf815-14bf835 1701->1702 1708 14bf83b-14bf845 1702->1708 1709 14bfb6c-14bfb6d 1702->1709 1707 14bf720-14bf72f 1703->1707 1705 14bf678-14bf67e 1704->1705 1706 14bf673 1704->1706 1705->1703 1706->1705 1713 14bf731 1707->1713 1714 14bf736-14bf73b 1707->1714 1715 14bf84c-14bf875 1708->1715 1716 14bf847 1708->1716 1717 14bfb6e-14bfb70 1709->1717 1718 14bf7ff-14bf80b 1711->1718 1712->1718 1713->1714 1719 14bf73d-14bf74d 1714->1719 1720 14bf765-14bf767 1714->1720 1721 14bf88f-14bf89d 1715->1721 1722 14bf877-14bf881 1715->1722 1716->1715 1717->1685 1718->1702 1725 14bf74f 1719->1725 1726 14bf754-14bf763 1719->1726 1727 14bf76d-14bf781 1720->1727 1723 14bf93c-14bf94b 1721->1723 1728 14bf888-14bf88e 1722->1728 1729 14bf883 1722->1729 1732 14bf94d 1723->1732 1733 14bf952-14bf957 1723->1733 1725->1726 1726->1727 1730 14bf787-14bf79f 1727->1730 1731 14bf686-14bf6a1 1727->1731 1728->1721 1729->1728 1730->1717 1736 14bf6a8-14bf712 1731->1736 1737 14bf6a3 1731->1737 1732->1733 1734 14bf959-14bf969 1733->1734 1735 14bf981-14bf983 1733->1735 1738 14bf96b 1734->1738 1739 14bf970-14bf97f 1734->1739 1740 14bf989-14bf99d 1735->1740 1756 14bf719-14bf71f 1736->1756 1757 14bf714 1736->1757 1737->1736 1738->1739 1739->1740 1741 14bf9a3-14bfa0c call 14b59d0 * 2 1740->1741 1742 14bf8a2-14bf8bd 1740->1742 1754 14bfa0e-14bfa10 1741->1754 1755 14bfa15-14bfb68 1741->1755 1744 14bf8bf 1742->1744 1745 14bf8c4-14bf92e 1742->1745 1744->1745 1761 14bf930 1745->1761 1762 14bf935-14bf93b 1745->1762 1758 14bfb69-14bfb6a 1754->1758 1755->1758 1756->1707 1757->1756 1758->1667 1761->1762 1762->1723
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b086660635cbf2a061fffcea6ac58aa377fce4751910dfe3c230ba043f94261b
                                                    • Instruction ID: 32c2c043ad8466d2ba62d7c73741305cf99f7c75e181b85447198312571d9ed1
                                                    • Opcode Fuzzy Hash: b086660635cbf2a061fffcea6ac58aa377fce4751910dfe3c230ba043f94261b
                                                    • Instruction Fuzzy Hash: F672BF74E012698FDB65CF69C984BDDBBB2BB49300F1491EAD40CA7261DB349E86CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 459c70048325360c6cea163381cef64681ef0389ecde36a89a46886fbb68a46d
                                                    • Instruction ID: f567363c1cb40881ae59faceabc5da3efe1fa1dc672024de340ed4113f8c48e4
                                                    • Opcode Fuzzy Hash: 459c70048325360c6cea163381cef64681ef0389ecde36a89a46886fbb68a46d
                                                    • Instruction Fuzzy Hash: 40128170A002198FDB18DFA9C894BAEBBF6BF88300F15856AE505DB3A5DB349D45CB50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2362 14b6730-14b6766 2489 14b6768 call 14b6108 2362->2489 2490 14b6768 call 14b6730 2362->2490 2491 14b6768 call 14b6880 2362->2491 2363 14b676e-14b6774 2364 14b6776-14b677a 2363->2364 2365 14b67c4-14b67c8 2363->2365 2366 14b6789-14b6790 2364->2366 2367 14b677c-14b6781 2364->2367 2368 14b67ca-14b67d9 2365->2368 2369 14b67df-14b67f3 2365->2369 2370 14b6866-14b68a3 2366->2370 2371 14b6796-14b679d 2366->2371 2367->2366 2372 14b67db-14b67dd 2368->2372 2373 14b6805-14b680f 2368->2373 2374 14b67fb-14b6802 2369->2374 2487 14b67f5 call 14b9858 2369->2487 2488 14b67f5 call 14b9851 2369->2488 2384 14b68ae-14b68ce 2370->2384 2385 14b68a5-14b68ab 2370->2385 2371->2365 2375 14b679f-14b67a3 2371->2375 2372->2374 2376 14b6819-14b681d 2373->2376 2377 14b6811-14b6817 2373->2377 2378 14b67b2-14b67b9 2375->2378 2379 14b67a5-14b67aa 2375->2379 2381 14b6825-14b685f 2376->2381 2382 14b681f 2376->2382 2377->2381 2378->2370 2383 14b67bf-14b67c2 2378->2383 2379->2378 2381->2370 2382->2381 2383->2374 2390 14b68d0 2384->2390 2391 14b68d5-14b68dc 2384->2391 2385->2384 2393 14b6c64-14b6c6d 2390->2393 2394 14b68de-14b68e9 2391->2394 2395 14b68ef-14b6902 2394->2395 2396 14b6c75-14b6c9e 2394->2396 2401 14b6918-14b6933 2395->2401 2402 14b6904-14b6912 2395->2402 2405 14b6957-14b695a 2401->2405 2406 14b6935-14b693b 2401->2406 2402->2401 2407 14b6bec-14b6bf3 2402->2407 2411 14b6960-14b6963 2405->2411 2412 14b6ab4-14b6aba 2405->2412 2408 14b693d 2406->2408 2409 14b6944-14b6947 2406->2409 2407->2393 2410 14b6bf5-14b6bf7 2407->2410 2408->2409 2408->2412 2413 14b697a-14b6980 2408->2413 2414 14b6ba6-14b6ba9 2408->2414 2409->2413 2415 14b6949-14b694c 2409->2415 2416 14b6bf9-14b6bfe 2410->2416 2417 14b6c06-14b6c0c 2410->2417 2411->2412 2419 14b6969-14b696f 2411->2419 2412->2414 2418 14b6ac0-14b6ac5 2412->2418 2424 14b6982-14b6984 2413->2424 2425 14b6986-14b6988 2413->2425 2426 14b6baf-14b6bb5 2414->2426 2427 14b6c70 2414->2427 2420 14b6952 2415->2420 2421 14b69e6-14b69ec 2415->2421 2416->2417 2417->2396 2422 14b6c0e-14b6c13 2417->2422 2418->2414 2419->2412 2423 14b6975 2419->2423 2420->2414 2421->2414 2430 14b69f2-14b69f8 2421->2430 2428 14b6c58-14b6c5b 2422->2428 2429 14b6c15-14b6c1a 2422->2429 2423->2414 2431 14b6992-14b699b 2424->2431 2425->2431 2432 14b6bda-14b6bde 2426->2432 2433 14b6bb7-14b6bbf 2426->2433 2427->2396 2428->2427 2435 14b6c5d-14b6c62 2428->2435 2429->2427 2436 14b6c1c 2429->2436 2437 14b69fa-14b69fc 2430->2437 2438 14b69fe-14b6a00 2430->2438 2440 14b69ae-14b69d6 2431->2440 2441 14b699d-14b69a8 2431->2441 2432->2407 2434 14b6be0-14b6be6 2432->2434 2433->2396 2439 14b6bc5-14b6bd4 2433->2439 2434->2394 2434->2407 2435->2393 2435->2410 2442 14b6c23-14b6c28 2436->2442 2443 14b6a0a-14b6a21 2437->2443 2438->2443 2439->2401 2439->2432 2461 14b6aca-14b6b00 2440->2461 2462 14b69dc-14b69e1 2440->2462 2441->2414 2441->2440 2446 14b6c4a-14b6c4c 2442->2446 2447 14b6c2a-14b6c2c 2442->2447 2454 14b6a4c-14b6a73 2443->2454 2455 14b6a23-14b6a3c 2443->2455 2446->2427 2450 14b6c4e-14b6c51 2446->2450 2451 14b6c3b-14b6c41 2447->2451 2452 14b6c2e-14b6c33 2447->2452 2450->2428 2451->2396 2453 14b6c43-14b6c48 2451->2453 2452->2451 2453->2446 2457 14b6c1e-14b6c21 2453->2457 2454->2427 2467 14b6a79-14b6a7c 2454->2467 2455->2461 2465 14b6a42-14b6a47 2455->2465 2457->2427 2457->2442 2468 14b6b0d-14b6b15 2461->2468 2469 14b6b02-14b6b06 2461->2469 2462->2461 2465->2461 2467->2427 2470 14b6a82-14b6aab 2467->2470 2468->2427 2473 14b6b1b-14b6b20 2468->2473 2471 14b6b08-14b6b0b 2469->2471 2472 14b6b25-14b6b29 2469->2472 2470->2461 2485 14b6aad-14b6ab2 2470->2485 2471->2468 2471->2472 2474 14b6b2b-14b6b31 2472->2474 2475 14b6b48-14b6b4c 2472->2475 2473->2414 2474->2475 2477 14b6b33-14b6b3b 2474->2477 2478 14b6b4e-14b6b54 2475->2478 2479 14b6b56-14b6b75 call 14b6e58 2475->2479 2477->2427 2480 14b6b41-14b6b46 2477->2480 2478->2479 2482 14b6b7b-14b6b7f 2478->2482 2479->2482 2480->2414 2482->2414 2483 14b6b81-14b6b9d 2482->2483 2483->2414 2485->2461 2487->2374 2488->2374 2489->2363 2490->2363 2491->2363
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c1a444c3ecbbad36b58da8d19780a5853887aae9a970df3a7de185d7e3065633
                                                    • Instruction ID: d0f63a9b29f0fb2e9ffa7c068b3bf01840f96579d30cfd0701e6bc21c4b558c2
                                                    • Opcode Fuzzy Hash: c1a444c3ecbbad36b58da8d19780a5853887aae9a970df3a7de185d7e3065633
                                                    • Instruction Fuzzy Hash: DC023971A00219DFDB15CFA9C984AEEBBB6FF89304F16846AE505AB271D730D941CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2492 14b3578-14b358d 2493 14b358f-14b3591 2492->2493 2494 14b3596-14b35a6 2492->2494 2495 14b3834-14b383b 2493->2495 2496 14b35a8 2494->2496 2497 14b35ad-14b35bd 2494->2497 2496->2495 2499 14b381b-14b3829 2497->2499 2500 14b35c3-14b35d1 2497->2500 2503 14b382b-14b382f call 14b02c8 2499->2503 2504 14b383c-14b38f8 2499->2504 2500->2504 2505 14b35d7 2500->2505 2503->2495 2574 14b38fa-14b38fc 2504->2574 2575 14b3905-14b3907 2504->2575 2505->2504 2506 14b3668-14b3689 2505->2506 2507 14b37cf-14b37ea call 14b02d8 2505->2507 2508 14b380f-14b3819 2505->2508 2509 14b368e-14b36af 2505->2509 2510 14b37ec-14b380d call 14b2060 2505->2510 2511 14b3642-14b3663 2505->2511 2512 14b37a1-14b37cd 2505->2512 2513 14b3707-14b372f 2505->2513 2514 14b361b-14b363d 2505->2514 2515 14b36da-14b3702 2505->2515 2516 14b35de-14b35f0 2505->2516 2517 14b3776-14b379c 2505->2517 2518 14b35f5-14b3616 2505->2518 2519 14b36b4-14b36d5 2505->2519 2520 14b3734-14b3771 2505->2520 2506->2495 2507->2495 2508->2495 2509->2495 2510->2495 2511->2495 2512->2495 2513->2495 2514->2495 2515->2495 2516->2495 2517->2495 2518->2495 2519->2495 2520->2495 2576 14b3908-14b3922 2574->2576 2577 14b38fe-14b3901 2574->2577 2575->2576 2578 14b3929-14b3a31 call 14b0828 call 14b1e28 call 14b1e38 call 14b1e48 call 14b02e4 2576->2578 2579 14b3924 2576->2579 2577->2575 2597 14b3a37-14b3ac7 2578->2597 2579->2578
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c1366489fe4abbf87a6199c8dd04d158490d6dc61191e7c522132b502f27eae3
                                                    • Instruction ID: 0bd70336dba0ca0315547eaa864ef56c85670f8f456d389b8d823666855bf2dc
                                                    • Opcode Fuzzy Hash: c1366489fe4abbf87a6199c8dd04d158490d6dc61191e7c522132b502f27eae3
                                                    • Instruction Fuzzy Hash: AFF15D74E012489FDB18DFB6D4945AEBBF2FF88710B14856EE806AB364DB359C02CB51

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 3034 14bb328-14bb33b 3035 14bb47a-14bb481 3034->3035 3036 14bb341-14bb34a 3034->3036 3037 14bb350-14bb354 3036->3037 3038 14bb484 3036->3038 3039 14bb36e-14bb375 3037->3039 3040 14bb356 3037->3040 3041 14bb489 3038->3041 3039->3035 3043 14bb37b-14bb388 3039->3043 3042 14bb359-14bb364 3040->3042 3045 14bb48a-14bb48c 3041->3045 3042->3038 3044 14bb36a-14bb36c 3042->3044 3043->3035 3047 14bb38e-14bb3a1 3043->3047 3044->3039 3044->3042 3048 14bb4ff-14bb520 3045->3048 3049 14bb48e-14bb4b0 3045->3049 3050 14bb3a3 3047->3050 3051 14bb3a6-14bb3ae 3047->3051 3052 14bb522 3048->3052 3053 14bb527-14bb604 call 14b3908 call 14b3428 3048->3053 3057 14bb4dc 3049->3057 3058 14bb4b2-14bb4ca 3049->3058 3050->3051 3055 14bb41b-14bb41d 3051->3055 3056 14bb3b0-14bb3b6 3051->3056 3052->3053 3099 14bb60b-14bb62c call 14b4dc8 3053->3099 3100 14bb606 3053->3100 3055->3035 3059 14bb41f-14bb425 3055->3059 3056->3055 3060 14bb3b8-14bb3be 3056->3060 3062 14bb4de-14bb4e2 3057->3062 3072 14bb4cc-14bb4d1 3058->3072 3073 14bb4d3-14bb4d6 3058->3073 3059->3035 3063 14bb427-14bb431 3059->3063 3060->3041 3064 14bb3c4-14bb3dc 3060->3064 3063->3041 3066 14bb433-14bb44b 3063->3066 3080 14bb409-14bb40c 3064->3080 3081 14bb3de-14bb3e4 3064->3081 3085 14bb44d-14bb453 3066->3085 3086 14bb470-14bb473 3066->3086 3072->3062 3076 14bb4d8-14bb4da 3073->3076 3077 14bb4e3-14bb4f9 3073->3077 3076->3057 3076->3058 3077->3045 3091 14bb4fb-14bb4fe 3077->3091 3080->3038 3083 14bb40e-14bb411 3080->3083 3081->3041 3087 14bb3ea-14bb3fe 3081->3087 3083->3038 3089 14bb413-14bb419 3083->3089 3085->3041 3092 14bb455-14bb469 3085->3092 3086->3038 3088 14bb475-14bb478 3086->3088 3087->3041 3096 14bb404 3087->3096 3088->3035 3088->3063 3089->3055 3089->3056 3091->3048 3092->3041 3097 14bb46b 3092->3097 3096->3080 3097->3086 3102 14bb631-14bb63c 3099->3102 3100->3099 3103 14bb63e 3102->3103 3104 14bb643-14bb647 3102->3104 3103->3104 3105 14bb649-14bb64a 3104->3105 3106 14bb64c-14bb653 3104->3106 3109 14bb66b-14bb6af 3105->3109 3107 14bb65a-14bb668 3106->3107 3108 14bb655 3106->3108 3107->3109 3108->3107 3113 14bb715-14bb72c 3109->3113 3115 14bb72e-14bb753 3113->3115 3116 14bb6b1-14bb6c7 3113->3116 3123 14bb76b 3115->3123 3124 14bb755-14bb76a 3115->3124 3120 14bb6c9-14bb6d5 3116->3120 3121 14bb6f1 3116->3121 3125 14bb6df-14bb6e5 3120->3125 3126 14bb6d7-14bb6dd 3120->3126 3122 14bb6f7-14bb714 3121->3122 3122->3113 3124->3123 3127 14bb6ef 3125->3127 3126->3127 3127->3122
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7d58c0fa1424a3289f8707e7bd8fdfad1869e7c6c818ea50e127895f008a1d41
                                                    • Instruction ID: c296c8fc0c9ec7a5698d4cc3e3def252a7b456277786b7ef8ddc8b19816f90d0
                                                    • Opcode Fuzzy Hash: 7d58c0fa1424a3289f8707e7bd8fdfad1869e7c6c818ea50e127895f008a1d41
                                                    • Instruction Fuzzy Hash: 11F1FC75A00618CFDB15CFA9C994A9EBBB1FF49310F15816AE809AB372DB349C41CF61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 3280 6ea8608-6ea8628 3281 6ea862a 3280->3281 3282 6ea862f-6ea86f1 3280->3282 3281->3282 3287 6ea8aba-6ea8bb8 3282->3287 3288 6ea86f7-6ea8735 3282->3288 3291 6ea8bba-6ea8bbf 3287->3291 3292 6ea8bc0-6ea8bc6 3287->3292 3339 6ea8737 call 5d87d90 3288->3339 3340 6ea8737 call 5d88174 3288->3340 3291->3292 3295 6ea873c-6ea875e 3297 6ea8760 3295->3297 3298 6ea8765-6ea876e 3295->3298 3297->3298 3299 6ea8aad-6ea8ab3 3298->3299 3300 6ea8ab9 3299->3300 3301 6ea8773-6ea880b 3299->3301 3300->3287 3306 6ea88e3-6ea8944 3301->3306 3307 6ea8811-6ea884d 3301->3307 3318 6ea8945-6ea899a 3306->3318 3341 6ea8853 call 6ea8ec1 3307->3341 3342 6ea8853 call 6ea8c57 3307->3342 3314 6ea8859-6ea8894 3316 6ea88de-6ea88e1 3314->3316 3317 6ea8896-6ea88b3 3314->3317 3316->3318 3321 6ea88b9-6ea88dd 3317->3321 3323 6ea89a0-6ea8a90 3318->3323 3324 6ea8a91-6ea8aa3 3318->3324 3321->3316 3323->3324 3325 6ea8aaa 3324->3325 3326 6ea8aa5 3324->3326 3325->3299 3326->3325 3339->3295 3340->3295 3341->3314 3342->3314
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9eeb4bf031f357c5c72b5540ae55442146bd892aca38ab5461bb66456e02f745
                                                    • Instruction ID: 3b9b855b163eb38256dda9a450428cfe7ccd3587e22789335280fcefcc594ce4
                                                    • Opcode Fuzzy Hash: 9eeb4bf031f357c5c72b5540ae55442146bd892aca38ab5461bb66456e02f745
                                                    • Instruction Fuzzy Hash: 65E1BF74E01218CFEB64DFA5D944B9DBBB2FF88304F2081AAD408AB395DB755A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ec5e97df869d123a80f33e06a1f95f790ddbffc743ddc75a690baccd9ccfc94
                                                    • Instruction ID: 3e3ef7421f94380d5e03998e6e5e8ff20053eb92a31ac5a67c787faf499a5f4d
                                                    • Opcode Fuzzy Hash: 9ec5e97df869d123a80f33e06a1f95f790ddbffc743ddc75a690baccd9ccfc94
                                                    • Instruction Fuzzy Hash: 36A1A474E012188FEB68CF6AD944B9DBBF2BF89300F14D1AAD40DA7250DB745A85CF10
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 32966f753e247426a11e65ea505002860eebd12a5f019c3695029e36e6ab1c16
                                                    • Instruction ID: 23a2d42dd996e21557faf4cc6cb6860bd7311f971e66ea6ad278bf6bc0953dae
                                                    • Opcode Fuzzy Hash: 32966f753e247426a11e65ea505002860eebd12a5f019c3695029e36e6ab1c16
                                                    • Instruction Fuzzy Hash: 00A1A474E012188FEB68CF6AC944B9DBBF2BF89300F14D1AAD40DAB254DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 67c13f5558b8cb969512052205b05eca7921788e83c102e19a44dd49dc9f4ca2
                                                    • Instruction ID: f5549332c43af277d3945b95db89e6930ae8f4bd5eeb0d23e4634201a69cd588
                                                    • Opcode Fuzzy Hash: 67c13f5558b8cb969512052205b05eca7921788e83c102e19a44dd49dc9f4ca2
                                                    • Instruction Fuzzy Hash: 29A1A275E013188FEB68CF6AC944B9DBBF2BB89300F14D1AAD40DA7254DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bcdf9b8787d25a23c117fda2486dc5c7b57d82006974043d7ed1a611dea553be
                                                    • Instruction ID: 54e99beb205a9f02073bcf259b083db1cecba80e49cf7b5573c51d78496f18fa
                                                    • Opcode Fuzzy Hash: bcdf9b8787d25a23c117fda2486dc5c7b57d82006974043d7ed1a611dea553be
                                                    • Instruction Fuzzy Hash: CAA1B374E012288FEB68CF6AC944B9DBBF2BF89300F14D1AAD40DA7255DB345A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a2075cff7fabbd52b931df649155fe4df6685abe50add467aa96ca3f81aff56e
                                                    • Instruction ID: 1395ce0ff7249b6410c821eff4e1d711e1bc0275f21ac5a8c3bcdeb254e3d590
                                                    • Opcode Fuzzy Hash: a2075cff7fabbd52b931df649155fe4df6685abe50add467aa96ca3f81aff56e
                                                    • Instruction Fuzzy Hash: 62A1B375E01228CFEB68CF6AC944B9DBBF2AF89304F14D0AAD40DA7250DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f0aba7b43db1520ae8d57f5d2b4d4ed4eebd3d7fc76db8dc3272c4b766091c66
                                                    • Instruction ID: 5af7e08151cdd93adba2fce8cc79dcc5f31ec9ccea218292275df61cca34bc2f
                                                    • Opcode Fuzzy Hash: f0aba7b43db1520ae8d57f5d2b4d4ed4eebd3d7fc76db8dc3272c4b766091c66
                                                    • Instruction Fuzzy Hash: 4CA1B475E012188FEB68CF6AD944B9DBBF2BF89300F14D1AAD40DAB254DB345A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f0542d39a070839d7ea6cb35a3b991c42bd440b30eea7ecee6edff75934ac08
                                                    • Instruction ID: c86497961232ae638d0f127bb1ca5e8c33fa84ba4713136ec0872a1c7439ca96
                                                    • Opcode Fuzzy Hash: 8f0542d39a070839d7ea6cb35a3b991c42bd440b30eea7ecee6edff75934ac08
                                                    • Instruction Fuzzy Hash: A5A19375E013188FEB68CF6AC944B9DFBF2AF89300F14D1AAD409AB254DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a67919a6456698bef5c6b2c930b4c22387e67e7eb0b29402b25d12a6420ef00f
                                                    • Instruction ID: 2c0f5f4d4e1bba0f57790d7c59cdc4fd4ce8b3d621e8a58a1a826b9a0e610b97
                                                    • Opcode Fuzzy Hash: a67919a6456698bef5c6b2c930b4c22387e67e7eb0b29402b25d12a6420ef00f
                                                    • Instruction Fuzzy Hash: 3DA1A374E01228CFEB68CF6AC944B9DBBF2BF89300F14D1AAD409A7255DB745A85CF10
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3128a8401e372ba6f4e9ecb2d72e2df4b753dcf9a4ec30c16fff506c94dfa645
                                                    • Instruction ID: 6a5b28c3256286c2506728c24777afc59012984413815de1be30ad596fe0057f
                                                    • Opcode Fuzzy Hash: 3128a8401e372ba6f4e9ecb2d72e2df4b753dcf9a4ec30c16fff506c94dfa645
                                                    • Instruction Fuzzy Hash: 4AA1A175E012288FEB68CF6AC944B9DFBF2AF89300F14D1AAD40DA7250DB345A85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7604c088efeb5437b336b147afe14eee3ed952eb15d45a3c6cb41baceb79dc61
                                                    • Instruction ID: 068fb1eedcc74892062457969c67cf130311ac283d4c8127525ca12a4252de3a
                                                    • Opcode Fuzzy Hash: 7604c088efeb5437b336b147afe14eee3ed952eb15d45a3c6cb41baceb79dc61
                                                    • Instruction Fuzzy Hash: D391A474E01218CFDB54DFAAD994ADDBBF2BF89300F14906AE409AB365DB709942CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 63837ff74afffb444d913842743961e2604970fbdd49c9fd7afab3bb6804cedd
                                                    • Instruction ID: 86549c8e0b405080cba6ba2731edb276f6e506728e6c2effc3db5a1de9863e2a
                                                    • Opcode Fuzzy Hash: 63837ff74afffb444d913842743961e2604970fbdd49c9fd7afab3bb6804cedd
                                                    • Instruction Fuzzy Hash: FE91C574E00218CFDB14DFAAD994A9DBBF2FF89300F24916AD819AB365DB705942CF11
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a54e1f8e77a065de5d61faeed4bd984c6aaf3bd11e77e1702f76845fdbf72850
                                                    • Instruction ID: d31ea6f08be62f8a9b799b99fb6486d8219078b98a333387a92dcb04917736c0
                                                    • Opcode Fuzzy Hash: a54e1f8e77a065de5d61faeed4bd984c6aaf3bd11e77e1702f76845fdbf72850
                                                    • Instruction Fuzzy Hash: 6291A474E00218CFDB14CFAAD894A9DBBF2FF89300F14816AD409AB365DB749942CF21
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21f7c7429ea7ce0ae1b209e8c348581ba1120b9da725f78f407c7d39d7d89cde
                                                    • Instruction ID: 1b84bbe04b1f7f23e389448c5eb9ae8c4f299719884657994155fa17fd9325a0
                                                    • Opcode Fuzzy Hash: 21f7c7429ea7ce0ae1b209e8c348581ba1120b9da725f78f407c7d39d7d89cde
                                                    • Instruction Fuzzy Hash: A681C774E00218DFEB14DFAAD994A9DBBF2BF89300F14906AE419AB365DB705942CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 853f932f33786bed08098db740b89dc9d8466bfbbeebe280100beaead821e12d
                                                    • Instruction ID: 9bcde2e6b0c1efa805574720f46239223c0f4265b6a0e70052a1381a86287047
                                                    • Opcode Fuzzy Hash: 853f932f33786bed08098db740b89dc9d8466bfbbeebe280100beaead821e12d
                                                    • Instruction Fuzzy Hash: 1F81B574E00218CFDB54DFAAD984A9DBBF2FF89300F14806AD409AB365DB749981CF61
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 64d1f58ce947100a1521c413ec3bf041e190e8b5d245694fc096c1a303edd7dc
                                                    • Instruction ID: f2fe9defce722dfedb62664b0c481e2a7dd6a72e2ccbac5dcf7ceef67b748145
                                                    • Opcode Fuzzy Hash: 64d1f58ce947100a1521c413ec3bf041e190e8b5d245694fc096c1a303edd7dc
                                                    • Instruction Fuzzy Hash: 4281DE74E01318CFDB58DFAAD844BAEBBB2BF89300F20916AD419AB394DB305945CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39a1c3261a4de64752c854bed697aa60fd697c48ff7a766734cb525a8cbd6ec2
                                                    • Instruction ID: e951df622965ce543e85934bf8ff521c441cfedea7abe0e9fb50c227cbb3a10c
                                                    • Opcode Fuzzy Hash: 39a1c3261a4de64752c854bed697aa60fd697c48ff7a766734cb525a8cbd6ec2
                                                    • Instruction Fuzzy Hash: 01819674E00218CFDB14DFAAD994A9DBBF2BF88300F14C06AE819AB365DB745942CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5593b93cc90ac83bfe311cf0c0567dab1dab525917e939c6a504c4794e9a7b67
                                                    • Instruction ID: 85f4bcae6f0d9a5e5ef9520ce073463783d98bcb15688893ad751790a2b24c2f
                                                    • Opcode Fuzzy Hash: 5593b93cc90ac83bfe311cf0c0567dab1dab525917e939c6a504c4794e9a7b67
                                                    • Instruction Fuzzy Hash: BF81A474E00218DFDB54CFAAD994A9DBBF2FF88300F15806AD819AB365DB749945CF10
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6e49646ead60ac12c0a97a45b90d0b00710a90ce84d1fab0db3e1e60f2ae27cf
                                                    • Instruction ID: bf0490657a7d703c1e07bd01b5f19cbeceb3e5d10d64c85d3f29ee818f738d15
                                                    • Opcode Fuzzy Hash: 6e49646ead60ac12c0a97a45b90d0b00710a90ce84d1fab0db3e1e60f2ae27cf
                                                    • Instruction Fuzzy Hash: CE819F74E412299FEB65DF69DC54BEDBBB2BB89310F1081EAD819A7250DB305E818F40
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 450829a26deb090f1b4f37d0fb4045444e770a820234c149426756ae87dac2c3
                                                    • Instruction ID: 0e2da9e74709f2e97ab49f324f52122a8ec9f8ad6c6881003709752df294f7c8
                                                    • Opcode Fuzzy Hash: 450829a26deb090f1b4f37d0fb4045444e770a820234c149426756ae87dac2c3
                                                    • Instruction Fuzzy Hash: FA71A470E01618CFEB68CF6AC944B9DFAF2AF89304F14C0AAD40DA7254DB345A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10ea1281eb718322f906682aeae2370a5716a86788fe65698c602a6a603d0776
                                                    • Instruction ID: 3a6bc601e332ac280b9c7e576009ff4afeef23199a4c25a67239d224a494b147
                                                    • Opcode Fuzzy Hash: 10ea1281eb718322f906682aeae2370a5716a86788fe65698c602a6a603d0776
                                                    • Instruction Fuzzy Hash: 8F718271E01628CFEB68CF6AC944B9DFAF2AF89300F14C0AAD40DA7254DB345A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9198f18f2774cbe542d31595f04ff7a755d318f79ccc5f7e5e54b53589e410d6
                                                    • Instruction ID: 4d2efc8335f56faf6731cfcc5cc8be21d42c6c3a1863374e949199ae5c8e9a41
                                                    • Opcode Fuzzy Hash: 9198f18f2774cbe542d31595f04ff7a755d318f79ccc5f7e5e54b53589e410d6
                                                    • Instruction Fuzzy Hash: 6641B6B4D012088BEB58DFAAD8447DEBBB2BF88304F14D16AC418BB294DB755946CF64
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6306ff6ced642abed4340f0a2272c70303aea8158f3c44e941916cba971eea66
                                                    • Instruction ID: dacacd04c1b7a1eac5cc0f88613785d47f912382be2839008e5596e3b9783ac7
                                                    • Opcode Fuzzy Hash: 6306ff6ced642abed4340f0a2272c70303aea8158f3c44e941916cba971eea66
                                                    • Instruction Fuzzy Hash: 0D419971E016188BEB58CF6BDD447DAFAF3AFC8304F14D0AAC50CAA264DB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b4f34aab404f849e27a8767014b52213382f87dce0fa8a263315777a8e6deafa
                                                    • Instruction ID: 5d807608006c13b01dacf696e99fa5887d0f81a20438f1829c9f2356828826db
                                                    • Opcode Fuzzy Hash: b4f34aab404f849e27a8767014b52213382f87dce0fa8a263315777a8e6deafa
                                                    • Instruction Fuzzy Hash: AE419DB5E016188BEB58CF6BC9457CAFAF3AFC9310F14C1AAD50CA6264DB740A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd502983385c774addbf9194b40982a579dc30e437184b14b43200497870e40e
                                                    • Instruction ID: 11b4f81c82669b8a8fc825e9a942a637ee5244c1b61f68e3c1459e0ae3038e1b
                                                    • Opcode Fuzzy Hash: fd502983385c774addbf9194b40982a579dc30e437184b14b43200497870e40e
                                                    • Instruction Fuzzy Hash: D54158B1E016188BEB58CF6BD9457CAFAF3AFC9304F14C1AAC50CA6264DB750A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0a71c34fe4c890497ba0d65826c63a570992f3d6cc25418e8b6390a07561ff51
                                                    • Instruction ID: 5a2c23043b4f95524e13f6b789f4342c52971a7097ae7c231ecc6e7124eff3a6
                                                    • Opcode Fuzzy Hash: 0a71c34fe4c890497ba0d65826c63a570992f3d6cc25418e8b6390a07561ff51
                                                    • Instruction Fuzzy Hash: 1E4149B1E016188BEB58CF6BDD457CAFAF3AFC9304F14C1AAC50CA6264DB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa0fffb4c50faabd63dcf4c53012f58b2a72ad10bb1cd729ebc6700d096a2071
                                                    • Instruction ID: 165f9164dff15476cd3bfcccf44334be330ac4f35e62df1ba905d6e7106aa47a
                                                    • Opcode Fuzzy Hash: aa0fffb4c50faabd63dcf4c53012f58b2a72ad10bb1cd729ebc6700d096a2071
                                                    • Instruction Fuzzy Hash: C74148B1E016188BEB58CF6BD9457DAFAF3AFC9304F14C1AAC50CA6264DB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 87afa4c0e36076a2a5818bdbc06d938fc9fd1532804073d2c9dad9056378da57
                                                    • Instruction ID: 1a9b11847b61b1c16c43079e71350925bfcdd22f0f54d5889fd95086e8fd5b63
                                                    • Opcode Fuzzy Hash: 87afa4c0e36076a2a5818bdbc06d938fc9fd1532804073d2c9dad9056378da57
                                                    • Instruction Fuzzy Hash: 6D4148B1E016188FEB58CF6BD9457DAFAF3AFC9304F14C1AAC50CA6264DB740A858F51

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1139 5d88174 1140 5d88233-5d88244 1139->1140 1141 5d8824b-5d88254 1140->1141 1142 5d88246 1140->1142 1144 5d8825a-5d8826d 1141->1144 1145 5d8802b-5d88050 1141->1145 1142->1141 1146 5d8826f 1144->1146 1147 5d88274-5d8828f 1144->1147 1148 5d88052 1145->1148 1149 5d88057-5d8808e 1145->1149 1146->1147 1150 5d88291 1147->1150 1151 5d88296-5d882aa 1147->1151 1148->1149 1157 5d88090 1149->1157 1158 5d88095-5d880c7 1149->1158 1150->1151 1154 5d882ac 1151->1154 1155 5d882b1-5d882c7 LdrInitializeThunk 1151->1155 1154->1155 1159 5d882c9-5d883c6 1155->1159 1157->1158 1164 5d880c9-5d880ee 1158->1164 1165 5d8812b-5d8813e 1158->1165 1162 5d883c8-5d883cd 1159->1162 1163 5d883ce-5d883d8 1159->1163 1162->1163 1166 5d880f0 1164->1166 1167 5d880f5-5d88123 1164->1167 1169 5d88140 1165->1169 1170 5d88145-5d8816a 1165->1170 1166->1167 1167->1165 1169->1170 1173 5d88179-5d881b1 1170->1173 1174 5d8816c-5d8816d 1170->1174 1175 5d881b8-5d88219 call 5d87b70 1173->1175 1176 5d881b3 1173->1176 1174->1144 1182 5d8821b 1175->1182 1183 5d88220-5d88232 1175->1183 1176->1175 1182->1183 1183->1140
                                                    APIs
                                                    • LdrInitializeThunk.NTDLL(00000000), ref: 05D882B6
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 4b04b7cef68cf683734b96b1eac37bb5bb8166c0a5d7a6ad180462b723976c0a
                                                    • Instruction ID: 71f70a1088d379b803033b06d542ce6d6bce45d74c37a612d0bc97c0834d12de
                                                    • Opcode Fuzzy Hash: 4b04b7cef68cf683734b96b1eac37bb5bb8166c0a5d7a6ad180462b723976c0a
                                                    • Instruction Fuzzy Hash: B2116A74E002199FDB04EBA8D884FBDB7F6FB88304F948666E844E7251D771E942DB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1775 14b77f0-14b7cde 1850 14b8230-14b8265 1775->1850 1851 14b7ce4-14b7cf4 1775->1851 1855 14b8271-14b828f 1850->1855 1856 14b8267-14b826c 1850->1856 1851->1850 1852 14b7cfa-14b7d0a 1851->1852 1852->1850 1854 14b7d10-14b7d20 1852->1854 1854->1850 1857 14b7d26-14b7d36 1854->1857 1869 14b8291-14b829b 1855->1869 1870 14b8306-14b8312 1855->1870 1858 14b8356-14b835b 1856->1858 1857->1850 1859 14b7d3c-14b7d4c 1857->1859 1859->1850 1860 14b7d52-14b7d62 1859->1860 1860->1850 1862 14b7d68-14b7d78 1860->1862 1862->1850 1863 14b7d7e-14b7d8e 1862->1863 1863->1850 1865 14b7d94-14b7da4 1863->1865 1865->1850 1866 14b7daa-14b7dba 1865->1866 1866->1850 1868 14b7dc0-14b822f 1866->1868 1869->1870 1874 14b829d-14b82a9 1869->1874 1875 14b8329-14b8335 1870->1875 1876 14b8314-14b8320 1870->1876 1881 14b82ab-14b82b6 1874->1881 1882 14b82ce-14b82d1 1874->1882 1885 14b834c-14b834e 1875->1885 1886 14b8337-14b8343 1875->1886 1876->1875 1883 14b8322-14b8327 1876->1883 1881->1882 1896 14b82b8-14b82c2 1881->1896 1887 14b82e8-14b82f4 1882->1887 1888 14b82d3-14b82df 1882->1888 1883->1858 1885->1858 1966 14b8350 call 14b87e9 1885->1966 1886->1885 1894 14b8345-14b834a 1886->1894 1890 14b835c-14b837e 1887->1890 1891 14b82f6-14b82fd 1887->1891 1888->1887 1898 14b82e1-14b82e6 1888->1898 1901 14b838e 1890->1901 1902 14b8380 1890->1902 1891->1890 1895 14b82ff-14b8304 1891->1895 1894->1858 1895->1858 1896->1882 1907 14b82c4-14b82c9 1896->1907 1898->1858 1906 14b8390-14b8391 1901->1906 1902->1901 1904 14b8387-14b838c 1902->1904 1904->1906 1907->1858 1966->1858
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9418bf5968b22702287f437529e6652c5ae707e9d6e96fd104fd3ad6e327a2e1
                                                    • Instruction ID: 085a270f863b18474db516280871d06075e751e37a9c62952cc67bd6dc916367
                                                    • Opcode Fuzzy Hash: 9418bf5968b22702287f437529e6652c5ae707e9d6e96fd104fd3ad6e327a2e1
                                                    • Instruction Fuzzy Hash: C9522134A00219CFEB549BE5C860B9E7B72FB94340F1080AED60A6B365DF359E85DF61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2216 14b6e58-14b6e8d 2217 14b72bc-14b72c0 2216->2217 2218 14b6e93-14b6eb6 2216->2218 2219 14b72d9-14b72e7 2217->2219 2220 14b72c2-14b72d6 2217->2220 2227 14b6ebc-14b6ec9 2218->2227 2228 14b6f64-14b6f68 2218->2228 2225 14b72e9-14b72fe 2219->2225 2226 14b7358-14b736d 2219->2226 2233 14b7300-14b7303 2225->2233 2234 14b7305-14b7312 2225->2234 2235 14b736f-14b7372 2226->2235 2236 14b7374-14b7381 2226->2236 2244 14b6ecb-14b6ed6 2227->2244 2245 14b6ed8 2227->2245 2229 14b6f6a-14b6f78 2228->2229 2230 14b6fb0-14b6fb9 2228->2230 2229->2230 2252 14b6f7a-14b6f95 2229->2252 2237 14b73cf 2230->2237 2238 14b6fbf-14b6fc9 2230->2238 2240 14b7314-14b7355 2233->2240 2234->2240 2241 14b7383-14b73be 2235->2241 2236->2241 2246 14b73d4-14b7404 2237->2246 2238->2217 2242 14b6fcf-14b6fd8 2238->2242 2293 14b73c5-14b73cc 2241->2293 2250 14b6fda-14b6fdf 2242->2250 2251 14b6fe7-14b6ff3 2242->2251 2247 14b6eda-14b6edc 2244->2247 2245->2247 2269 14b741d-14b7424 2246->2269 2270 14b7406-14b741c 2246->2270 2247->2228 2254 14b6ee2-14b6f44 2247->2254 2250->2251 2251->2246 2257 14b6ff9-14b6fff 2251->2257 2276 14b6fa3 2252->2276 2277 14b6f97-14b6fa1 2252->2277 2302 14b6f4a-14b6f61 2254->2302 2303 14b6f46 2254->2303 2259 14b72a6-14b72aa 2257->2259 2260 14b7005-14b7015 2257->2260 2259->2237 2263 14b72b0-14b72b6 2259->2263 2274 14b7029-14b702b 2260->2274 2275 14b7017-14b7027 2260->2275 2263->2217 2263->2242 2278 14b702e-14b7034 2274->2278 2275->2278 2279 14b6fa5-14b6fa7 2276->2279 2277->2279 2278->2259 2280 14b703a-14b7049 2278->2280 2279->2230 2281 14b6fa9 2279->2281 2288 14b704f 2280->2288 2289 14b70f7-14b7122 call 14b6ca0 * 2 2280->2289 2281->2230 2291 14b7052-14b7063 2288->2291 2306 14b7128-14b712c 2289->2306 2307 14b720c-14b7226 2289->2307 2291->2246 2295 14b7069-14b707b 2291->2295 2295->2246 2297 14b7081-14b7099 2295->2297 2360 14b709b call 14b7428 2297->2360 2361 14b709b call 14b7438 2297->2361 2300 14b70a1-14b70b1 2300->2259 2305 14b70b7-14b70ba 2300->2305 2302->2228 2303->2302 2308 14b70bc-14b70c2 2305->2308 2309 14b70c4-14b70c7 2305->2309 2306->2259 2311 14b7132-14b7136 2306->2311 2307->2217 2329 14b722c-14b7230 2307->2329 2308->2309 2312 14b70cd-14b70d0 2308->2312 2309->2237 2309->2312 2314 14b7138-14b7145 2311->2314 2315 14b715e-14b7164 2311->2315 2316 14b70d8-14b70db 2312->2316 2317 14b70d2-14b70d6 2312->2317 2332 14b7147-14b7152 2314->2332 2333 14b7154 2314->2333 2318 14b719f-14b71a5 2315->2318 2319 14b7166-14b716a 2315->2319 2316->2237 2320 14b70e1-14b70e5 2316->2320 2317->2316 2317->2320 2323 14b71b1-14b71b7 2318->2323 2324 14b71a7-14b71ab 2318->2324 2319->2318 2322 14b716c-14b7175 2319->2322 2320->2237 2321 14b70eb-14b70f1 2320->2321 2321->2289 2321->2291 2327 14b7177-14b717c 2322->2327 2328 14b7184-14b719a 2322->2328 2330 14b71b9-14b71bd 2323->2330 2331 14b71c3-14b71c5 2323->2331 2324->2293 2324->2323 2327->2328 2328->2259 2335 14b726c-14b7270 2329->2335 2336 14b7232-14b723c call 14b5b50 2329->2336 2330->2259 2330->2331 2337 14b71fa-14b71fc 2331->2337 2338 14b71c7-14b71d0 2331->2338 2334 14b7156-14b7158 2332->2334 2333->2334 2334->2259 2334->2315 2335->2293 2343 14b7276-14b727a 2335->2343 2336->2335 2348 14b723e-14b7253 2336->2348 2337->2259 2341 14b7202-14b7209 2337->2341 2339 14b71df-14b71f5 2338->2339 2340 14b71d2-14b71d7 2338->2340 2339->2259 2340->2339 2343->2293 2346 14b7280-14b728d 2343->2346 2352 14b728f-14b729a 2346->2352 2353 14b729c 2346->2353 2348->2335 2357 14b7255-14b726a 2348->2357 2354 14b729e-14b72a0 2352->2354 2353->2354 2354->2259 2354->2293 2357->2217 2357->2335 2360->2300 2361->2300
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4e455b254bcb231da3c200c08b77710ffd6bfc6cd06e9bce05771a7e52d357c6
                                                    • Instruction ID: 58fd7040d4a5291312bfd1442f8f4416803589e44b5b4226fe751733cd365896
                                                    • Opcode Fuzzy Hash: 4e455b254bcb231da3c200c08b77710ffd6bfc6cd06e9bce05771a7e52d357c6
                                                    • Instruction Fuzzy Hash: A3123A30A00209CFDB19DF69D984A9EBBF2FF88315F15855AE9059B3A1DB31ED41CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2605 14ba818-14ba842 call 14ba7c0 2609 14ba90b 2605->2609 2610 14ba848-14ba84d 2605->2610 2612 14ba910-14ba94f 2609->2612 2610->2609 2611 14ba853-14ba872 2610->2611 2614 14ba8bb-14ba8c0 2611->2614 2615 14ba874-14ba87c 2611->2615 2618 14ba951-14ba954 2612->2618 2619 14ba957-14ba95f 2612->2619 2623 14ba8c8-14ba8cf 2614->2623 2615->2609 2617 14ba882-14ba885 2615->2617 2617->2609 2620 14ba88b-14ba8aa 2617->2620 2618->2619 2621 14ba961-14ba967 2619->2621 2622 14ba9c7-14ba9ce 2619->2622 2620->2609 2654 14ba8ac-14ba8b2 2620->2654 2621->2622 2626 14ba969-14ba96f 2621->2626 2624 14baad3-14baadc 2622->2624 2625 14ba9d4-14ba9db 2622->2625 2627 14ba8fe-14ba908 2623->2627 2628 14ba8d1-14ba8d7 2623->2628 2633 14baade-14baae4 2624->2633 2634 14baae6-14baae9 2624->2634 2635 14baa8a-14baa90 2625->2635 2636 14ba9e1-14ba9e9 2625->2636 2629 14babf9-14bac01 2626->2629 2630 14ba975-14ba982 2626->2630 2628->2612 2631 14ba8d9-14ba8f6 2628->2631 2652 14bac03-14bac09 2629->2652 2653 14bab92-14bab96 2629->2653 2630->2629 2637 14ba988-14ba9b0 2630->2637 2631->2627 2633->2634 2639 14bab00-14bab04 2633->2639 2640 14baaef-14baafd 2634->2640 2641 14babf4 2634->2641 2635->2629 2638 14baa96-14baaa0 2635->2638 2636->2641 2642 14ba9ef-14ba9f8 2636->2642 2637->2641 2680 14ba9b6-14ba9b9 2637->2680 2638->2629 2646 14baaa6-14baac2 2638->2646 2643 14bab0a-14bab13 2639->2643 2644 14bab87-14bab8b 2639->2644 2640->2639 2641->2629 2642->2629 2649 14ba9fe-14baa31 2642->2649 2643->2644 2650 14bab15-14bab1b 2643->2650 2655 14babea-14babf1 2644->2655 2656 14bab8d-14bab90 2644->2656 2681 14baaca-14baacd 2646->2681 2685 14baa7b-14baa88 2649->2685 2686 14baa33 2649->2686 2650->2629 2660 14bab21-14bab2b 2650->2660 2663 14bac0b-14bac2f 2652->2663 2664 14bab9a-14bab9f 2652->2664 2653->2641 2659 14bab97-14bab98 2653->2659 2654->2612 2665 14ba8b4-14ba8b8 2654->2665 2656->2653 2659->2664 2660->2629 2666 14bab31-14bab3e 2660->2666 2675 14bac3e-14bac42 2663->2675 2676 14bac31-14bac3c 2663->2676 2664->2655 2673 14baba1 2664->2673 2665->2614 2666->2629 2670 14bab44-14bab6f 2666->2670 2670->2629 2708 14bab75-14bab7d 2670->2708 2678 14baba4-14babac 2673->2678 2682 14bac54 2675->2682 2683 14bac44-14bac52 2675->2683 2676->2675 2687 14babae-14babba 2678->2687 2688 14babe0-14babe3 2678->2688 2680->2641 2689 14ba9bf-14ba9c5 2680->2689 2681->2624 2681->2641 2684 14bac56-14bac58 2682->2684 2683->2684 2691 14bac5a-14bac5c 2684->2691 2692 14bac5e-14bac66 2684->2692 2685->2681 2693 14baa36-14baa3c 2686->2693 2687->2629 2694 14babbc-14babd8 2687->2694 2688->2641 2696 14babe5-14babe8 2688->2696 2689->2621 2689->2622 2691->2692 2698 14bac89-14bac8b 2692->2698 2699 14bac68-14bac7a 2692->2699 2693->2629 2700 14baa42-14baa63 2693->2700 2694->2688 2696->2655 2696->2678 2701 14bacb9-14bacca 2698->2701 2702 14bac8d-14bac9a call 14ba340 2698->2702 2699->2698 2710 14bac7c-14bac87 2699->2710 2700->2641 2717 14baa69-14baa6d 2700->2717 2702->2701 2715 14bac9c-14bacab 2702->2715 2708->2641 2713 14bab7f-14bab85 2708->2713 2710->2698 2713->2644 2713->2650 2715->2701 2720 14bacad-14bacb7 2715->2720 2717->2641 2718 14baa73-14baa79 2717->2718 2718->2685 2718->2693 2720->2701
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 13e45052a0eb7e1878c5c9870209acf2f9477b00a543956089ac40bf460f4745
                                                    • Instruction ID: b1c4c30f08f5a85f25d150391240b50ac731002847d4896d0a52babe56ed943e
                                                    • Opcode Fuzzy Hash: 13e45052a0eb7e1878c5c9870209acf2f9477b00a543956089ac40bf460f4745
                                                    • Instruction Fuzzy Hash: 9BF11C75A001158FCB15CF6DC9C49ADBBF6BF88310B2A845AE515AB371DB35EC81CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2722 14b0c8f-14b0cc0 2723 14b0cc2 2722->2723 2724 14b0cc7-14b0d10 call 14b070c 2722->2724 2723->2724 2731 14b0d15 2724->2731 2732 14b0d1e-14b0eda call 14b070c * 7 2731->2732 2775 14b0ee2-14b0eeb 2732->2775 2864 14b0eee call 14b1f08 2775->2864 2865 14b0eee call 14b1f61 2775->2865 2776 14b0ef4-14b0f09 2866 14b0f0c call 14b3428 2776->2866 2867 14b0f0c call 14b3212 2776->2867 2778 14b0f12-14b0f1b 2868 14b0f1e call 14b3578 2778->2868 2869 14b0f1e call 14b3908 2778->2869 2870 14b0f1e call 14b39ed 2778->2870 2779 14b0f24-14b0f4e 2782 14b0f57-14b0f5a call 14b4ad9 2779->2782 2783 14b0f60-14b0f8a 2782->2783 2786 14b0f93 2783->2786 2873 14b0f96 call 14bb318 2786->2873 2874 14b0f96 call 14bb328 2786->2874 2787 14b0f9c-14b0fc6 2790 14b0fcf-14b0fd5 call 14bbbd3 2787->2790 2791 14b0fdb-14b1017 2790->2791 2794 14b1023 2791->2794 2850 14b1029 call 14bbbd3 2794->2850 2851 14b1029 call 14bbeb0 2794->2851 2795 14b102f-14b106b 2798 14b1077-14b107d call 14bc190 2795->2798 2799 14b1083-14b10bf 2798->2799 2802 14b10cb 2799->2802 2857 14b10d1 call 14bc190 2802->2857 2858 14b10d1 call 14bc470 2802->2858 2803 14b10d7-14b1113 2806 14b111f 2803->2806 2861 14b1125 call 14bc190 2806->2861 2862 14b1125 call 14bc470 2806->2862 2863 14b1125 call 14bc754 2806->2863 2807 14b112b-14b1167 2810 14b1173-14b1179 call 14bca34 2807->2810 2811 14b117f-14b122a 2810->2811 2819 14b1235-14b1241 call 14bcd10 2811->2819 2820 14b1247-14b1253 2819->2820 2821 14b125e-14b126a call 14bcd10 2820->2821 2822 14b1270-14b127c 2821->2822 2823 14b1287-14b1293 call 14bcd10 2822->2823 2824 14b1299-14b12a5 2823->2824 2825 14b12b0-14b12bc call 14bcd10 2824->2825 2826 14b12c2-14b12ce 2825->2826 2827 14b12d9-14b12e5 call 14bcd10 2826->2827 2828 14b12eb-14b12f7 2827->2828 2829 14b1302-14b130e call 14bcd10 2828->2829 2830 14b1314-14b1320 2829->2830 2831 14b132b-14b1337 call 14bcd10 2830->2831 2832 14b133d-14b1349 2831->2832 2833 14b1354-14b1360 call 14bcd10 2832->2833 2834 14b1366-14b1372 2833->2834 2835 14b137d-14b1389 call 14bcd10 2834->2835 2836 14b138f-14b139b 2835->2836 2837 14b13a6-14b13b2 call 14bcd10 2836->2837 2838 14b13b8-14b146b 2837->2838 2850->2795 2851->2795 2857->2803 2858->2803 2861->2807 2862->2807 2863->2807 2864->2776 2865->2776 2866->2778 2867->2778 2868->2779 2869->2779 2870->2779 2873->2787 2874->2787
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 61f49f6069e8d80f05f4c477e86304356bcd44d08e2d81260e632c772de830e2
                                                    • Instruction ID: ada1af844a63027d8d203c3fbe221d0b443f55f404b88b7d468e1ff18af7430a
                                                    • Opcode Fuzzy Hash: 61f49f6069e8d80f05f4c477e86304356bcd44d08e2d81260e632c772de830e2
                                                    • Instruction Fuzzy Hash: 1422017890021ACFCB54DFA6E994A9DBBB1FF88301F1081A9D919AB354DB345E85CF41

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2878 14b0ca0-14b0cc0 2879 14b0cc2 2878->2879 2880 14b0cc7-14b0eeb call 14b070c * 8 2878->2880 2879->2880 3025 14b0eee call 14b1f08 2880->3025 3026 14b0eee call 14b1f61 2880->3026 2932 14b0ef4-14b0f09 3027 14b0f0c call 14b3428 2932->3027 3028 14b0f0c call 14b3212 2932->3028 2934 14b0f12-14b0f1b 3029 14b0f1e call 14b3578 2934->3029 3030 14b0f1e call 14b3908 2934->3030 3031 14b0f1e call 14b39ed 2934->3031 2935 14b0f24-14b0f93 call 14b4ad9 3004 14b0f96 call 14bb318 2935->3004 3005 14b0f96 call 14bb328 2935->3005 2943 14b0f9c-14b1023 call 14bbbd3 3011 14b1029 call 14bbbd3 2943->3011 3012 14b1029 call 14bbeb0 2943->3012 2951 14b102f-14b10cb call 14bc190 3018 14b10d1 call 14bc190 2951->3018 3019 14b10d1 call 14bc470 2951->3019 2959 14b10d7-14b111f 3022 14b1125 call 14bc190 2959->3022 3023 14b1125 call 14bc470 2959->3023 3024 14b1125 call 14bc754 2959->3024 2963 14b112b-14b13b2 call 14bca34 call 14bcd10 * 10 2994 14b13b8-14b146b 2963->2994 3004->2943 3005->2943 3011->2951 3012->2951 3018->2959 3019->2959 3022->2963 3023->2963 3024->2963 3025->2932 3026->2932 3027->2934 3028->2934 3029->2935 3030->2935 3031->2935
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cbacbc65c678db3ca797c04946f872f1060c9c2210a5b84af7125576d9439966
                                                    • Instruction ID: 5403337347be1af745450ef353346088d8aece2dc08139c7d1b3e8d6d9a8d9c1
                                                    • Opcode Fuzzy Hash: cbacbc65c678db3ca797c04946f872f1060c9c2210a5b84af7125576d9439966
                                                    • Instruction Fuzzy Hash: 65220078A0021ACFCB54DFA6E994B9DBBB1FF88301F1081A9D919AB354DB345E85CF41

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 3131 14b87e9-14b8805 3132 14b8811-14b881d 3131->3132 3133 14b8807-14b880c 3131->3133 3136 14b881f-14b8821 3132->3136 3137 14b882d-14b8832 3132->3137 3134 14b8ba6-14b8bab 3133->3134 3138 14b8829-14b882b 3136->3138 3137->3134 3138->3137 3139 14b8837-14b8843 3138->3139 3141 14b8853-14b8858 3139->3141 3142 14b8845-14b8851 3139->3142 3141->3134 3142->3141 3144 14b885d-14b8868 3142->3144 3146 14b886e-14b8879 3144->3146 3147 14b8912-14b891d 3144->3147 3152 14b887b-14b888d 3146->3152 3153 14b888f 3146->3153 3150 14b8923-14b8932 3147->3150 3151 14b89c0-14b89cc 3147->3151 3162 14b8943-14b8952 3150->3162 3163 14b8934-14b893e 3150->3163 3160 14b89ce-14b89da 3151->3160 3161 14b89dc-14b89ee 3151->3161 3154 14b8894-14b8896 3152->3154 3153->3154 3158 14b8898-14b88a7 3154->3158 3159 14b88b6-14b88bb 3154->3159 3158->3159 3169 14b88a9-14b88b4 3158->3169 3159->3134 3160->3161 3170 14b8a1c-14b8a27 3160->3170 3178 14b8a12-14b8a17 3161->3178 3179 14b89f0-14b89fc 3161->3179 3171 14b8976-14b897f 3162->3171 3172 14b8954-14b8960 3162->3172 3163->3134 3169->3159 3176 14b88c0-14b88c9 3169->3176 3181 14b8b09-14b8b14 3170->3181 3182 14b8a2d-14b8a36 3170->3182 3183 14b8981-14b8993 3171->3183 3184 14b8995 3171->3184 3185 14b896c-14b8971 3172->3185 3186 14b8962-14b8967 3172->3186 3191 14b88cb-14b88d0 3176->3191 3192 14b88d5-14b88e4 3176->3192 3178->3134 3196 14b8a08-14b8a0d 3179->3196 3197 14b89fe-14b8a03 3179->3197 3200 14b8b3e-14b8b4d 3181->3200 3201 14b8b16-14b8b20 3181->3201 3198 14b8a38-14b8a4a 3182->3198 3199 14b8a4c 3182->3199 3188 14b899a-14b899c 3183->3188 3184->3188 3185->3134 3186->3134 3188->3151 3194 14b899e-14b89aa 3188->3194 3191->3134 3209 14b8908-14b890d 3192->3209 3210 14b88e6-14b88f2 3192->3210 3211 14b89ac-14b89b1 3194->3211 3212 14b89b6-14b89bb 3194->3212 3196->3134 3197->3134 3202 14b8a51-14b8a53 3198->3202 3199->3202 3214 14b8b4f-14b8b5e 3200->3214 3215 14b8ba1 3200->3215 3217 14b8b22-14b8b2e 3201->3217 3218 14b8b37-14b8b3c 3201->3218 3207 14b8a63 3202->3207 3208 14b8a55-14b8a61 3202->3208 3216 14b8a68-14b8a6a 3207->3216 3208->3216 3209->3134 3225 14b88fe-14b8903 3210->3225 3226 14b88f4-14b88f9 3210->3226 3211->3134 3212->3134 3214->3215 3229 14b8b60-14b8b78 3214->3229 3215->3134 3221 14b8a6c-14b8a71 3216->3221 3222 14b8a76-14b8a89 3216->3222 3217->3218 3227 14b8b30-14b8b35 3217->3227 3218->3134 3221->3134 3230 14b8a8b 3222->3230 3231 14b8ac1-14b8acb 3222->3231 3225->3134 3226->3134 3227->3134 3243 14b8b9a-14b8b9f 3229->3243 3244 14b8b7a-14b8b98 3229->3244 3232 14b8a8e-14b8a9f call 14b8258 3230->3232 3237 14b8aea-14b8af6 3231->3237 3238 14b8acd-14b8ad9 call 14b8258 3231->3238 3240 14b8aa1-14b8aa4 3232->3240 3241 14b8aa6-14b8aab 3232->3241 3251 14b8af8-14b8afd 3237->3251 3252 14b8aff 3237->3252 3248 14b8adb-14b8ade 3238->3248 3249 14b8ae0-14b8ae5 3238->3249 3240->3241 3247 14b8ab0-14b8ab3 3240->3247 3241->3134 3243->3134 3244->3134 3253 14b8ab9-14b8abf 3247->3253 3254 14b8bac-14b8bc0 3247->3254 3248->3237 3248->3249 3249->3134 3255 14b8b04 3251->3255 3252->3255 3253->3231 3253->3232 3258 14b8c12-14b8c19 3254->3258 3259 14b8bc2-14b8bc6 3254->3259 3255->3134 3262 14b8c1b-14b8c2a 3258->3262 3263 14b8c4e-14b8c60 3258->3263 3262->3263 3266 14b8c2c-14b8c42 3262->3266 3267 14b8d5f 3263->3267 3268 14b8c66-14b8c74 3263->3268 3266->3263 3278 14b8c44-14b8c49 3266->3278 3269 14b8d61-14b8d65 3267->3269 3272 14b8c80-14b8c83 3268->3272 3273 14b8c76-14b8c7b 3268->3273 3274 14b8c89-14b8c8c 3272->3274 3275 14b8d66-14b8d7e 3272->3275 3273->3269 3274->3268 3277 14b8c8e 3274->3277 3277->3267 3278->3269
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe894e1e2bfa4647ddd234f84956a3f8c5c54ffea76d6874505f368f84557d13
                                                    • Instruction ID: 3445184a05096c8b709ca0ee670c3c1b86491851014a36cf6fb5e43be972b83d
                                                    • Opcode Fuzzy Hash: fe894e1e2bfa4647ddd234f84956a3f8c5c54ffea76d6874505f368f84557d13
                                                    • Instruction Fuzzy Hash: 1EB10E707145028FEB159B3DC998BBA3A9EEF85604F1554ABE602CF3B1EE35CC428761
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 98fd0c2de351699f53e559410109cf755197143147fb1ed9fde1e64212099d0d
                                                    • Instruction ID: 829ecb514e0685332ae3e20cef58e6a9b4516b7e158995b917e0b86faa863127
                                                    • Opcode Fuzzy Hash: 98fd0c2de351699f53e559410109cf755197143147fb1ed9fde1e64212099d0d
                                                    • Instruction Fuzzy Hash: C79190307042458FDB1A9F79D894BAEBBA2BFC9700F14446AE5068F3A5DB748D05CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41ab10b31151c06133c9ded3885a634ea4e6aa41cc7b50d9962891604035f766
                                                    • Instruction ID: 255266295fb9b4d8e524005c158a81a02f0cda407eb1b09d7dd3486d7dbe8f5c
                                                    • Opcode Fuzzy Hash: 41ab10b31151c06133c9ded3885a634ea4e6aa41cc7b50d9962891604035f766
                                                    • Instruction Fuzzy Hash: 6F817C35A00505CFDB15DFADC4C8AAAFBB6BF89210B14826AD505DF371DB31E842CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d11b2cc8cb2dbfc721451e4231ec798e21ed2d9912fbfc3df9b29fec1606b2d1
                                                    • Instruction ID: 6ed4bfc8eb3ab97f6b05729b633ce972f6b734fae842f1955d189115819b6ae4
                                                    • Opcode Fuzzy Hash: d11b2cc8cb2dbfc721451e4231ec798e21ed2d9912fbfc3df9b29fec1606b2d1
                                                    • Instruction Fuzzy Hash: 76719F31F103198BDB59DFA5C8506AEBBB2AFC8750F14842AE805BB380DF34AD46C791
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30b3e6a3a589129e7b78b8ea943970464a4f884e9293e9e19a76465aff2d7aa9
                                                    • Instruction ID: 8ad312b10fa056d68f0b0f008c36c4023ee9f4699bdaf81f827d2d2f3c62f856
                                                    • Opcode Fuzzy Hash: 30b3e6a3a589129e7b78b8ea943970464a4f884e9293e9e19a76465aff2d7aa9
                                                    • Instruction Fuzzy Hash: 88711B347002458FDB15DF2DC4D8AAA7BE5AF89252F1500AAE906DB3B1DB74DC42CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 55c7b46c11d9a5fbb951508030617aa991fd4e0e76c1407a2d5f44b1f38ac12f
                                                    • Instruction ID: 4f4c7d694892bd1f4f195af2aed423550baa706df212f65928f2893990357fd6
                                                    • Opcode Fuzzy Hash: 55c7b46c11d9a5fbb951508030617aa991fd4e0e76c1407a2d5f44b1f38ac12f
                                                    • Instruction Fuzzy Hash: 8551B0700213038FC3603FB0A1EC56ABBA1FB4F36B701AE24E50E85429AB706659CF91
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d60e5aee9b9152c71427d92e6e8ca639707e75356889b38cd9516c05868eefb
                                                    • Instruction ID: 6d8dc86cf21d48126615da92b01f7ac475c8e8e831510c33b22535ce6cda8041
                                                    • Opcode Fuzzy Hash: 6d60e5aee9b9152c71427d92e6e8ca639707e75356889b38cd9516c05868eefb
                                                    • Instruction Fuzzy Hash: 8751A270021303CFC3203BB0A1EC56ABB65FB4F36B7016E24F54E85429AB706655CF91
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 707ea1cd45d9719cbc49450ab369f51606c9d135b4acf42ae8f273ab39ab539d
                                                    • Instruction ID: a6da88c56dfdad4b1b690cb68483357af445cd42db9cb8dbd8c3073e937c4bc7
                                                    • Opcode Fuzzy Hash: 707ea1cd45d9719cbc49450ab369f51606c9d135b4acf42ae8f273ab39ab539d
                                                    • Instruction Fuzzy Hash: 8C51BE35B102168FDB48DF79D85896E77F2BF88610B198169E505EB3A4EA30ED01CB91
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 92e23dfd47c42ea6ac6f57c5efbd9f0ee2943c581de6ba792b02843c7c0c59e5
                                                    • Instruction ID: c016581e904448173d547144a395209d92c0d56d6e6e9209547ee4217b49a657
                                                    • Opcode Fuzzy Hash: 92e23dfd47c42ea6ac6f57c5efbd9f0ee2943c581de6ba792b02843c7c0c59e5
                                                    • Instruction Fuzzy Hash: FB61ED74D01218CFDB14DFE5D894AEEBBB2FF88304F209529D805AB265DB795A85CF40
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e6f9895dd7e42ae954ff66d8e4c6c34e1a380ef82262af264636edd5ee4fa7d7
                                                    • Instruction ID: 28288d2e2b6c52bc34de3c3d8e73bd83c065f4249f24a6543e642701fddfe57f
                                                    • Opcode Fuzzy Hash: e6f9895dd7e42ae954ff66d8e4c6c34e1a380ef82262af264636edd5ee4fa7d7
                                                    • Instruction Fuzzy Hash: 32518474E01208DFDB58DFAAD58499DBBF2FF89310F24816AE819AB364DB319801CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6725fa14561770ab036ebc6d9d360d396ca6bd05c0fc045e1bc00e5cc2aeadce
                                                    • Instruction ID: 37951ae44b619fdad5dc5e3399e98edb89a3853c98ea171c2b741bd71b76bbb6
                                                    • Opcode Fuzzy Hash: 6725fa14561770ab036ebc6d9d360d396ca6bd05c0fc045e1bc00e5cc2aeadce
                                                    • Instruction Fuzzy Hash: A2415C3590131ACFEB14AFB1D45C7EEBBB1EB4A31AF105829D1016B2E4CB780A48CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 178d171c87f4cb7244f1cf0ea587cded9e2ee6249e20b3a47fc1d157bdecd805
                                                    • Instruction ID: e9efab52186a629ccf032447b0f9a005cde5d05a7d1a78bc98a53b15d6f3c3df
                                                    • Opcode Fuzzy Hash: 178d171c87f4cb7244f1cf0ea587cded9e2ee6249e20b3a47fc1d157bdecd805
                                                    • Instruction Fuzzy Hash: 26519878E01208CFCB48DFAAD59499DBBB2FF8D311B20946AE415AB324DB359D46CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a3496c0e4df8272bd316c991f0f7b1c7408ee53af4dafb94c2776806477bea25
                                                    • Instruction ID: b2419c54938a0344a85eff1b085d6a684f55fbff78b543a4c65a82ee1543e3db
                                                    • Opcode Fuzzy Hash: a3496c0e4df8272bd316c991f0f7b1c7408ee53af4dafb94c2776806477bea25
                                                    • Instruction Fuzzy Hash: AA518D78E01228CFDB64DFA9D984BEDBBB1BB89301F1055AAD409A7360D7359E85CF10
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 338812cf0d0b81cc768269a67ab9611540de883f06bfc0f2586e104edbc7f160
                                                    • Instruction ID: b0aad934d369d273a058c6b296e4b1a82af5ba214b19466d26559e2b0ff96248
                                                    • Opcode Fuzzy Hash: 338812cf0d0b81cc768269a67ab9611540de883f06bfc0f2586e104edbc7f160
                                                    • Instruction Fuzzy Hash: F451A271A04249DFCF16CFA8C884ADEBFB2FF89354F048556EA119B2A1D3359951CB70
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ccc0adae405150fe1c50295f0b3dbb6acb980f062036c3c10f7854357293855
                                                    • Instruction ID: e9b7fcbd6273c9ed5eb0751e43750249e41ffa59f0af025b3aecff2c09823575
                                                    • Opcode Fuzzy Hash: 9ccc0adae405150fe1c50295f0b3dbb6acb980f062036c3c10f7854357293855
                                                    • Instruction Fuzzy Hash: 9841D2357002049FCB19AB79D8546AEBBB6BFC8710F24406EE906D73A1DE319D02CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c0a01defbbf7379cdc01dabd7ba18841e9d96b4d933b5623e8d7a698d89db32
                                                    • Instruction ID: 285edb2bfabc20893a546dab907cd1347fa34705dc8584b06aa3a5419d35e837
                                                    • Opcode Fuzzy Hash: 0c0a01defbbf7379cdc01dabd7ba18841e9d96b4d933b5623e8d7a698d89db32
                                                    • Instruction Fuzzy Hash: 94414031E1031A9BDB54DFA5C880ADEBBF5AFC8710F159129E415BB390EB70A946CB90
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fbf650549633fb679e2fd5c8cce57408b20de432d1d48196744b48fe5de5d52c
                                                    • Instruction ID: de93f7528d5581d805ac0c99f798dba3c311042ac4add1b7f3194570f2b6d060
                                                    • Opcode Fuzzy Hash: fbf650549633fb679e2fd5c8cce57408b20de432d1d48196744b48fe5de5d52c
                                                    • Instruction Fuzzy Hash: 82414574D04248CFDB14CFE9D4846EDBBB1FF49309F2091AAD419AB264D7759882CF64
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3f148b9aa864de79420b6a503f2272e7994e5e12717d8cb3462bb2cb3a08fc3e
                                                    • Instruction ID: 4f17df68eacb38e23a2699bce7cc71ab2cc884bc0b77dfa45ff4d5ac75bb41ff
                                                    • Opcode Fuzzy Hash: 3f148b9aa864de79420b6a503f2272e7994e5e12717d8cb3462bb2cb3a08fc3e
                                                    • Instruction Fuzzy Hash: 39318179B002258BEB2D4DAF99D42BF699ABBC4250F18403BD916C73A1DFB8CC458671
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a874f7be670d28c8b73bca9c69b5c0dc24ab010e6c05f0489abbb86fa22ed0ec
                                                    • Instruction ID: dc0815096ed7f72da918b524751ea80e36b46024f321d9f77caeb458fbe2d3ae
                                                    • Opcode Fuzzy Hash: a874f7be670d28c8b73bca9c69b5c0dc24ab010e6c05f0489abbb86fa22ed0ec
                                                    • Instruction Fuzzy Hash: 8E41C078E01208CFDB54DFE9D5846EDBBF2EF88304F10912AD815AB294DB786A46CF54
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2e8813ee089d14723d4a93eee84c1c3894bb30a3c86b8fbdae8ca53656a6d6e
                                                    • Instruction ID: f6446f313c0d7ac4cc6ad407909c6a761b37173b86cd642fbbfe2a5ad404e38a
                                                    • Opcode Fuzzy Hash: b2e8813ee089d14723d4a93eee84c1c3894bb30a3c86b8fbdae8ca53656a6d6e
                                                    • Instruction Fuzzy Hash: EB41D078E01208CFDB44DFE9D5846EDBBF2EF88300F10912AD815AB294DB786A46CF54
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f7ea7eea2c8666fe1fd5586895b4bb24fdd63fba029f5b1ba7313e498ef8177
                                                    • Instruction ID: 64e32e51ea169c69f6e92d3479652ded1c95ed1a62ff3966a8200385cf5cf2f0
                                                    • Opcode Fuzzy Hash: 7f7ea7eea2c8666fe1fd5586895b4bb24fdd63fba029f5b1ba7313e498ef8177
                                                    • Instruction Fuzzy Hash: A0410474D00208CFDB14DFE9E4846EDBBB2FF49319F2092AAD419A7264D7759882CF64
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ec3ef9516820db82d1d781cd8c6b10749980268b6bdae912e078b6726a28b66
                                                    • Instruction ID: 9b72265ba1362a942c4a6d747396e8103153ec0f5a4a8a8e85ee97f3bcbc6f1c
                                                    • Opcode Fuzzy Hash: 1ec3ef9516820db82d1d781cd8c6b10749980268b6bdae912e078b6726a28b66
                                                    • Instruction Fuzzy Hash: 64410574D002088BDB04DFEAD4846EEFBB2FF89304F14D16AD518A7264DB759942CF64
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb8ec4037bd1b3aa49596a446f7a951e3f226a08854254833b2435b2d19d178d
                                                    • Instruction ID: 18b530768d638b45c0b178a544a7c5d546fe589271798b8a8fcec3f8a3b87f8c
                                                    • Opcode Fuzzy Hash: cb8ec4037bd1b3aa49596a446f7a951e3f226a08854254833b2435b2d19d178d
                                                    • Instruction Fuzzy Hash: A631C73560410A9FCF159F69D484AAF3BA2FB58710F04442AFA16CB366CB34CD65CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 724af1546dab8ebd70a5bdc1f97115daad453bfa9c30bed31fff482d8e5a2d05
                                                    • Instruction ID: 6fdbe88c87d18a9adaa29e31dddbf38cbad9735e6f8ffa89ce09f3d332133ed2
                                                    • Opcode Fuzzy Hash: 724af1546dab8ebd70a5bdc1f97115daad453bfa9c30bed31fff482d8e5a2d05
                                                    • Instruction Fuzzy Hash: EE316B34901319DFEB149FA5D45C3EEBBB1EF4A31AF005469D5116A2A0CBB80A48CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9bd17c7f53d00d01e5f7adbc59b6fc714b39ce132917571010dfb02229d4ee3b
                                                    • Instruction ID: ee76cc1cdd2b9087fed06d8f7ca3fe1dd8262e10de82ecef3be42c155ec3df32
                                                    • Opcode Fuzzy Hash: 9bd17c7f53d00d01e5f7adbc59b6fc714b39ce132917571010dfb02229d4ee3b
                                                    • Instruction Fuzzy Hash: 6221C7383042418BEB16173D88D45BE3A97AFC9656B1440BBD501CB7F6EE35DC42E7A1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9bc300d7bbcca66f487bf05c6e4cd5a3561a2dbed28b3729065bbf0e483aacd3
                                                    • Instruction ID: f18b9a8ffa17afb113b403af36c4b06d9705662f55dd08d77bffd595ed22541e
                                                    • Opcode Fuzzy Hash: 9bc300d7bbcca66f487bf05c6e4cd5a3561a2dbed28b3729065bbf0e483aacd3
                                                    • Instruction Fuzzy Hash: 9F31A170A00209CFCB04CF7DC8849AEBBB6FF89350B25855AE5159B3B1CB359C42CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 620943b5a30e225db026779158b8cedc96e2faf235a7b6ce1416ba426a01cb6d
                                                    • Instruction ID: 0dbb9e275fc266aa0e28f29ef13baf1fcac5f974f561bf5c324d523ed4ca60d4
                                                    • Opcode Fuzzy Hash: 620943b5a30e225db026779158b8cedc96e2faf235a7b6ce1416ba426a01cb6d
                                                    • Instruction Fuzzy Hash: 3C217E71E042088FEB08CFEAD8442EEBBB6EFCA314F14D06AC514B7275D77085468B61
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90de8014569290124607b98683e4f573b9d8ee08a6a57cf9dffca6acc5b41e5b
                                                    • Instruction ID: f70bfa4d7131e55e6e7c010c4cef52b9cc1ca7ade542157abd9bad22fe7c3c31
                                                    • Opcode Fuzzy Hash: 90de8014569290124607b98683e4f573b9d8ee08a6a57cf9dffca6acc5b41e5b
                                                    • Instruction Fuzzy Hash: E82195383002054BEB25163988D4ABF3697AFC475AF14807BD602CB7E9EE75DC42E7A1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a48b136b1ea365d9c2320bfe0c2a00160c1b251d897db663fd54677ed4947c9
                                                    • Instruction ID: 5679ed6d617782c84c532b9dbf6215a76b1242e7fc51db63bb55e5ade1652888
                                                    • Opcode Fuzzy Hash: 9a48b136b1ea365d9c2320bfe0c2a00160c1b251d897db663fd54677ed4947c9
                                                    • Instruction Fuzzy Hash: BC21A175A00116DFCB14DB68C8909AF77A6EB9C260B10C55AD9099B390DB36EE42CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d4980221de9bf403a8425405709be9676e4aa87a2c028abf1e227aa70ee95d0b
                                                    • Instruction ID: 05d291857eeb86264c5a1342bbb8e73a5a40f5f973bf80a12c385478b30d2629
                                                    • Opcode Fuzzy Hash: d4980221de9bf403a8425405709be9676e4aa87a2c028abf1e227aa70ee95d0b
                                                    • Instruction Fuzzy Hash: 5421C0357016128FD7299A29C4D492FB7A6FBC9B50714416AEA06DF3A4DE34DC02CFD0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605204800.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_146d000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a135f1975570dd52cd8f685258bd63470526a302512490aa30333c2d9e04d584
                                                    • Instruction ID: 2dc75a9752ea33984cb8045caa016dd715400ebc32f2a4ab01c9f96e89f15f47
                                                    • Opcode Fuzzy Hash: a135f1975570dd52cd8f685258bd63470526a302512490aa30333c2d9e04d584
                                                    • Instruction Fuzzy Hash: CD2137B5A04204EFDB15CF54C9C0B26BB69FB8831CF20C56EE9894B362C776D447CA62
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 33371037db36c5106568b1ad4253d3ee90f39a2fe9c9eced392eca6172a5eaa8
                                                    • Instruction ID: 29727ff04027453502190e1713ad669f9fd007058107c0ae4ed83d580f10d795
                                                    • Opcode Fuzzy Hash: 33371037db36c5106568b1ad4253d3ee90f39a2fe9c9eced392eca6172a5eaa8
                                                    • Instruction Fuzzy Hash: BE11E7367043545FDB4AAEB8982427E3FA3EFC8650B14846AE905DB391DE348D02C7A6
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 453bb3453b096589e2fcf0b47bbdee34c0a4b9dda67ffc1ababe3c6121cc94c7
                                                    • Instruction ID: 22f453877d11e4082b6941e4bbef6bb798da0168101580335129322fe5b6f82f
                                                    • Opcode Fuzzy Hash: 453bb3453b096589e2fcf0b47bbdee34c0a4b9dda67ffc1ababe3c6121cc94c7
                                                    • Instruction Fuzzy Hash: A1319478E11309CFCB44DFA9E59489DBBB6FF49301B2040AAE819AB324D735AD45CF40
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8abc0fe04d70bd29027581bf842f0a2b79167c9cbe8023e37fb485691ced47ad
                                                    • Instruction ID: f677d07191a443a5aa3621525aaa80c888cc6f92e03fb6ebf4fc4025a624d23a
                                                    • Opcode Fuzzy Hash: 8abc0fe04d70bd29027581bf842f0a2b79167c9cbe8023e37fb485691ced47ad
                                                    • Instruction Fuzzy Hash: F621B73560410A9FDB159F69E4847AB3BA2FB54720F14402AF916CB362CB34CD55CFE0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ebc590139bd1669505ec3ec2acd9057214b22aea36f1c884ad7590660f66db63
                                                    • Instruction ID: ebba36c1e3818a79ae6afeaadecb833b2f2e87ad8f1698e5acca9279b21aa954
                                                    • Opcode Fuzzy Hash: ebc590139bd1669505ec3ec2acd9057214b22aea36f1c884ad7590660f66db63
                                                    • Instruction Fuzzy Hash: 12114975D00248CFEB08CFAAD4446EEBBB2EFCA315F18D06AC418B7269D77449468F60
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8b6c37842c2cd7a1695dd8427c2ed53c1a47866bb0f411ddd28c7e06d87910b4
                                                    • Instruction ID: b4577fdd1781d748f8ddb1cb0981bcc95db21e2f22a1a77657d8da8f199e30b0
                                                    • Opcode Fuzzy Hash: 8b6c37842c2cd7a1695dd8427c2ed53c1a47866bb0f411ddd28c7e06d87910b4
                                                    • Instruction Fuzzy Hash: C101D6307053508FE7450B7A9C545BBBEABAFDA310B154477E506C7296CE388D0A9771
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e4469fc9ccebe7e62239d67b03e3be66a4752b4b5292cb1c7cc59044de84831
                                                    • Instruction ID: 744b3e5f54b8ea7bea84009e4efbce70baaaa076327c3354e93ba8eb3e8845c1
                                                    • Opcode Fuzzy Hash: 9e4469fc9ccebe7e62239d67b03e3be66a4752b4b5292cb1c7cc59044de84831
                                                    • Instruction Fuzzy Hash: 15215C7490020ADFEB45DFBAD54069EBFF1FB89304F1096AAC114AB324EB745A468B91
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4ed870ebec19fde0c3522e9f34e8aead54a59c0169f4a0e264ecf7062cf518f
                                                    • Instruction ID: 468934a437b5c20174988cfc59765967f39e10a930cffb128e231c2921179a5f
                                                    • Opcode Fuzzy Hash: a4ed870ebec19fde0c3522e9f34e8aead54a59c0169f4a0e264ecf7062cf518f
                                                    • Instruction Fuzzy Hash: C921C0B4C042098FCB40EFA9D8955EEBBF1BF4A300F10416AD815B7224EB305A59CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7a2a3ffca4fe75e4791dd09ed377bef2a36832881b703f6eab0ed3b8359fd451
                                                    • Instruction ID: e5fa044b494d0a01b02d438c939e1d65fc2e7ec372a235a179af6c5e4097cb4e
                                                    • Opcode Fuzzy Hash: 7a2a3ffca4fe75e4791dd09ed377bef2a36832881b703f6eab0ed3b8359fd451
                                                    • Instruction Fuzzy Hash: 5D1126B6800349DFDB10CF99C945BEEBFF5EB48320F148419E618A7211C379A550CFA5
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4e7a4130aee4f59ae265e92556e98b8166715bca18b173d42af6ed2354af85e7
                                                    • Instruction ID: a96b0058f9d9c39315e4136850374e6baabfd12f91d3319b7653885a9c18eda6
                                                    • Opcode Fuzzy Hash: 4e7a4130aee4f59ae265e92556e98b8166715bca18b173d42af6ed2354af85e7
                                                    • Instruction Fuzzy Hash: F42110B4C042098FCB50EFA8D8945EEBFB0FF4A304F14416AD905B7324EB305A85CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fc2c20c385d8dfe8b42f89199d4f8b14bb4c916a426f95f158864879998cff61
                                                    • Instruction ID: 0d05e7050b9b0748d23677826f02a0202960d9476ba63f00502ef17c900ae248
                                                    • Opcode Fuzzy Hash: fc2c20c385d8dfe8b42f89199d4f8b14bb4c916a426f95f158864879998cff61
                                                    • Instruction Fuzzy Hash: B5113338F00359CFEB00DFE8D850BDEBBB1AB48311F10A155E808AB355E731A9428B50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f5e6dba4f449e3ebeb18e11d4220468aabbebedd83d6f8299f8a16433e6abe7
                                                    • Instruction ID: 7ffdb807440b911d27fc2f07252754368be3e4600df38c3d8297ccc82553c97f
                                                    • Opcode Fuzzy Hash: 7f5e6dba4f449e3ebeb18e11d4220468aabbebedd83d6f8299f8a16433e6abe7
                                                    • Instruction Fuzzy Hash: 6C114F74D0020ADFEB45DFBAD54069EBFF1FB88304F0096AAC514AB324EB745E458B81
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605204800.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_146d000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction ID: c26193338c4083f697d68723ad28f44ed28b259ec39aa9d921478148422cd821
                                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction Fuzzy Hash: 7C11BEB5A04284CFCB16CF54C9C4B16BB61FB84318F24C6AAD8894B363C33AD44ACF52
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d060a5391c6b9e137f9672a89b79aea23c02b3e89e22fb3429ef97f4680c18e7
                                                    • Instruction ID: 4229af638663951594fecc9eea8ab8d4e26f513aa6a98c5bd74e04ef01f82839
                                                    • Opcode Fuzzy Hash: d060a5391c6b9e137f9672a89b79aea23c02b3e89e22fb3429ef97f4680c18e7
                                                    • Instruction Fuzzy Hash: EE01BC307043149FD7151ABA9C5856BBEABEFCA210B14847BE60AC7396CE348C0687A1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e72dd5a3bfb86dc341d9d0cfd9ed3864647ea8390ccbd0eececc2fef415424f9
                                                    • Instruction ID: 298f2a2a534daaff84ac4c47d117cf01c9406ad3f1781279fa0610c248aba2d8
                                                    • Opcode Fuzzy Hash: e72dd5a3bfb86dc341d9d0cfd9ed3864647ea8390ccbd0eececc2fef415424f9
                                                    • Instruction Fuzzy Hash: 0C118B35B103128FCB54DB7CE408A5E7BF4EF8836471141A9E506DB361EB32DA068BD1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4d702871c27a1676ba18271704b48d622bd6cff0b3eacda54708de2d0643428f
                                                    • Instruction ID: 64d20e30b85a56bb7b374f223bb085537d5ede8f2c09efaf45a719753484298f
                                                    • Opcode Fuzzy Hash: 4d702871c27a1676ba18271704b48d622bd6cff0b3eacda54708de2d0643428f
                                                    • Instruction Fuzzy Hash: 851120B6800349DFDB10CF99C945BEEBBF5AF48320F24841AE618A7211C379A560CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0a8e5b04830a793ddca4b455e19f1d7a8146675cea3122a078491536f6b79cde
                                                    • Instruction ID: 456c1cb5dda2f045f36a41c9f1acaf104d4e116f9e20180388f7ad182b6c8651
                                                    • Opcode Fuzzy Hash: 0a8e5b04830a793ddca4b455e19f1d7a8146675cea3122a078491536f6b79cde
                                                    • Instruction Fuzzy Hash: F601D8717041196FDB058E69A8007EFBB97EFD8B51F18802FFA09CB254DA75C9128BA0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: db5377955178f5a8db3643b7a38364cbf631e5f4e42cb919fcd6ea9dac63ab98
                                                    • Instruction ID: 1edc1540f6e3553de52d74078e096e06e91a487559e5bce321ff77ce3cf9fcd5
                                                    • Opcode Fuzzy Hash: db5377955178f5a8db3643b7a38364cbf631e5f4e42cb919fcd6ea9dac63ab98
                                                    • Instruction Fuzzy Hash: 7201E470E013199FDF48EFBAC8446EEBBF5AF88200F14816AD919FB250E7345A018B90
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d851e63044ec403b4c432035998ddfdc475da3b17677347abee444665c16a774
                                                    • Instruction ID: 8cb22608aad6e5fc81b8f98a43c7e1200e65a82c7b9b8c5845280a0087dd869b
                                                    • Opcode Fuzzy Hash: d851e63044ec403b4c432035998ddfdc475da3b17677347abee444665c16a774
                                                    • Instruction Fuzzy Hash: D7F0ED31D44304DFDB148FA8F8092EEB7B4EB8B318F106079C000AB275DB7255068B65
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b0702cdea74ebcfe713ca594ed4652e3e12e88af8249cc2c6575a3611d812b5d
                                                    • Instruction ID: 9473088481e852c203612b6f9fc98814187ad58949c1defd13a4d1a2720046dc
                                                    • Opcode Fuzzy Hash: b0702cdea74ebcfe713ca594ed4652e3e12e88af8249cc2c6575a3611d812b5d
                                                    • Instruction Fuzzy Hash: 08F0ED31D04204CFDB148FA8A8242FABBB0EF8B309F0064A9C001A6170CBB1861ACF91
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bc9b43a30929f23e5740b511966ce0009a025a3ad29c2e4b37f4a0006cce1108
                                                    • Instruction ID: b402d47aee9c96b20284ef117067f591bfda33d24bb0994edd99b06d743233bb
                                                    • Opcode Fuzzy Hash: bc9b43a30929f23e5740b511966ce0009a025a3ad29c2e4b37f4a0006cce1108
                                                    • Instruction Fuzzy Hash: 2CF03A75E11525CFCB88EFBCC48459E7BF0AF08224B2144BAD509DB321EB30D9018BD0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0556b8983b50a696bf0d7f4ce63c78f9a4b9d83368a59a1f227d3b27625562e8
                                                    • Instruction ID: 3b20f02c6f6c981c04e27d0a17cbc765bce9093260d963894d89631c2fce2bfe
                                                    • Opcode Fuzzy Hash: 0556b8983b50a696bf0d7f4ce63c78f9a4b9d83368a59a1f227d3b27625562e8
                                                    • Instruction Fuzzy Hash: C6E0923582035A9BCB01DBB5DC004DEBB38EE97214B9045ABD0206B161EB71265ED7B1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e7e4c4c6a0530b3da2e74d8b3f117aa0dc4a68d5a043df97848d60679cbbc185
                                                    • Instruction ID: 021a117e7338fee312e1f5678982bb73a732f8e5a2b06e89026a74258c50383b
                                                    • Opcode Fuzzy Hash: e7e4c4c6a0530b3da2e74d8b3f117aa0dc4a68d5a043df97848d60679cbbc185
                                                    • Instruction Fuzzy Hash: BFE0DF93C08180CBE3109BE664A60F9BF30D9E321978461EBC189CB235D678E60B9B25
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48adcb4412e71c238ddaf7027aea97cad89a0b027bd7100bac727fbfcc905bf7
                                                    • Instruction ID: 9b44438f306742223ab7b2fb5e83c9f40eaf4e06d6a9e4a6c89f4adb3948baf4
                                                    • Opcode Fuzzy Hash: 48adcb4412e71c238ddaf7027aea97cad89a0b027bd7100bac727fbfcc905bf7
                                                    • Instruction Fuzzy Hash: 80D01231D2022B968B00A6A5DC044DEB739EE96261B904626D51537144EB71265986E1
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction ID: 9bafaace35aa34fda337adb96f9acd01efbdf80da04e4bf24a5a9622ce3a55c6
                                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction Fuzzy Hash: 82C0123720D1282AA629108EBC80AE3BB8CC2C12B4A250137F91CA3220A8529C8101B8
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d07313e9bca5ab1702d984ae4a59c53046feb4283fa9d7ad246f491efd2e06eb
                                                    • Instruction ID: 6056e086c6185693298489a83f06aa02a3aa1b1fa5b38ec40d141cca0c0910a5
                                                    • Opcode Fuzzy Hash: d07313e9bca5ab1702d984ae4a59c53046feb4283fa9d7ad246f491efd2e06eb
                                                    • Instruction Fuzzy Hash: 47D0677AB111089FCB149F98E8409DDB7B6FB9C221B048126E915A3264C6319921DB50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30a71702640b3711c007fa75df97806f1cb86bad787ccfb56d813701dca16fbe
                                                    • Instruction ID: bca81dedb7f37962060c876020b86611e27186d32d66baaa2897181864426349
                                                    • Opcode Fuzzy Hash: 30a71702640b3711c007fa75df97806f1cb86bad787ccfb56d813701dca16fbe
                                                    • Instruction Fuzzy Hash: 60D0C23440834B8BD316EBB2E8100143F25BF80204B40509DBA050E067EDBC088687A2
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 201ea52d91b660d6a713acdbffca557ed18916e0f5ae4ec33231aa09943cee2b
                                                    • Instruction ID: f0ecd5a5ac023796350d879c9a912ceb5853f9f1841bd50c8ba5bdcf1cd4feb7
                                                    • Opcode Fuzzy Hash: 201ea52d91b660d6a713acdbffca557ed18916e0f5ae4ec33231aa09943cee2b
                                                    • Instruction Fuzzy Hash: 92D06774D0411CCBCB24DF94E9442DCB7B0EB95305F0010D7D90DB3210D6305EA58F21
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca7e80d655786a65d4968bf5e7a0fb670790d0588fc73c8a5eebc63b9ac83bed
                                                    • Instruction ID: 94ad4e5d54bec709da35aa9767c92091ebd81e895511326c44b2de012c7e7d05
                                                    • Opcode Fuzzy Hash: ca7e80d655786a65d4968bf5e7a0fb670790d0588fc73c8a5eebc63b9ac83bed
                                                    • Instruction Fuzzy Hash: 6DC0123450430F8BE659EBF7F9445153B2AF6C0300F405558A70A1E156EEBC1D854791
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8a8035716c19abfad6ee581921cd953deb9c1cac802b18dfaa07ef9258c0b393
                                                    • Instruction ID: 7d04eb0ce68e43c07f68f30754a9a988c4f1884c5a162db3c76a471a2570c256
                                                    • Opcode Fuzzy Hash: 8a8035716c19abfad6ee581921cd953deb9c1cac802b18dfaa07ef9258c0b393
                                                    • Instruction Fuzzy Hash: 41528074E01229CFDB64DF69C884BDDBBB2BB89301F1081EAD509A7265DB359E81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f7bee41451a226fe2741961764c6aeee68635f654f6df867767a16ae1361344a
                                                    • Instruction ID: 4f2baf90a794814c5ee9300b2d7de038c503b604052aaf6f9867196ccb06f521
                                                    • Opcode Fuzzy Hash: f7bee41451a226fe2741961764c6aeee68635f654f6df867767a16ae1361344a
                                                    • Instruction Fuzzy Hash: D2C1B174E00218CFDB54DFA5C984BADBBB2EF89304F2091AAD809AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c0eedc309c72e5f646c112d5e6b1cd1951403c7d1bc04501bf7cfd576b754af8
                                                    • Instruction ID: 012b7b5737eb31a16c306c67fd4b9fb1e97b15281591c0bbf18ea649690a32f2
                                                    • Opcode Fuzzy Hash: c0eedc309c72e5f646c112d5e6b1cd1951403c7d1bc04501bf7cfd576b754af8
                                                    • Instruction Fuzzy Hash: D6C1AF74E00218CFEB54DFA5D994BADBBB2EF88300F1091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e25a5f8f54338cb259815e84ec2fd119a26b7a62da892e1a4bb9350561e95d4
                                                    • Instruction ID: ff3f6f3d8376a754c2e525b6ee3d8b33899b3b845194a7e74963b7a45398e79e
                                                    • Opcode Fuzzy Hash: 3e25a5f8f54338cb259815e84ec2fd119a26b7a62da892e1a4bb9350561e95d4
                                                    • Instruction Fuzzy Hash: 17C1B074E00218CFEB54DFA5C984BADBBB2EF89304F1091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 12052d17bf76dbd7f541d11c75cfdc71d4648397455e9a29eade286c5ccdf701
                                                    • Instruction ID: 9542d7aad14e084a0f0b56fc301d80f7e1022a9b45f1aa0968dd39f4508498e3
                                                    • Opcode Fuzzy Hash: 12052d17bf76dbd7f541d11c75cfdc71d4648397455e9a29eade286c5ccdf701
                                                    • Instruction Fuzzy Hash: 72C1B178E00218CFDB54DFA5D994BADBBB2EF88304F1090AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1c5da5ebf9e7fc15dd09e22f8a745b6e3a62166bde1f46456d94efe21f80b057
                                                    • Instruction ID: b157bc25943ca323c88afff2816977abb9484da08af97c04eab35e3916a09824
                                                    • Opcode Fuzzy Hash: 1c5da5ebf9e7fc15dd09e22f8a745b6e3a62166bde1f46456d94efe21f80b057
                                                    • Instruction Fuzzy Hash: 9AC1B174E00218CFEB54DFA5C984BADBBB2EF89304F2090AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ff583798ece0b83de7512a20655553a5d8943070dc8360ea959f23415f7ef9ef
                                                    • Instruction ID: d72da04cb13fe4fd75f99de95b50e55cbda9399b68abd5ba695ed7bd451558d8
                                                    • Opcode Fuzzy Hash: ff583798ece0b83de7512a20655553a5d8943070dc8360ea959f23415f7ef9ef
                                                    • Instruction Fuzzy Hash: 7AC1A078E00218CFDB54DFA5D984BADBBB2EF88304F2091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c51c55d7750bb5f70b5fb42c72ab183f4ee5851140783d56eb8e8c5444c88ba
                                                    • Instruction ID: 40c09660c8daa1477a12d5e4ce7789c281144eb406c44687522db9f2745bee5e
                                                    • Opcode Fuzzy Hash: 3c51c55d7750bb5f70b5fb42c72ab183f4ee5851140783d56eb8e8c5444c88ba
                                                    • Instruction Fuzzy Hash: 55C1B178E00218CFDB54DFA5C994BADBBB2EF88300F2090AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ec979404ea67c201fb2d41e2a845c83a7d17736c1c7be051060786ce94eeb0a
                                                    • Instruction ID: c6db6f74681af44f4def1b1ae383451d9ddd89f2238df5408be40e0cf57a2be4
                                                    • Opcode Fuzzy Hash: 2ec979404ea67c201fb2d41e2a845c83a7d17736c1c7be051060786ce94eeb0a
                                                    • Instruction Fuzzy Hash: 4BC1B174E00218CFDB54DFA5D984BADBBB2EF88304F2091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 208bcc8ead021c7087d64adcae28bfc8fca07bd27cf823800dee9ab00e14b2c6
                                                    • Instruction ID: 871fcd48e1c54f7259dee5ec42488932f6a410be37e2f89b053186a57c36d358
                                                    • Opcode Fuzzy Hash: 208bcc8ead021c7087d64adcae28bfc8fca07bd27cf823800dee9ab00e14b2c6
                                                    • Instruction Fuzzy Hash: 6AC1B174E00218CFEB54DFA5D944BADBBB2EF89304F2090AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 047f424946695f3ab31e262a4c32449d59ecae9cc100ecb9e212c9146c3eab6f
                                                    • Instruction ID: b3dfd8fdc6f6498f42dd26bc413a3ef4c07ccbb4dcbdeae652058fc0691f6dcf
                                                    • Opcode Fuzzy Hash: 047f424946695f3ab31e262a4c32449d59ecae9cc100ecb9e212c9146c3eab6f
                                                    • Instruction Fuzzy Hash: 27C1C078E00218CFEB54DFA5D984BADBBB2EF89300F1090AAD409AB355DB355E81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1529b221dfb39d1d0f0c13637fad74426cb54c382aedd8d3bd66584fac250b6d
                                                    • Instruction ID: f0044f348e7d246eb299f77fd89970c2c7a6164ada99d42f089ed8850016d89a
                                                    • Opcode Fuzzy Hash: 1529b221dfb39d1d0f0c13637fad74426cb54c382aedd8d3bd66584fac250b6d
                                                    • Instruction Fuzzy Hash: C6C1B274E00218CFEB54DFA9C944B9DBBB2EF88304F2091AAD409AB355DB355E81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 430d87ea7841d54940b4f49863bb66eb56941a4a70069ff88632189e58932335
                                                    • Instruction ID: f8dd5c1b903545cba61031fa663b49c888be30bab19bb6265a56cee9a1a16ca6
                                                    • Opcode Fuzzy Hash: 430d87ea7841d54940b4f49863bb66eb56941a4a70069ff88632189e58932335
                                                    • Instruction Fuzzy Hash: 2EC1AF74E00218CFEB54DFA5D994BADBBB2EF88304F1090AAD809AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 06c27a453450b4ddc78e88060d2b148d02795217e6c13dff99ed87ef23f93850
                                                    • Instruction ID: 6dfa6420223a28e6db4dd4e8cc75f32cd5d435bedd0983a39795e60282fc4b82
                                                    • Opcode Fuzzy Hash: 06c27a453450b4ddc78e88060d2b148d02795217e6c13dff99ed87ef23f93850
                                                    • Instruction Fuzzy Hash: 01C1B078E00218CFDB54DFA5D994BADBBB2EF88304F2090AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 243946fd8376ec401755f408a0ad4f5e16d34fb25c43bf3f933d7abfd5aa8322
                                                    • Instruction ID: 4f4b57f8c9d9f19de12b971a95072b77e93befe52038a8702a5c5779f5c7176b
                                                    • Opcode Fuzzy Hash: 243946fd8376ec401755f408a0ad4f5e16d34fb25c43bf3f933d7abfd5aa8322
                                                    • Instruction Fuzzy Hash: B9C1A074E00218CFEB54DFA5D994BADBBB2EF88300F1091AAD809AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ef0d4e2e4e4174a5e622713cc198340061478f3225e5c071a9bbf06ea08acbf
                                                    • Instruction ID: 87e4bb6a71dbb529fdde72d784dea730d9150b8886696b67021e73c68a45d260
                                                    • Opcode Fuzzy Hash: 7ef0d4e2e4e4174a5e622713cc198340061478f3225e5c071a9bbf06ea08acbf
                                                    • Instruction Fuzzy Hash: EAC1B174E00218CFDB54DFA5D984BADBBB2EF89300F2091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4704c2cfca050e700ef80a8de502cb74ff9c3f7e7b5bb82bc02959bc86868ba6
                                                    • Instruction ID: a1c2710532aebda6e3e20dc5e04c129b0473fd139d3ec8e09657eb184328701a
                                                    • Opcode Fuzzy Hash: 4704c2cfca050e700ef80a8de502cb74ff9c3f7e7b5bb82bc02959bc86868ba6
                                                    • Instruction Fuzzy Hash: A8C1A178E00218CFDB54DFA5D944BADBBB2EF88304F1091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8483c21750e218c3d3de29dc1cdede556d8ecb41b02ef46b65caa2a105051739
                                                    • Instruction ID: 82525e7d05029113f051b5010062336efe2d304f9ea2cb0f47735a041418b665
                                                    • Opcode Fuzzy Hash: 8483c21750e218c3d3de29dc1cdede556d8ecb41b02ef46b65caa2a105051739
                                                    • Instruction Fuzzy Hash: 36C18178E01218CFDB24DFA9D954BADBBB2FB89300F1081AAD809A7355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b9246c697b5c54e1a5e666dbc8cbaaa412fe626e2fe169ab9023a54b279f20b
                                                    • Instruction ID: d0ad940b7b08c4a4bdd7c0455d19b61e7d6f20ff21965fb346592d6bc150b194
                                                    • Opcode Fuzzy Hash: 3b9246c697b5c54e1a5e666dbc8cbaaa412fe626e2fe169ab9023a54b279f20b
                                                    • Instruction Fuzzy Hash: 6CC18074E00218CFDB14DFA9D954BADBBB2EF89300F1091AAD409AB365DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97be17b3b649bed2351d91bbbe7d678595179a8f547cc52a4d47a30cf405e210
                                                    • Instruction ID: 0af4da2f6e9c504912efbd0ed6028b7b13f45436bd3306fe5c4a44af811bcf6c
                                                    • Opcode Fuzzy Hash: 97be17b3b649bed2351d91bbbe7d678595179a8f547cc52a4d47a30cf405e210
                                                    • Instruction Fuzzy Hash: 39C18F74E00218CFEB14DFA5D994BADBBB2EF89300F1091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 650de5306bcc3b3fc2b06aacc27450400d405d16ed241adc0affb87e019db6c5
                                                    • Instruction ID: 54e698bd365aacfb2a5c1ab7d5b1ce6caeebadf444a0164090d7519e01f9a19c
                                                    • Opcode Fuzzy Hash: 650de5306bcc3b3fc2b06aacc27450400d405d16ed241adc0affb87e019db6c5
                                                    • Instruction Fuzzy Hash: F1C18074E00218CFDB54DFA5D994BADBBB2EF89300F1081AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 85c3eb9e577015c6e2c93a15ec1d878cb2c8b82cda97a8be901bd5768b751f01
                                                    • Instruction ID: 97c3c1b302efa677660347ee9acd7c59332ac3c501d4c16b794481d08a4c4d8e
                                                    • Opcode Fuzzy Hash: 85c3eb9e577015c6e2c93a15ec1d878cb2c8b82cda97a8be901bd5768b751f01
                                                    • Instruction Fuzzy Hash: 90C18F74E00218CFEB14DFA5D994BADBBB2EF89300F1091AAD809AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 69e9f196ec2359f5681aba48773c6e09bffa143dddc9e111eaba690da8daff45
                                                    • Instruction ID: d250e8d44dc8f8c93b865b4e2bf1608f8665a96e5082fcf2afdbfca9f21e51ea
                                                    • Opcode Fuzzy Hash: 69e9f196ec2359f5681aba48773c6e09bffa143dddc9e111eaba690da8daff45
                                                    • Instruction Fuzzy Hash: A2C19F74E01218CFDB14DFA5D994BADBBB2EF88304F2081AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17563a4f23c4518f12ede6b66dc642c3236665acef67ebf4f922c9dabd044d30
                                                    • Instruction ID: b625fe4cc6feafc93d383193c39fd0dc59f24c87a62840fa12ac2ceb39b5d470
                                                    • Opcode Fuzzy Hash: 17563a4f23c4518f12ede6b66dc642c3236665acef67ebf4f922c9dabd044d30
                                                    • Instruction Fuzzy Hash: 8BC18178E00218CFDB24DFA9D954BADBBB2FB89300F1081AAD809A7355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f05aa978133e24897020dc142d088304d79e242bd9e7a4e2bad8da1a78c5f60
                                                    • Instruction ID: 887ef95eb5c64270bd3b9d4fb5ede0805912f65fa6bfe080421ede985e951f76
                                                    • Opcode Fuzzy Hash: 2f05aa978133e24897020dc142d088304d79e242bd9e7a4e2bad8da1a78c5f60
                                                    • Instruction Fuzzy Hash: E2C18E74E00218CFDB14DFA5D994BADBBB2EF89300F1081AAD809AB355DB759E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 94a490957d16c49d29d0279a580a832aefcf7fe8e97912016dfa9bc821e2836b
                                                    • Instruction ID: ed4bffb6723ba14855f8c2d5ab1bd2e88b63c009e66e1cab49760c7c90e031df
                                                    • Opcode Fuzzy Hash: 94a490957d16c49d29d0279a580a832aefcf7fe8e97912016dfa9bc821e2836b
                                                    • Instruction Fuzzy Hash: 3EC19078E00218CFDB24DFA9D954BADBBB2FB89300F1081AAD809A7355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d47e4fdabf553cc198279cb3f84eaaf3db53cd40cbc49fa1ece86a0dfabebf8
                                                    • Instruction ID: 64ba40833ce35814732f734b5e4ed51e90d25d55bd02a880ed96c1a8b0489d0c
                                                    • Opcode Fuzzy Hash: 9d47e4fdabf553cc198279cb3f84eaaf3db53cd40cbc49fa1ece86a0dfabebf8
                                                    • Instruction Fuzzy Hash: 26C18074E00218CFEB14DFA5D994BADBBB2EF89300F2091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d0c6df121e4f7dbbc8a96f0ffaa3ae5e68f3f98ad7180e3d55d5a689e6e878d
                                                    • Instruction ID: 1d19b726171f8843040638981737a3a2f0eba48ba98c72cfdaa7ebbf9436be74
                                                    • Opcode Fuzzy Hash: 1d0c6df121e4f7dbbc8a96f0ffaa3ae5e68f3f98ad7180e3d55d5a689e6e878d
                                                    • Instruction Fuzzy Hash: EDC18F74E00218CFDB14DFA5D994BADBBB2EF89300F2091AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a63b9db416f26acd59125ffe195e8ed611cfbe5c0a5339b9012537216618dd36
                                                    • Instruction ID: 1b3619b46bff776935fde8af2c6b03e809253f35a55fae87d34866c29df0a2af
                                                    • Opcode Fuzzy Hash: a63b9db416f26acd59125ffe195e8ed611cfbe5c0a5339b9012537216618dd36
                                                    • Instruction Fuzzy Hash: A3C18178E00218CFDB64DFA9D954BADBBB2FB89300F1081AAD809A7355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f74f0bb51262abac6f8b1d7a43312c6b373a9f7b322a0d743051a7dbb5b42378
                                                    • Instruction ID: 6289813171914a4b4b3709f1c02f9f7067f5a9932e833559c10c289598118b23
                                                    • Opcode Fuzzy Hash: f74f0bb51262abac6f8b1d7a43312c6b373a9f7b322a0d743051a7dbb5b42378
                                                    • Instruction Fuzzy Hash: 0EC18F74E00218CFDB14DFA9D994BADBBB2EF89304F1081AAD409AB355DB359E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41e646518673eb0ce76bcc28a0491b22c4aa3ccc5875b74f3f77bbf5e6c65fb6
                                                    • Instruction ID: 34fc2550c8cb8a45082047ac569c1f32c02e851b070fd38519e890c8c7752392
                                                    • Opcode Fuzzy Hash: 41e646518673eb0ce76bcc28a0491b22c4aa3ccc5875b74f3f77bbf5e6c65fb6
                                                    • Instruction Fuzzy Hash: BDC18274E00218CFDB24DFA9D954BADBBB2FB89300F1081AAD809AB355DB755E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bd7b4373cbd7d91aa1e61bdd56a472c6328489a104abfbc9e943e0e67b7b236f
                                                    • Instruction ID: 4a1b9727795da171b8ccd7b1a321c8ce540c9899a1b91e96d5921318ebc990b3
                                                    • Opcode Fuzzy Hash: bd7b4373cbd7d91aa1e61bdd56a472c6328489a104abfbc9e943e0e67b7b236f
                                                    • Instruction Fuzzy Hash: D0C18F74E00218CFDB14DFA5D994BADBBB2EF89300F1081AAD409AB395DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 466c97382c7d10092432598d1b02b674a10112013fcb58d3a2d5590a3eb9a271
                                                    • Instruction ID: 152f0ddaffa603b24b873633d849b86848fe46b05078c20b809d21b23f9da8a1
                                                    • Opcode Fuzzy Hash: 466c97382c7d10092432598d1b02b674a10112013fcb58d3a2d5590a3eb9a271
                                                    • Instruction Fuzzy Hash: A6C18074E00218CFDB14EFA5D954BADBBB2EF89300F1091AAD409AB395DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dad4a792bdadd7092a7bf93ed00773542942a676971cac16ad60afa13759c462
                                                    • Instruction ID: a4b37a5a3ce4a4c22aa564adf4f0150f40ea160b521d79b7d2be7c91e71fc50d
                                                    • Opcode Fuzzy Hash: dad4a792bdadd7092a7bf93ed00773542942a676971cac16ad60afa13759c462
                                                    • Instruction Fuzzy Hash: A1C18F74E00218CFDB14DFA5D994BADBBB2EF89304F1081AAD409AB395DB359E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 873132bc6b1ecae9df3dbafded6d81a7229e94bdc10b378d6b671f425dbf626d
                                                    • Instruction ID: 83af5f3429214bcad758aa68b339bd4ad8a1a09472394794bd764527fd49c7dc
                                                    • Opcode Fuzzy Hash: 873132bc6b1ecae9df3dbafded6d81a7229e94bdc10b378d6b671f425dbf626d
                                                    • Instruction Fuzzy Hash: 02C18074E01218CFDB14DFA5D994BADBBB2EF89300F1081AAD409AB395DB359E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ecc796bb58b2e852586bb5502f805969e8842cecf9e0e55d8a7a347589ecc82
                                                    • Instruction ID: 470da94b7fa7f0e4aff015586cbb2ee440ac97da845b140b108e448856afd6ad
                                                    • Opcode Fuzzy Hash: 4ecc796bb58b2e852586bb5502f805969e8842cecf9e0e55d8a7a347589ecc82
                                                    • Instruction Fuzzy Hash: BFC18E74E00218CFDB14DFA5D994BADBBB2EF89304F2081AAD409AB365DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f4a62557ea3ff0f4b423a7e356c395bf98a4adb868826990a72c9191ff77c7bb
                                                    • Instruction ID: 8ade57a3d3aab6eb3ec5c577dbd2e0428448e7bc38e0e1abcbf198921fe258bc
                                                    • Opcode Fuzzy Hash: f4a62557ea3ff0f4b423a7e356c395bf98a4adb868826990a72c9191ff77c7bb
                                                    • Instruction Fuzzy Hash: D5C18E74E00218CFDB14DFA5D994BADBBB2EF89300F1091AAD409AB365DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 537355ed18de9a8f0b07de5117aac9027a4f512c1cdf1b12e5b0632b0372f133
                                                    • Instruction ID: c6b0bf9726ba8eb9e3bc77c35e66686db2635b6d22d00cc1c324f63210f2fcac
                                                    • Opcode Fuzzy Hash: 537355ed18de9a8f0b07de5117aac9027a4f512c1cdf1b12e5b0632b0372f133
                                                    • Instruction Fuzzy Hash: 4FC18F74E00218CFDB14DFA5D994BADBBB2EF89300F2091AAD809AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 98047d4f7ad617086788e422e075fc1e1f63473dc059e1890f08e4dde3016d9a
                                                    • Instruction ID: a3b08aa93280290a8c8dfb5418a362c005dfe59cb8bbbf76321f8af7ad46b14d
                                                    • Opcode Fuzzy Hash: 98047d4f7ad617086788e422e075fc1e1f63473dc059e1890f08e4dde3016d9a
                                                    • Instruction Fuzzy Hash: 96C18F74E00218CFDB14DFA5D994BADBBB2EF89304F1081AAD409AB355DB355E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e08f21f30321118e751b3672b19c69e5fa05e41cae218e67759c65ff6fb0f69
                                                    • Instruction ID: 1455ebfae3c76986fd8dccbebc93f5273e768a63f9fb0a5a770e02d9286025fa
                                                    • Opcode Fuzzy Hash: 1e08f21f30321118e751b3672b19c69e5fa05e41cae218e67759c65ff6fb0f69
                                                    • Instruction Fuzzy Hash: 1BB1A678E01218CFDB54DFA9D884A9DBBB2FF89310F1181A9D819AB365DB34AD41CF50
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b731c86710b2579234fea573809411fc643c2fa09f6bdb759eca22240518368b
                                                    • Instruction ID: dd5f6d133f252224eaf74ca6029152551227b0cac58e02f49d087ca7886bc858
                                                    • Opcode Fuzzy Hash: b731c86710b2579234fea573809411fc643c2fa09f6bdb759eca22240518368b
                                                    • Instruction Fuzzy Hash: 10A10870D00218CFEB24DFA9C844BEDBBB1FF88314F20926AD459A72A1DB759985CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4612812820.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_5d80000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 861c29d22de4f5c57f4a2d920cbb2d9a7bf2ce6e47862e8075a60adec97a519b
                                                    • Instruction ID: f00aa1d7ccd0472aa530c61ae4169694847a7b47b0c9820d3b5e13f50e5cba44
                                                    • Opcode Fuzzy Hash: 861c29d22de4f5c57f4a2d920cbb2d9a7bf2ce6e47862e8075a60adec97a519b
                                                    • Instruction Fuzzy Hash: 1C91F674D00218CFEB14EFA8C884BECBBB1FF49314F20929AD459A7291DB759986CF15
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 87634c025f9fa27d763a6d84f74a356d60bf0832f302692481e2d95023d1674b
                                                    • Instruction ID: f0ba869ed5f5c1ee1258f4726376bd2c1d374a95d1d4aa9d62102b9162e0b7b4
                                                    • Opcode Fuzzy Hash: 87634c025f9fa27d763a6d84f74a356d60bf0832f302692481e2d95023d1674b
                                                    • Instruction Fuzzy Hash: C0A18D74A01228CFDB64DF65C994BDABBB2BF89301F1085EAD409A7360DB719E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4615369183.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_6ea0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 81aefc5ba1775fa9513969cd43cd9a431fdacc4c12a66aec8108498f56fc75e0
                                                    • Instruction ID: e3c67fa5bc8458467e92f8d18b3ded6cc5b5ab079d26af57872444564d49b8c9
                                                    • Opcode Fuzzy Hash: 81aefc5ba1775fa9513969cd43cd9a431fdacc4c12a66aec8108498f56fc75e0
                                                    • Instruction Fuzzy Hash: 8E51B374E017088FDB48DFAAD984A9DBBF2FF89300F249169D419AB364DB34A941CF54
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.4605552812.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_14b0000_Order_List.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 42184d21a2746c4e99ea41491032c1e681f2e50e0e1420752e7098a8f73cc95c
                                                    • Instruction ID: bd54b480de37e4507b728cd36c7d0f89f09f6ad18d065f00ffa6a4d503189aa0
                                                    • Opcode Fuzzy Hash: 42184d21a2746c4e99ea41491032c1e681f2e50e0e1420752e7098a8f73cc95c
                                                    • Instruction Fuzzy Hash: 47519F74A01228CFCB64DF24D894BDABBB2BF4A301F5085EAD40AA7354CB719E81CF50

                                                    Execution Graph

                                                    Execution Coverage:10.8%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:41
                                                    Total number of Limit Nodes:5
                                                    execution_graph 23645 80e020 DuplicateHandle 23646 80e0b6 23645->23646 23601 691f850 23602 691f898 WriteProcessMemory 23601->23602 23604 691f8ef 23602->23604 23605 691f790 23606 691f7d0 VirtualAllocEx 23605->23606 23608 691f80d 23606->23608 23613 691f940 23614 691f98b ReadProcessMemory 23613->23614 23616 691f9cf 23614->23616 23617 80ba58 23618 80ba67 23617->23618 23620 80bb40 23617->23620 23621 80bb61 23620->23621 23622 80bb84 23620->23622 23621->23622 23623 80bb7c 23621->23623 23627 80bdd8 23621->23627 23622->23618 23623->23622 23624 80bd88 GetModuleHandleW 23623->23624 23625 80bdb5 23624->23625 23625->23618 23628 80bd88 GetModuleHandleW 23627->23628 23630 80bde2 23627->23630 23629 80bdb5 23628->23629 23629->23623 23630->23623 23631 80ddd8 23632 80de1e GetCurrentProcess 23631->23632 23634 80de70 GetCurrentThread 23632->23634 23635 80de69 23632->23635 23636 80dea6 23634->23636 23637 80dead GetCurrentProcess 23634->23637 23635->23634 23636->23637 23638 80dee3 23637->23638 23639 80df0b GetCurrentThreadId 23638->23639 23640 80df3c 23639->23640 23609 691fad8 23610 691fb61 CreateProcessA 23609->23610 23612 691fd23 23610->23612 23612->23612 23641 691f608 23642 691f648 ResumeThread 23641->23642 23644 691f679 23642->23644 23647 691f6b8 23648 691f6fd Wow64SetThreadContext 23647->23648 23650 691f745 23648->23650

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0080DE56
                                                    • GetCurrentThread.KERNEL32 ref: 0080DE93
                                                    • GetCurrentProcess.KERNEL32 ref: 0080DED0
                                                    • GetCurrentThreadId.KERNEL32 ref: 0080DF29
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 518dc417c2fae620a1aea0c18547362ac69b182022507916de5e6ed6d64390f7
                                                    • Instruction ID: f5ee2cd36ae5e619b9e7c6e5a679905921e5aa333ae7756c1c6c80ddaa0a1b29
                                                    • Opcode Fuzzy Hash: 518dc417c2fae620a1aea0c18547362ac69b182022507916de5e6ed6d64390f7
                                                    • Instruction Fuzzy Hash: AC5176B0901309CFEB44DFA9D948BAEBBF1FF88314F208459D109A7391DB749944CB65

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0080DE56
                                                    • GetCurrentThread.KERNEL32 ref: 0080DE93
                                                    • GetCurrentProcess.KERNEL32 ref: 0080DED0
                                                    • GetCurrentThreadId.KERNEL32 ref: 0080DF29
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 2fc384c467f8fe64ea0ed2f6c5e35975952453b93155f9caa70350aa0fb05988
                                                    • Instruction ID: 168e746332bf38cde8297136dc62433aa1229d9407986034ff1ef7402c5738df
                                                    • Opcode Fuzzy Hash: 2fc384c467f8fe64ea0ed2f6c5e35975952453b93155f9caa70350aa0fb05988
                                                    • Instruction Fuzzy Hash: 5B5167B0901309CFDB44DFAAD948BAEBBF1FF88314F208459E509A7390DB75A944CB65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 334 691face-691fb6d 336 691fba6-691fbc6 334->336 337 691fb6f-691fb79 334->337 344 691fbc8-691fbd2 336->344 345 691fbff-691fc2e 336->345 337->336 338 691fb7b-691fb7d 337->338 339 691fba0-691fba3 338->339 340 691fb7f-691fb89 338->340 339->336 342 691fb8b 340->342 343 691fb8d-691fb9c 340->343 342->343 343->343 346 691fb9e 343->346 344->345 347 691fbd4-691fbd6 344->347 353 691fc30-691fc3a 345->353 354 691fc67-691fd21 CreateProcessA 345->354 346->339 349 691fbf9-691fbfc 347->349 350 691fbd8-691fbe2 347->350 349->345 351 691fbe4 350->351 352 691fbe6-691fbf5 350->352 351->352 352->352 355 691fbf7 352->355 353->354 356 691fc3c-691fc3e 353->356 365 691fd23-691fd29 354->365 366 691fd2a-691fdb0 354->366 355->349 358 691fc61-691fc64 356->358 359 691fc40-691fc4a 356->359 358->354 360 691fc4c 359->360 361 691fc4e-691fc5d 359->361 360->361 361->361 363 691fc5f 361->363 363->358 365->366 376 691fdc0-691fdc4 366->376 377 691fdb2-691fdb6 366->377 379 691fdd4-691fdd8 376->379 380 691fdc6-691fdca 376->380 377->376 378 691fdb8 377->378 378->376 382 691fde8-691fdec 379->382 383 691fdda-691fdde 379->383 380->379 381 691fdcc 380->381 381->379 385 691fdfe-691fe05 382->385 386 691fdee-691fdf4 382->386 383->382 384 691fde0 383->384 384->382 387 691fe07-691fe16 385->387 388 691fe1c 385->388 386->385 387->388 390 691fe1d 388->390 390->390
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0691FD0E
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: cac963814a067ca2d216718da03f7c111e4fb4f9c55e814030dd37308fbd801a
                                                    • Instruction ID: f79d7e87eb51d8dabcf44da52472af86e5d58fbbb61e033465b9e42eea67c30e
                                                    • Opcode Fuzzy Hash: cac963814a067ca2d216718da03f7c111e4fb4f9c55e814030dd37308fbd801a
                                                    • Instruction Fuzzy Hash: 84A12771D0021D8FEF64CF69C841BEDBBF6AB48310F2485AAD819AB240DB759985CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 391 691fad8-691fb6d 393 691fba6-691fbc6 391->393 394 691fb6f-691fb79 391->394 401 691fbc8-691fbd2 393->401 402 691fbff-691fc2e 393->402 394->393 395 691fb7b-691fb7d 394->395 396 691fba0-691fba3 395->396 397 691fb7f-691fb89 395->397 396->393 399 691fb8b 397->399 400 691fb8d-691fb9c 397->400 399->400 400->400 403 691fb9e 400->403 401->402 404 691fbd4-691fbd6 401->404 410 691fc30-691fc3a 402->410 411 691fc67-691fd21 CreateProcessA 402->411 403->396 406 691fbf9-691fbfc 404->406 407 691fbd8-691fbe2 404->407 406->402 408 691fbe4 407->408 409 691fbe6-691fbf5 407->409 408->409 409->409 412 691fbf7 409->412 410->411 413 691fc3c-691fc3e 410->413 422 691fd23-691fd29 411->422 423 691fd2a-691fdb0 411->423 412->406 415 691fc61-691fc64 413->415 416 691fc40-691fc4a 413->416 415->411 417 691fc4c 416->417 418 691fc4e-691fc5d 416->418 417->418 418->418 420 691fc5f 418->420 420->415 422->423 433 691fdc0-691fdc4 423->433 434 691fdb2-691fdb6 423->434 436 691fdd4-691fdd8 433->436 437 691fdc6-691fdca 433->437 434->433 435 691fdb8 434->435 435->433 439 691fde8-691fdec 436->439 440 691fdda-691fdde 436->440 437->436 438 691fdcc 437->438 438->436 442 691fdfe-691fe05 439->442 443 691fdee-691fdf4 439->443 440->439 441 691fde0 440->441 441->439 444 691fe07-691fe16 442->444 445 691fe1c 442->445 443->442 444->445 447 691fe1d 445->447 447->447
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0691FD0E
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: b8e753407657a88801417a12595a7284a7c74edcd64f0ad81a97ede75099c584
                                                    • Instruction ID: 25490d0667ac7dfaad7695fd794fafba037e521c7b9e966fcd3f11764917057a
                                                    • Opcode Fuzzy Hash: b8e753407657a88801417a12595a7284a7c74edcd64f0ad81a97ede75099c584
                                                    • Instruction Fuzzy Hash: C8913871D0021D8FEF64CF69C8417EDBBF6AF48310F2485AAD819AB240DB759985CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 448 80bb40-80bb5f 449 80bb61-80bb6e call 80a554 448->449 450 80bb8b-80bb8f 448->450 455 80bb70 449->455 456 80bb84 449->456 452 80bb91-80bb9b 450->452 453 80bba3-80bbe4 450->453 452->453 459 80bbf1-80bbff 453->459 460 80bbe6-80bbee 453->460 503 80bb76 call 80bdd8 455->503 504 80bb76 call 80bde8 455->504 456->450 461 80bc01-80bc06 459->461 462 80bc23-80bc25 459->462 460->459 464 80bc11 461->464 465 80bc08-80bc0f call 80b554 461->465 467 80bc28-80bc2f 462->467 463 80bb7c-80bb7e 463->456 466 80bcc0-80bd80 463->466 469 80bc13-80bc21 464->469 465->469 498 80bd82-80bd85 466->498 499 80bd88-80bdb3 GetModuleHandleW 466->499 470 80bc31-80bc39 467->470 471 80bc3c-80bc43 467->471 469->467 470->471 473 80bc50-80bc59 call 80b564 471->473 474 80bc45-80bc4d 471->474 479 80bc66-80bc6b 473->479 480 80bc5b-80bc63 473->480 474->473 481 80bc89-80bc96 479->481 482 80bc6d-80bc74 479->482 480->479 489 80bc98-80bcb6 481->489 490 80bcb9-80bcbf 481->490 482->481 484 80bc76-80bc86 call 80b574 call 80b584 482->484 484->481 489->490 498->499 500 80bdb5-80bdbb 499->500 501 80bdbc-80bdd0 499->501 500->501 503->463 504->463
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0080BDA6
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: b0bf8b95ea4da09adadfc62b179b8da46c765b603468202d757a1963269caf31
                                                    • Instruction ID: 680ccf933b69e31c90d722190a3840a6033cb70ad486a27711e0a42388a77610
                                                    • Opcode Fuzzy Hash: b0bf8b95ea4da09adadfc62b179b8da46c765b603468202d757a1963269caf31
                                                    • Instruction Fuzzy Hash: C9816670A00B458FE764DF69D85175ABBF1FF88300F008A2DD48ADBA91DB75E846CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 505 80590c-805916 506 805918-8059d9 CreateActCtxA 505->506 508 8059e2-805a3c 506->508 509 8059db-8059e1 506->509 516 805a4b-805a4f 508->516 517 805a3e-805a41 508->517 509->508 518 805a60 516->518 519 805a51-805a5d 516->519 517->516 521 805a61 518->521 519->518 521->521
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 008059C9
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 4dbbaf5e9b7236561a396bf4e9c43d7b74705046ffe9c95aecff3a36f76d9463
                                                    • Instruction ID: 1a2f74c6d24e0b25fc6aae964b1d94cf454d453ad443e8088ca88dd8b720ad5b
                                                    • Opcode Fuzzy Hash: 4dbbaf5e9b7236561a396bf4e9c43d7b74705046ffe9c95aecff3a36f76d9463
                                                    • Instruction Fuzzy Hash: 0E41E2B1C00719CFDB24CFA9C885B9EBBB5FF45704F20815AD409AB251DB756945CF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 522 804514-8059d9 CreateActCtxA 525 8059e2-805a3c 522->525 526 8059db-8059e1 522->526 533 805a4b-805a4f 525->533 534 805a3e-805a41 525->534 526->525 535 805a60 533->535 536 805a51-805a5d 533->536 534->533 538 805a61 535->538 536->535 538->538
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 008059C9
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 919bf72a79921506aba17d0b62e612db683fb4f311a04c380defb63ee4ec85d9
                                                    • Instruction ID: 15aa6c82581ff557d8e6984a0eead23759bbf7c08a0c1a0aa069a62e1224a786
                                                    • Opcode Fuzzy Hash: 919bf72a79921506aba17d0b62e612db683fb4f311a04c380defb63ee4ec85d9
                                                    • Instruction Fuzzy Hash: 5141E1B0C0071DCBDB24DFA9C844B9EBBB5FF48704F20815AD409AB295DB756945CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 539 691f848-691f89e 541 691f8a0-691f8ac 539->541 542 691f8ae-691f8ed WriteProcessMemory 539->542 541->542 544 691f8f6-691f926 542->544 545 691f8ef-691f8f5 542->545 545->544
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0691F8E0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: f288dffc38be680ba0746d4ac9b8bb8a2567c90b87592c8b46ba345c7a37aad4
                                                    • Instruction ID: 20546666f2ee0c5a93bd9f6289e06a7e78857307b416a910922fdf7448364210
                                                    • Opcode Fuzzy Hash: f288dffc38be680ba0746d4ac9b8bb8a2567c90b87592c8b46ba345c7a37aad4
                                                    • Instruction Fuzzy Hash: B3212871D003599FDB10CFAAC885BEEBBF4FF88310F20842AE959A7240C7789954CB64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 549 691f850-691f89e 551 691f8a0-691f8ac 549->551 552 691f8ae-691f8ed WriteProcessMemory 549->552 551->552 554 691f8f6-691f926 552->554 555 691f8ef-691f8f5 552->555 555->554
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0691F8E0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: e936f1e7af26f179fca3576c4aa341b25df977cc34763e51ffdeea569512442f
                                                    • Instruction ID: 82567736f85a0ad050d86ab5689a266869ebe9e0e4846e8634d607bd99932f9c
                                                    • Opcode Fuzzy Hash: e936f1e7af26f179fca3576c4aa341b25df977cc34763e51ffdeea569512442f
                                                    • Instruction Fuzzy Hash: B7211571D003499FDB10CFAAC885BDEBBF5FF48310F24842AE919A7240C7789954CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 559 691f938-691f9cd ReadProcessMemory 562 691f9d6-691fa06 559->562 563 691f9cf-691f9d5 559->563 563->562
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0691F9C0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 909baf9dc4e23570efb529e76380bd7e9f35d963e59bdb41eebb33f1d52a8388
                                                    • Instruction ID: 3c4a9ac88e1ae7fbc45e06a4be00d4813c532535797f11a9eaf2a08c70a3fc39
                                                    • Opcode Fuzzy Hash: 909baf9dc4e23570efb529e76380bd7e9f35d963e59bdb41eebb33f1d52a8388
                                                    • Instruction Fuzzy Hash: 5E212771D003499FDB10DFAAC881BEEBBF4FF48310F20842AE559A7250D7749901CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 567 691f6b1-691f703 569 691f713-691f716 567->569 570 691f705-691f711 567->570 571 691f71d-691f743 Wow64SetThreadContext 569->571 570->569 572 691f745-691f74b 571->572 573 691f74c-691f77c 571->573 572->573
                                                    APIs
                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0691F736
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 4aefac3447d0d9586e83f54aa97941b2b1a32082ca29735589beeec649fa73db
                                                    • Instruction ID: f80195dd27eb0d33d1209561eebef040ecc70da0eb857846a8bde30b789e350e
                                                    • Opcode Fuzzy Hash: 4aefac3447d0d9586e83f54aa97941b2b1a32082ca29735589beeec649fa73db
                                                    • Instruction Fuzzy Hash: 03212571D003098FDB54CFAAC4857EEBBF4EF88314F24842AD559A7240C7789945CFA5
                                                    APIs
                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0691F736
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 1fb1e985810904a2c02c5fff82d3bfa2c5781adedf3536e5976f8b28f923d7f5
                                                    • Instruction ID: 4493bf23ae51ee9f8c2fb4a3bd472c7935095e3552ebd43549e29cf6e3ccb956
                                                    • Opcode Fuzzy Hash: 1fb1e985810904a2c02c5fff82d3bfa2c5781adedf3536e5976f8b28f923d7f5
                                                    • Instruction Fuzzy Hash: 8D214971D003098FDB50DFAAC4857EEBBF4EF88324F24842AD519A7240CB78A945CFA5
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0691F9C0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 74ae0ad240abb6d8e4b724180755786e63dadc8343411361b991e9da6ac5b4a5
                                                    • Instruction ID: 12c5469a6768be8ec714ec8def02c8c17c6ee65691a134fc4ac757342fe2f192
                                                    • Opcode Fuzzy Hash: 74ae0ad240abb6d8e4b724180755786e63dadc8343411361b991e9da6ac5b4a5
                                                    • Instruction Fuzzy Hash: E02128B1C003499FDB10DFAAC881BDEBBF5FF48310F20842AE559A7240D7789910CBA5
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0080E0A7
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 99763d7713b4c1f89e799cfa088750bfe55be62f6981be7afb026d6df15ede0e
                                                    • Instruction ID: 86e92c632c4926f7894ad3fe3c7c775a5c1449d6b200b32c05efa8ce6f2a224a
                                                    • Opcode Fuzzy Hash: 99763d7713b4c1f89e799cfa088750bfe55be62f6981be7afb026d6df15ede0e
                                                    • Instruction Fuzzy Hash: 8621FFB5900209DFDB10CFAAD980ADEBBF9FB48320F14845AE918A3250C778A954CF60
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0080E0A7
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: d9289ba865631a832d694502c1e479d2c290656c37da9db174fcabd1e083ffa7
                                                    • Instruction ID: c7d9765b33ce9202c0cb8ffd0ccbef358485adbd97445c3051814be9c3713f3e
                                                    • Opcode Fuzzy Hash: d9289ba865631a832d694502c1e479d2c290656c37da9db174fcabd1e083ffa7
                                                    • Instruction Fuzzy Hash: F221B3B5D00249DFDB10CF9AD984ADEBBF9FB48320F14841AE914A3250D375A954CF65
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0080BDA6
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 996792c31b9ca86dfd1c17c2f93d37e9014785a3028145f2863e09f03299c84c
                                                    • Instruction ID: 0ec9c8af1807b1246832c23293035a9354aa99d83fd4594d451ea184ee57a22a
                                                    • Opcode Fuzzy Hash: 996792c31b9ca86dfd1c17c2f93d37e9014785a3028145f2863e09f03299c84c
                                                    • Instruction Fuzzy Hash: 4811C1726042458FD7519BAADC007AABBF9FFC5320F0484AAD544D7292CB749845CBA1
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0691F7FE
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: b57b2e58bae39552b844c02c97f019e8c9ad6f3a215ff5791d61150509d6922b
                                                    • Instruction ID: e95df523347ddfaf82493efa4178bf69a4116210f2883acd4e589167c264d32d
                                                    • Opcode Fuzzy Hash: b57b2e58bae39552b844c02c97f019e8c9ad6f3a215ff5791d61150509d6922b
                                                    • Instruction Fuzzy Hash: 22111A71C003499FDB10CFAAD8457DEBBF5AF88320F248519E51AA7250C7759550CFA5
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0691F7FE
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 3cbfc416042e808cac406942e4cdc206bbba8641eddf43f41251a744090de271
                                                    • Instruction ID: 634236efa16ba0361c336eb846a0f4f236ca8f0bf45cc9b24e2f83de5eb53b47
                                                    • Opcode Fuzzy Hash: 3cbfc416042e808cac406942e4cdc206bbba8641eddf43f41251a744090de271
                                                    • Instruction Fuzzy Hash: DE112672C003499FDB10DFAAC845BDEBBF5AF88720F248419E51AA7250C775A950CBA5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: ed99e389fcf6d54a966f1d92728db4274b5804c3878dc4113f6a07399b55ebd8
                                                    • Instruction ID: 6ff9975e97dabdf7a30f695ac281bd7b20508cb56e6dbbc0ed448cee3d62de93
                                                    • Opcode Fuzzy Hash: ed99e389fcf6d54a966f1d92728db4274b5804c3878dc4113f6a07399b55ebd8
                                                    • Instruction Fuzzy Hash: A01134B1D003498FDB20CFAAC8457AEBBF4AF88724F24841ED55AA7250CB756904CBA4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2282880348.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6910000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: edb09f9165d2115a0e8fb07c4ad3ffab1c0c004acb5f71c01356e22681bc7761
                                                    • Instruction ID: 2194e04b8407e59487d6a6bd61fb91a24d218c712b6e341289c4684ba740e027
                                                    • Opcode Fuzzy Hash: edb09f9165d2115a0e8fb07c4ad3ffab1c0c004acb5f71c01356e22681bc7761
                                                    • Instruction Fuzzy Hash: 1A113AB1D0074D8FDB20DFAAC84579EFBF4AF88724F248419D519A7240CB756944CBA5
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0080BDA6
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276500616.0000000000800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_800000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 1fbf1398ab9a3ee86312c42945a7344bb6108795cd967ba5cb684c8ba135e7f9
                                                    • Instruction ID: 425cfadd5239d83cea04425e80cbbf2f97cc79a10d881e0e3e5c7676c247c554
                                                    • Opcode Fuzzy Hash: 1fbf1398ab9a3ee86312c42945a7344bb6108795cd967ba5cb684c8ba135e7f9
                                                    • Instruction Fuzzy Hash: 1D1102B5C002498FDB10CF9AC844ADEFBF4FF88320F14841AD819A7240D375A945CFA1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d2b496af812b6a76b6a868a0005ee83f569c38a612d2c4fede47b703dac2a590
                                                    • Instruction ID: 1b3cfacf3802b0d407ac621fc02d4d507bcb8db3b998ab463ab505749cc0eb4e
                                                    • Opcode Fuzzy Hash: d2b496af812b6a76b6a868a0005ee83f569c38a612d2c4fede47b703dac2a590
                                                    • Instruction Fuzzy Hash: 342128B2504240EFDB15EF14D9C0F26BF66FB84318F20C66AD9090B296C336D856CBB2
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 32161d8f5c0d16131fad5577e13f08f7ac557128b4a84dc3cddee9e316ea803c
                                                    • Instruction ID: 6b58903dbccaa7301d5907177b83128285794dd8f7e4a8f124222c6c873860f1
                                                    • Opcode Fuzzy Hash: 32161d8f5c0d16131fad5577e13f08f7ac557128b4a84dc3cddee9e316ea803c
                                                    • Instruction Fuzzy Hash: F0210875504204EFDB04EF14D5C0B1ABFA6FB94324F20C269D9090B296C376E856CBB1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276264930.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6ad000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6cd96107c131ad57b453ce9900bc0ce9a5080c2f1ad69f58ea34b84d9986212a
                                                    • Instruction ID: 6a1d67592165401745ca95ee2da02cfb21d568ea5d8023412d21dfc751bd654d
                                                    • Opcode Fuzzy Hash: 6cd96107c131ad57b453ce9900bc0ce9a5080c2f1ad69f58ea34b84d9986212a
                                                    • Instruction Fuzzy Hash: ED210075604200EFCB14EF24D980B26BBA2EB89314F20C56DD90A4B792C77ADC47CE61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276264930.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6ad000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ceeb833b180944a84c683407e4bccc582137acd3a9994870785ca185cba86da4
                                                    • Instruction ID: 381a9c804e00d18a4983caab16da4ead82bc425875948ee3ccc77c0f109dbbf8
                                                    • Opcode Fuzzy Hash: ceeb833b180944a84c683407e4bccc582137acd3a9994870785ca185cba86da4
                                                    • Instruction Fuzzy Hash: 79213475504200EFDB04EF10D9C0B2ABBA2FB85314F20C5ADEA0A4B792C77ADC06CE61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276264930.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6ad000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 96fa661d1381780b36293c295374e765ff33f5fced15650cbce84a8afe74a00f
                                                    • Instruction ID: 3b7623bece1d3117c9e3186aafbabe5c10cafec876bd0aa367b82906543a44c6
                                                    • Opcode Fuzzy Hash: 96fa661d1381780b36293c295374e765ff33f5fced15650cbce84a8afe74a00f
                                                    • Instruction Fuzzy Hash: C72180755083809FCB02DF14D994B11BF71EB46314F28C5DAD8498F6A7C33A9C06CB62
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                    • Instruction ID: bf4e24d6fbdaef3ff46e3eb8c79dfe80ed7bbfb9f501bb497f3e19b7d7721d71
                                                    • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                    • Instruction Fuzzy Hash: 7F11E6B6504280DFCB15DF10D5C4B5ABF72FB94318F24C6AAD8490B756C33AD856CBA2
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                    • Instruction ID: f9bc490035ae35c9fe1a2b5e4814e81a4c89529a72660e8d88941d9c6151459e
                                                    • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                    • Instruction Fuzzy Hash: 7A11D676504244DFCB15DF10D5C4B56BFB2FB94314F24C6A9D8090B756C33AD456CBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276264930.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_6ad000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction ID: b3b83a987fb22cfe445336c481bc57d923fbc7a638c30f4a267576938895674a
                                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction Fuzzy Hash: B111BB75504280DFCB01DF10C5C4B55BBA2FB85314F24C6A9D94A4B7A6C33AD80ACF61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1368b16f54bac1e4becdf70e63640489594898c98025778d6ba6268de16c5d5c
                                                    • Instruction ID: 4c19e1b2c287c9fbcf1e0851be4d0cae86a49719e2f8b18eb63398aad8fc1d42
                                                    • Opcode Fuzzy Hash: 1368b16f54bac1e4becdf70e63640489594898c98025778d6ba6268de16c5d5c
                                                    • Instruction Fuzzy Hash: 7E012671404384AAF7206F25CD84B67BF98DF41364F18C61AEE091F2C2C7B99841CBB1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2276143599.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_68d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d335456636c90ad507f7ccda229dae86b093c31a93091457cdc80b26b6915119
                                                    • Instruction ID: 5564b20d2f37bf942ea3a3e2c7053d8c1a06eed20b935f565c5fd5666b149a44
                                                    • Opcode Fuzzy Hash: d335456636c90ad507f7ccda229dae86b093c31a93091457cdc80b26b6915119
                                                    • Instruction Fuzzy Hash: A9F0C2714043449AE7109E16CC88B62FF98EB81734F18C15AED481B2C6C3799844CBB1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 744cf815fdc8b02eec1b0186f49591b6fe71c3375af2a75711e48df29b9c03a4
                                                    • Instruction ID: d576a0e1823dbee8a8dbfc4b95f48bc667e8f46146656bb00873d5acda2a2886
                                                    • Opcode Fuzzy Hash: 744cf815fdc8b02eec1b0186f49591b6fe71c3375af2a75711e48df29b9c03a4
                                                    • Instruction Fuzzy Hash: 9772C330B00209CFCB15DF68C984AAEBBF6FF88314F158559E985AB7A1D735E941CB50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 005f9a090d2d05e11786be74145c03fd0a3e91a46608ffc64641c67f7da32b2c
                                                    • Instruction ID: 82ae4f16eee3f4d535a781701ca0f972653a51a70a9892154fffcb23d048110c
                                                    • Opcode Fuzzy Hash: 005f9a090d2d05e11786be74145c03fd0a3e91a46608ffc64641c67f7da32b2c
                                                    • Instruction Fuzzy Hash: 2D12AC70A002199FDB18DFA9C854AAEBBF6BFC8300F148569E589DB391DF359D41CB80
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 47a8dd73b721b375ad10b00d8d15cffa72cf53abd2c193a3cccab48d39f8180f
                                                    • Instruction ID: 3cf9bf99b9a602d9c5adceb70d8d1165dd4fcc282de7ce91ddb15705cb5890c0
                                                    • Opcode Fuzzy Hash: 47a8dd73b721b375ad10b00d8d15cffa72cf53abd2c193a3cccab48d39f8180f
                                                    • Instruction Fuzzy Hash: 63029170A00209DFDB55CF69C984AADBBFAFF88310F1480AAE585AB265D736DD41CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d3a8509c27b1171278aa0d26eed91dd65d97e953dca96d93cf58a467310108fb
                                                    • Instruction ID: 046ecb710e48868140ed95c9a7ee139ef7cedc10b89a4d3c8aec879d2e975605
                                                    • Opcode Fuzzy Hash: d3a8509c27b1171278aa0d26eed91dd65d97e953dca96d93cf58a467310108fb
                                                    • Instruction Fuzzy Hash: F1F16A34E013489FDB08EFB5D8545AEBBB6BFC8700B14856EE446EB354DB359842CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b7f902750fb10a11d3800e08ecbe0f1dade0d3d5d26997fd89ee6bdab30b6671
                                                    • Instruction ID: c3a5276bae724e53ee5e5b6a73a72fe576cb0e08fcf1383ac09ed20fa4001062
                                                    • Opcode Fuzzy Hash: b7f902750fb10a11d3800e08ecbe0f1dade0d3d5d26997fd89ee6bdab30b6671
                                                    • Instruction Fuzzy Hash: 23E1F6B4A00258DFDB14DFA9C984A9DBBF5BF48300F1580A9E949EB362DB30ED41CB50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97c0504e12517255708f6cd5dfaa017c3c3792a21bab2059332cf9256e7eaa0c
                                                    • Instruction ID: 3d26c749cb3ed1c3289bcbcc9c5e87e60a1a01f6db80088a015c98768d87158e
                                                    • Opcode Fuzzy Hash: 97c0504e12517255708f6cd5dfaa017c3c3792a21bab2059332cf9256e7eaa0c
                                                    • Instruction Fuzzy Hash: 82E1E074E01218CFEB24DFA5C984B9DBBB2BF89300F2081A9D409A7395DB755E85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de66d1eb412143ea73ce5ac29e012ff67b0441628ce6e2d33f13481923864f6b
                                                    • Instruction ID: 7ebcb67e4933768ebc1bc803fddfd6cbcb08e6025f9f686cbdd6593588116082
                                                    • Opcode Fuzzy Hash: de66d1eb412143ea73ce5ac29e012ff67b0441628ce6e2d33f13481923864f6b
                                                    • Instruction Fuzzy Hash: 1FA1A274E012288FEB28CF6AC945B9DBAF2BF89300F14D1AAD40DB7255DB745A85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01e240b6496a37a1a76381994c7600a3534252fee7e67d5951481bfabc39c80c
                                                    • Instruction ID: 2b7a1a387eb7a41f3fc620890e9d617c2d657083f1a63d2a3f6d51d8b6c48b72
                                                    • Opcode Fuzzy Hash: 01e240b6496a37a1a76381994c7600a3534252fee7e67d5951481bfabc39c80c
                                                    • Instruction Fuzzy Hash: 8CA19174E012288FEB28CF6AC945B9DBAF2BF89310F14C1AAD409B7255DB745A85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 247ee1169f3f7f9f1ec52190acc573d596cc1da561266268e6b1083b38ddb6a5
                                                    • Instruction ID: c0d8a84da3570fc5f7f21be265f29061f2d821bd4755937748f3040f7793a275
                                                    • Opcode Fuzzy Hash: 247ee1169f3f7f9f1ec52190acc573d596cc1da561266268e6b1083b38ddb6a5
                                                    • Instruction Fuzzy Hash: 76A19175E01228CFEB28CF6AC945B9DBAF2BF89310F14C1AAD449A7255DB345A85CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 53d9c44a73e6b5e7ed5b1c05af05b250abf410ebd200e2a8e4d20c42f4177f12
                                                    • Instruction ID: 777a777603325f12d410b4b7a9e224a378490d987d086b42b71dc242ecfbf958
                                                    • Opcode Fuzzy Hash: 53d9c44a73e6b5e7ed5b1c05af05b250abf410ebd200e2a8e4d20c42f4177f12
                                                    • Instruction Fuzzy Hash: ACA1A175E01228CFEB28CF6AC945B9DBAF2BF89300F14C1AAD409B7255DB745A85CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bb615600db4e1f568d03290f7a4200d325e84328c46c2a74597b046c07d35133
                                                    • Instruction ID: bdbd1185078814073007dff216fecbfc9190f70107628d4ded03120acaa5007b
                                                    • Opcode Fuzzy Hash: bb615600db4e1f568d03290f7a4200d325e84328c46c2a74597b046c07d35133
                                                    • Instruction Fuzzy Hash: F5A1A174E01228CFEB28DF6AC945B9DBAF2BF89310F14C1AAD40DA7255DB745A85CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 572f68eaab6834bae35642c79150802ea764fe83f402e20a53e56238210251fb
                                                    • Instruction ID: 300614fc64d5311470cb9e507cbcee6e0db9d6b2f4dfc203ef3721f66878b204
                                                    • Opcode Fuzzy Hash: 572f68eaab6834bae35642c79150802ea764fe83f402e20a53e56238210251fb
                                                    • Instruction Fuzzy Hash: F3A19074E01228CFEB28CF6AC945B9DBAF2BF89300F14C1AAD40DA7255DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f211491ef954ecc9bfce1af8dc918e3fe58ea149d43796f50f5e37bef589242
                                                    • Instruction ID: b9b7c9a6092f359719fbbe000fba10045fc45123e6413052e18bde1c5d9d1919
                                                    • Opcode Fuzzy Hash: 2f211491ef954ecc9bfce1af8dc918e3fe58ea149d43796f50f5e37bef589242
                                                    • Instruction Fuzzy Hash: E9A19274E012188FEB28CF6AC945B9DBBF2BF89310F14C1AAD40DA7255DB745A85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ac2e27c21a132fb33523d6ef8ba9c7d66ddc11fc3af4449d101e72a9ae53aa80
                                                    • Instruction ID: 9061296e80b7d86bf3555508ad17313d29a03e86cee38a69847db51c6b52f734
                                                    • Opcode Fuzzy Hash: ac2e27c21a132fb33523d6ef8ba9c7d66ddc11fc3af4449d101e72a9ae53aa80
                                                    • Instruction Fuzzy Hash: 59A1AF74E012288FEB28CF6AC945B9DFAF2BF89310F14C1AAD40DA7255DB705A85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8621ab161bded3e5fd67412135c3c4fb508a3d75b70d687043547825fcf99a0a
                                                    • Instruction ID: d9ee750622d88170aba073ab560124e6b3f4ae74faa308284d895abf38d004a4
                                                    • Opcode Fuzzy Hash: 8621ab161bded3e5fd67412135c3c4fb508a3d75b70d687043547825fcf99a0a
                                                    • Instruction Fuzzy Hash: A7A1A174E012288FEB28CF6AC945B9DBBF2BF89300F14C1AAD44DA7255DB745A85CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f71a380fea75de1ca342bb4e4c82325d6ce273c869e96d51eace7c2d6d7e362
                                                    • Instruction ID: 97b7602ef71fdda6f567e52b827fe6d2f7ce5b65720b018f8e1fdbbab219363a
                                                    • Opcode Fuzzy Hash: 6f71a380fea75de1ca342bb4e4c82325d6ce273c869e96d51eace7c2d6d7e362
                                                    • Instruction Fuzzy Hash: 5881D275E01219CFDB64DF6AD9947DDBBF6BF89300F1490AAD408AB254DB359A81CF00
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef588f6f94d9b72db02d046cc6afd9870d8f0f81ca82d10a9dd4e35253ddbb91
                                                    • Instruction ID: b005edd7e6ca1c10e6637303dfc9a269da1edd19206815ca69bd0dbc52c86f96
                                                    • Opcode Fuzzy Hash: ef588f6f94d9b72db02d046cc6afd9870d8f0f81ca82d10a9dd4e35253ddbb91
                                                    • Instruction Fuzzy Hash: 5C91D574E00248CFEB54DFA9D994A9DBBF2BF89300F14C069E449AB365DB709986CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fc3d2a3d76fda5d3c5adee1c28fecce21f4d5d9cf4542a835b1ffba3348faab6
                                                    • Instruction ID: 63c15be99f69c091187e2df96eaa42bf3f05f7e7c21d5c8ae24f0b02fcbd9aad
                                                    • Opcode Fuzzy Hash: fc3d2a3d76fda5d3c5adee1c28fecce21f4d5d9cf4542a835b1ffba3348faab6
                                                    • Instruction Fuzzy Hash: A081D574E00218DFEB54DFAAD984A9DBBF2BF89310F14C069E449AB365DB709981CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 45c9ff4a8ac1bcd03b36b509c2ac05e677c9ef9d6c4247ded1f97c02a57d9104
                                                    • Instruction ID: e254f8e4a5011c08f6aeb8053a0fa293faae908fd1c4e1c7474358fde112e946
                                                    • Opcode Fuzzy Hash: 45c9ff4a8ac1bcd03b36b509c2ac05e677c9ef9d6c4247ded1f97c02a57d9104
                                                    • Instruction Fuzzy Hash: 2681D574E00218DFEB54DFAAD984A9DBBF2BF89300F14C069E449AB365DB709981CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e0d4ced77e534e6194d5e5bdb77143f2c3cc8271af0e8c82ff610f5298d61153
                                                    • Instruction ID: b6a7f447a2946298923fa5c1a760c2ed514362f6b87655f1387fc2ce35e413a3
                                                    • Opcode Fuzzy Hash: e0d4ced77e534e6194d5e5bdb77143f2c3cc8271af0e8c82ff610f5298d61153
                                                    • Instruction Fuzzy Hash: 3C81E074E00218CFDB58DFAAD884BADBBF2BF89300F20816AD419AB395DB705945CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70ace2df2231cbad2f0f348d412213f81eddfe75a3f8c5082c78620d86b40221
                                                    • Instruction ID: ccf859ec1c6b8d31b7bde1c675c884bca8b145a934ed95d40813774f1ef0076d
                                                    • Opcode Fuzzy Hash: 70ace2df2231cbad2f0f348d412213f81eddfe75a3f8c5082c78620d86b40221
                                                    • Instruction Fuzzy Hash: 0181E474E00218CFEB58DFAAD984A9DBBF2BF88310F14D069E449AB365DB309941CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48efa5772aa0cdb57c127581014e81e200057221ce9ad487c1cc8f7313603ee8
                                                    • Instruction ID: 697c5619c6b9115d5ef214de341fd962716831a18bfaa0c464cc8f2e45d1f990
                                                    • Opcode Fuzzy Hash: 48efa5772aa0cdb57c127581014e81e200057221ce9ad487c1cc8f7313603ee8
                                                    • Instruction Fuzzy Hash: 3481D374E00258DFEB54DFAAD984A9DBBF2BF88300F14D069E449AB365DB709981CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c0051c508e68a2a39cb63013a5985ca6620d552061db201b862eb718d273ba63
                                                    • Instruction ID: 2120562491c6fe6eef56befe1bbe37ae8e3dce04bdfb27fc5cdc779a8dabf573
                                                    • Opcode Fuzzy Hash: c0051c508e68a2a39cb63013a5985ca6620d552061db201b862eb718d273ba63
                                                    • Instruction Fuzzy Hash: 0281D274E00258DFDB58DFA9D994A9DBBF2BF88310F14C069E849AB365DB709981CF10
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b897a3fad2b08218381a236de4bd3308b230319311c1592fb923df3764f1d38d
                                                    • Instruction ID: 7261a98aadbb840846cb322c06b0ad083775f13e6189e264696961752cd10fe3
                                                    • Opcode Fuzzy Hash: b897a3fad2b08218381a236de4bd3308b230319311c1592fb923df3764f1d38d
                                                    • Instruction Fuzzy Hash: 0181A571E01668CFEB28CF6AC945B9DBAF2AF89300F14C0EAD50DA7255DB304A85CF51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 303dafd664caaded7372ec2f7151ffd850871267789390005a8cfbe8686228eb
                                                    • Instruction ID: 62fe84bf74fccff3c36fd4807116b94880e1a8273f84d08b4ac98535d57a0ed6
                                                    • Opcode Fuzzy Hash: 303dafd664caaded7372ec2f7151ffd850871267789390005a8cfbe8686228eb
                                                    • Instruction Fuzzy Hash: E87193B1E01618CFEB68CF6AC945B9DBBF2AF89300F14C1AAD40DA7255DB344A85CF11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 703d858a9197ad8214a22c784c883932907c971834167638932c4e3bb09385b8
                                                    • Instruction ID: 554eeadd2e8e6e3c1616a7bbbaaf2769834217a5d68f0db770981111891d475e
                                                    • Opcode Fuzzy Hash: 703d858a9197ad8214a22c784c883932907c971834167638932c4e3bb09385b8
                                                    • Instruction Fuzzy Hash: 6561E4B4E006489FDB18DFAAD944A9DBBF6FF89300F14C069E458AB365EB345942CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ffee8d2c3c9129e71b9253d68ffdd52a821ec4c51b8b9ece6e0715533323846e
                                                    • Instruction ID: d01a812d5af3d9bee01d405b91007362224161c08ad362757973eace6a9a87c2
                                                    • Opcode Fuzzy Hash: ffee8d2c3c9129e71b9253d68ffdd52a821ec4c51b8b9ece6e0715533323846e
                                                    • Instruction Fuzzy Hash: 10718671E01618CFEB68CF6AC945B9DFAF2AF89300F14C0AAD50DA7255DB344A85CF51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 320a2a0233a43b9fc5e9563b5e213ef7925802dbba774cb65d6679e62291e56e
                                                    • Instruction ID: d6b4a8c6e3b1a481d5649583ae1e9efea37737a008676588fd69da73a43fedaf
                                                    • Opcode Fuzzy Hash: 320a2a0233a43b9fc5e9563b5e213ef7925802dbba774cb65d6679e62291e56e
                                                    • Instruction Fuzzy Hash: 1441E2B0E012088BEB18DFAAC8447DEBBF2BF88310F24C16AD458BB254DB754946CF14
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8817a3898be9a283c0564adcfbfee50fb1dda22d126338f17cf221e792d7812f
                                                    • Instruction ID: 64364d4c4c689fa732024506e37ce1dd0f8703b3a9da4eb933da413acd7258ef
                                                    • Opcode Fuzzy Hash: 8817a3898be9a283c0564adcfbfee50fb1dda22d126338f17cf221e792d7812f
                                                    • Instruction Fuzzy Hash: E04189B1E016188BEB58CF6BCD45789FAF3AFC9310F14C1BAC50CA6265DB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5dbca7563c66bad4ef4128974bca159bd9526ec8ae8534b8f29ec627bd085fff
                                                    • Instruction ID: 7e9e7b0637ef974bf525571d4ed08d2813fcc6e8bca80c06f71738b0da327fd0
                                                    • Opcode Fuzzy Hash: 5dbca7563c66bad4ef4128974bca159bd9526ec8ae8534b8f29ec627bd085fff
                                                    • Instruction Fuzzy Hash: 054158B1E016188BEB58DF6BC94578AFAF3BFC8310F14C1AAC50CA6265DB750A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af6a7a9829d4fd9299cdc135853b2d9703ceeb1c5cd064572e4f6b7cdbf25f80
                                                    • Instruction ID: 281f9cc14b791fe167bba55af1734a663e1f3193b1477917c50fc81967c225d6
                                                    • Opcode Fuzzy Hash: af6a7a9829d4fd9299cdc135853b2d9703ceeb1c5cd064572e4f6b7cdbf25f80
                                                    • Instruction Fuzzy Hash: 064159B1E016188FEB58CF6BD945799FAF3BFC8310F04C1AAC50CA6255EB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f710eddbad613c0e7d83c1700250073a63b47a021205a308d6a1e4c5c53bc602
                                                    • Instruction ID: 86aec14125d86ed19bee17e4967176fed64965276b4bb7b0f3bfb970f07d7ca1
                                                    • Opcode Fuzzy Hash: f710eddbad613c0e7d83c1700250073a63b47a021205a308d6a1e4c5c53bc602
                                                    • Instruction Fuzzy Hash: 8B4168B1E016188BEB58CF6BD9457CAFAF3AFC8300F04C1AAD50CA6254EB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 54a3c220888e8a63e5bf162832014c9c5a05ab85eb0d08ef19461ea23e653e44
                                                    • Instruction ID: da160bfe0873affed8c5b4c209510735f21cfd0888d7afdc4af184f554a1b383
                                                    • Opcode Fuzzy Hash: 54a3c220888e8a63e5bf162832014c9c5a05ab85eb0d08ef19461ea23e653e44
                                                    • Instruction Fuzzy Hash: 244159B1E016188BEB58CF6BDD4578AFAF3AFC8310F14C1AAC50CA6255EB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d77c331e0924e82b28066aa604c6703f417a319d5edd0924035b5c667d5525d9
                                                    • Instruction ID: 16262ed25204b810066095c6604c2f571a77eedfb53da8dfe103700e61c98aa8
                                                    • Opcode Fuzzy Hash: d77c331e0924e82b28066aa604c6703f417a319d5edd0924035b5c667d5525d9
                                                    • Instruction Fuzzy Hash: 0A4169B1E016188FEB58CF6BC9457CAFAF3AFC8310F14C1AAD50CA6265DB740A858F51
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3adbe2bdb22d8c5109e8bd085431f376254f1a9398e1b52618f661e604dafb00
                                                    • Instruction ID: a65b820f2e3146ddef4eb12b75bcca2900cef027a72311722d68896a62127222
                                                    • Opcode Fuzzy Hash: 3adbe2bdb22d8c5109e8bd085431f376254f1a9398e1b52618f661e604dafb00
                                                    • Instruction Fuzzy Hash: 8162FA30C163269BCF68CF348D855BB7BB4AF49260B28876EF5C9E5245E2394B60C7D1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c27254746f70746116443f4e605894d929bd1c580570328a99267d3f93b219d
                                                    • Instruction ID: df410b89d2cbfd46ff9447b20e5820a2de2ef4f1ebd0b245d94546e0a971d98f
                                                    • Opcode Fuzzy Hash: 7c27254746f70746116443f4e605894d929bd1c580570328a99267d3f93b219d
                                                    • Instruction Fuzzy Hash: 46526474A00259CFEB549BE4C860BAEBB72FF85300F1081A9D24A6B356DF345D85DF61
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7bf37e1858cba92fae2ea882e5ced8410ecf05a3140252d5e1534c5ef241083a
                                                    • Instruction ID: d55d6c2038e4e86387a0982ebe2296241c152ce6511df4f9fc670c3301399862
                                                    • Opcode Fuzzy Hash: 7bf37e1858cba92fae2ea882e5ced8410ecf05a3140252d5e1534c5ef241083a
                                                    • Instruction Fuzzy Hash: 97126B30A00249CFDB15DF69C884AAEBBF6FF88318F158599E985DB261DB31ED41CB50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be9faa77a805eec64b691a2fd0c16b3a2854ce9a4e12c9e66c5f8c16c9a3d1d1
                                                    • Instruction ID: 2ca5669f5fd208bd00ad67a67aaff9d621257ce497b203d3985fa114234b73b8
                                                    • Opcode Fuzzy Hash: be9faa77a805eec64b691a2fd0c16b3a2854ce9a4e12c9e66c5f8c16c9a3d1d1
                                                    • Instruction Fuzzy Hash: 4AF11B75B00215CFCB05DFACC9849ADBBFABF88310B1A8599E555AB362CB35EC41CB50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aff20cba9ec58ad7767d65b5aa0e74d00e5d4fa08a2079a3d4e2b141a506bc87
                                                    • Instruction ID: bdbf51728764a87112485008bd9100d9dece03ac41ea57f1b62b7ddc7552f302
                                                    • Opcode Fuzzy Hash: aff20cba9ec58ad7767d65b5aa0e74d00e5d4fa08a2079a3d4e2b141a506bc87
                                                    • Instruction Fuzzy Hash: 62224D7490121ACFCB54EF28E994B8DBBB1FF88314F1085AAD849AB719EB305E45CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4dff52019ea6133b09f5f487a69f325e1938abc6d43e7a2ff7ce4e903a5b9709
                                                    • Instruction ID: 29a05c6131804c23adb1bd40fa3a86d4060c5e17df2239fcb821d99fa92433ec
                                                    • Opcode Fuzzy Hash: 4dff52019ea6133b09f5f487a69f325e1938abc6d43e7a2ff7ce4e903a5b9709
                                                    • Instruction Fuzzy Hash: 61224C7490121ACFCB54EF68E994B8DBBB1FF88315F1085AAD849AB718EB305E45CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4eb547255aeffc08bf837784ae993df87abe19ec65867c9a4cbc53b4748247ce
                                                    • Instruction ID: f6b272d9bb0e36b6703ff24623b6a849fc388e4f112534bb48838701523790b6
                                                    • Opcode Fuzzy Hash: 4eb547255aeffc08bf837784ae993df87abe19ec65867c9a4cbc53b4748247ce
                                                    • Instruction Fuzzy Hash: D4B141703147018FEB599B2DC958B3D3ADEEF85604F1894ABE682DF3A1EA29CC41C751
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6267d2017f1a7e327495ac5b45394ac3785223191ef0f145106be79c16be8769
                                                    • Instruction ID: ab3c1e402ebf1441d0a8556efa1c0eea27cfd5063e62bb272d509a40fcb32c27
                                                    • Opcode Fuzzy Hash: 6267d2017f1a7e327495ac5b45394ac3785223191ef0f145106be79c16be8769
                                                    • Instruction Fuzzy Hash: 5B91BE307042448FDB66AF68D858B7E7BE6BFC9340F14846AE5868B796DF398C01C791
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb13664a6c32cf60dabcffc8f4abc460a7be11f85e1b56972f993e7c6ff911e2
                                                    • Instruction ID: fd059b917d5502b6531e9d4957e7af856608463ff47944781f705c22adfbaf85
                                                    • Opcode Fuzzy Hash: cb13664a6c32cf60dabcffc8f4abc460a7be11f85e1b56972f993e7c6ff911e2
                                                    • Instruction Fuzzy Hash: 9081A130A00509CFCB58DF6DCC8896DBBFABF89390B1481A9D545DB3A5DB31D842CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4995014df81ebf18ff5839a10a28af8b9128cfe7f43c7b79f7ce39372de28761
                                                    • Instruction ID: dbcbb85b47f1a9a4c9b661115234954d8674d72abe2873cf49d6a77d003106bb
                                                    • Opcode Fuzzy Hash: 4995014df81ebf18ff5839a10a28af8b9128cfe7f43c7b79f7ce39372de28761
                                                    • Instruction Fuzzy Hash: C271E631F002199BDB19DFB8C855AAEBBB2AFC8710F14412AE506B7381DF749D42DB91
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: db189700b9d7b0c0018f25af7a11e872a2cd011454d38bc48ef89cd0cff4ffff
                                                    • Instruction ID: 45dd49eb0547fb4d89a5a0d32007895e04f86b89fc6561516f3f8bbcabf8ee7b
                                                    • Opcode Fuzzy Hash: db189700b9d7b0c0018f25af7a11e872a2cd011454d38bc48ef89cd0cff4ffff
                                                    • Instruction Fuzzy Hash: FF7139307002458FDB65DF2CC898AAD7BE9AF49618F1500E9E986CB3B1DB75DC41CB91
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6302dfcbc3a66e64c032c8dcd32a5f3a88c75be92d2a72e7bbdce75f6452707b
                                                    • Instruction ID: 698156be6b5f0c8838146f4fe553b02129bc5a9e2a2fae2c8daa38222b0124b0
                                                    • Opcode Fuzzy Hash: 6302dfcbc3a66e64c032c8dcd32a5f3a88c75be92d2a72e7bbdce75f6452707b
                                                    • Instruction Fuzzy Hash: A051B1300297468FD6243BA4B5AC66F7BA1FB1F327700BE04A8CEC11A9CF7A54458F24
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e1e1c7150949be26037fa7b35ffcae4c7168256d622dd3c53bb384de8b2e471
                                                    • Instruction ID: c6692409e45fa9b802b8756324c6220f13281154907ec85c1d6b86b9efdf9a50
                                                    • Opcode Fuzzy Hash: 9e1e1c7150949be26037fa7b35ffcae4c7168256d622dd3c53bb384de8b2e471
                                                    • Instruction Fuzzy Hash: 9751AF300297068FD6243BA4B5AC66F7BA5FB1F327740BE00A9CEC11A9CF7A54548F24
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5652b3b33e6082993a382ef5af077bc4d680be0ae7fb3955e3444c6b691b0fed
                                                    • Instruction ID: c2b41ab814bc127769482047189f6815ae1e09e971cfc359507aea3b392c7d57
                                                    • Opcode Fuzzy Hash: 5652b3b33e6082993a382ef5af077bc4d680be0ae7fb3955e3444c6b691b0fed
                                                    • Instruction Fuzzy Hash: 23611174E01218DFDB14DFE4D854AADBBB2FF88304F208529D849AB396DB765945CF40
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a742b67de6f8fd4b9bf42bd43a4befff54e6d2435d851d0188955e5b71109434
                                                    • Instruction ID: 0b367e12a27b7013605a91fac75efca90bd79b98692f2d432e2618c5f5c4f888
                                                    • Opcode Fuzzy Hash: a742b67de6f8fd4b9bf42bd43a4befff54e6d2435d851d0188955e5b71109434
                                                    • Instruction Fuzzy Hash: 27519474E01208DFDB48DFAAD9849DDBBF2BF89300F248169E519AB365DB31A901CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49e2c1f9aa73dc5c3859094f5862e03219f4f3585eb2ae3c97c48633f87142f1
                                                    • Instruction ID: c11bc20231b4da266ca684653a3cb2eb9225d224a6f61f9069bb0bf555a541c0
                                                    • Opcode Fuzzy Hash: 49e2c1f9aa73dc5c3859094f5862e03219f4f3585eb2ae3c97c48633f87142f1
                                                    • Instruction Fuzzy Hash: 74415B3590631ACFD704AFB0E46C7EE7BB1FB49316F104929D546A32A5CB780A48CF60
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aca2d9e4da61f5bffd8430cf15ada3526ac85bbaf78644c93f94dd6d7478d76f
                                                    • Instruction ID: c32f1ea15ad17dfe2fb6a9b4e2cce6f30601d8056f7ce178cbf2ffed8ea043ff
                                                    • Opcode Fuzzy Hash: aca2d9e4da61f5bffd8430cf15ada3526ac85bbaf78644c93f94dd6d7478d76f
                                                    • Instruction Fuzzy Hash: 3F51B674E01248CFCB48DFA9D99499DBBF2FF89315B208569E815AB324DB31AD42CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 58e6e57df32ba97e613115bd82c81eda7bf50a5b2e5e3797bde66fbab7ba921e
                                                    • Instruction ID: 96f24ef4052125e02e1f53ded1400e3da6bdbc8444e03ba4ab42be9ddab23d9d
                                                    • Opcode Fuzzy Hash: 58e6e57df32ba97e613115bd82c81eda7bf50a5b2e5e3797bde66fbab7ba921e
                                                    • Instruction Fuzzy Hash: 1C51E631A04249DFCF12CFA8C844A9DBFF6EF49318F048596E9819F696D335D914CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a051c18e544226aee4b090b45dcf365e72d17b87708d1ff77638e08659b25c2
                                                    • Instruction ID: 48ef16d2aca5f78336ec45df14428742f1d42f5d4001438c5e75a0f0a1325ac6
                                                    • Opcode Fuzzy Hash: 6a051c18e544226aee4b090b45dcf365e72d17b87708d1ff77638e08659b25c2
                                                    • Instruction Fuzzy Hash: 6741F2357042049FCB19AB68D804AAE7BF6BFC9710F1484A9E686E7391DE369C01C790
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c64aece9763d6abfb9c1efb921eaa280ddfadb52172fa177f6006643853d94d8
                                                    • Instruction ID: 788901273c57218c33d685dc51b876805dc53752e3feb726da1d23f27fd84bfd
                                                    • Opcode Fuzzy Hash: c64aece9763d6abfb9c1efb921eaa280ddfadb52172fa177f6006643853d94d8
                                                    • Instruction Fuzzy Hash: 6D416231E10219DBDB14DFA5C881ADEB7B6BF88710F148229E512B7341EB70AD45DB90
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fc3d295fa5e459df92ca75a31736b41f2c10651968117617a52c5d7e5cf76818
                                                    • Instruction ID: c2e9f13131c1d1e8ec58e40ce7d7ffadd28286ac96a9d52a30691a32713c2716
                                                    • Opcode Fuzzy Hash: fc3d295fa5e459df92ca75a31736b41f2c10651968117617a52c5d7e5cf76818
                                                    • Instruction Fuzzy Hash: 1541DFB8D01219CFDB04EFA5D598BEDBBF2BF48314F20912AD805A7298EB745A45CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 60a6904dd25b92870e63c5d09781237274a0434facb7698e2888dc2b30105548
                                                    • Instruction ID: 594234dcba400818f0703bb9cf7eab8b10d0f0c715913f9ad2feb1c8d3eb9ab4
                                                    • Opcode Fuzzy Hash: 60a6904dd25b92870e63c5d09781237274a0434facb7698e2888dc2b30105548
                                                    • Instruction Fuzzy Hash: DF415774E04248CFCB14DFE8D494AEDBBBAFB49304F209119D0CAAB255E7799842CF25
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca484f6204f2d458ab4ef715a8d71b4adfc1d05a0d58dafc899fa20d3eaaa3c9
                                                    • Instruction ID: e77a18c59609a84edcba4638f718b99a5630258402bf779dafdf0215630ffeac
                                                    • Opcode Fuzzy Hash: ca484f6204f2d458ab4ef715a8d71b4adfc1d05a0d58dafc899fa20d3eaaa3c9
                                                    • Instruction Fuzzy Hash: 48417670E04248CFCB00EFE8D884AEDBBBAFB49304F109219D4C9A7255E7799842CF25
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ce5ac11526cec9a97961a4bc16748259dd2bd8eb71e90f4cd14551b7d829d5f
                                                    • Instruction ID: 79ae2ab743fcdc126023a2f6710c92f09f8a21d2e185cbd06af9304f462d9787
                                                    • Opcode Fuzzy Hash: 1ce5ac11526cec9a97961a4bc16748259dd2bd8eb71e90f4cd14551b7d829d5f
                                                    • Instruction Fuzzy Hash: 0741C078E01209CFDB04EFA5D594BEDBBF2BF88314F10912AD805A7298EB745A46CF50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4152491508591638bf0c8e75d3e52edc0182cfa265f67d946af6fcc3570830aa
                                                    • Instruction ID: 0d0f7f9f65dc3804baa220986f22cd63c20db595388d6cb4a310e96bf0a72739
                                                    • Opcode Fuzzy Hash: 4152491508591638bf0c8e75d3e52edc0182cfa265f67d946af6fcc3570830aa
                                                    • Instruction Fuzzy Hash: A2414570E00248CFCB10DFE8D494AEDBBFAFB49304F209229D489A7255E7799842CF55
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de66deabf97fa6f5796b2e872e639738bdc39580a50a303e6a715d0c37c4c9d2
                                                    • Instruction ID: 90939d561fb09aecd13380cb58f0ccf1c96a6c303ab58459485fa501e7a2baf3
                                                    • Opcode Fuzzy Hash: de66deabf97fa6f5796b2e872e639738bdc39580a50a303e6a715d0c37c4c9d2
                                                    • Instruction Fuzzy Hash: 02410770E01248CBDB04DFA9D444AEEFBFABF89304F14D129D488A7255EB759842CF65
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9de41aa9d30e913a228c7a0185b317ba1cd3d29c6f6ad7482c521c9d095c30ba
                                                    • Instruction ID: 6e8c44f8a1cefed5a61ea8572cd121baf72666ccb5982c2ee3f41c52aeb7926d
                                                    • Opcode Fuzzy Hash: 9de41aa9d30e913a228c7a0185b317ba1cd3d29c6f6ad7482c521c9d095c30ba
                                                    • Instruction Fuzzy Hash: 7D31A031708149EFCB55AFA8D854AAF7FA6FB88300F104015FA95C7245CB39CD21DBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 92d2ecd479c32ec690f0d91972c4739dd2db7bb64a66d8858d90d895d08597a5
                                                    • Instruction ID: 06b66a1261be3a6881223411a929e72dad6e94bc47398958e35cc5821b259ac5
                                                    • Opcode Fuzzy Hash: 92d2ecd479c32ec690f0d91972c4739dd2db7bb64a66d8858d90d895d08597a5
                                                    • Instruction Fuzzy Hash: 7D31D13180635ACFD700AFB1E82C7EEBBB1FB4A312F004859D545A72A5CB780A48CF60
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29aae58307c3f56b731389ecc7ee90ef7fb41bcd838411eb1c408f89f28c6450
                                                    • Instruction ID: 5b3c76537d847c2fcfdb78d8fa800546c3cdbcff4c1f53cb923804146352b5d9
                                                    • Opcode Fuzzy Hash: 29aae58307c3f56b731389ecc7ee90ef7fb41bcd838411eb1c408f89f28c6450
                                                    • Instruction Fuzzy Hash: CF21A7343046454BEB26173D8C5463D7ADBBFC961D71440B9D581CB796EE2D8C41E781
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9f78c333b4254770548f8a186fee090acd062d4fa38eabf98f09706700b1fcba
                                                    • Instruction ID: 462f82286ab2eb5391937e400ef0153c00abfd7992f486c5fd2446962c9365ca
                                                    • Opcode Fuzzy Hash: 9f78c333b4254770548f8a186fee090acd062d4fa38eabf98f09706700b1fcba
                                                    • Instruction Fuzzy Hash: D431B770B00505CFCB04DF6DC8849AEBBB6FF85350B258559E595AB3A2CB359C02CBA0
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b3318421629ab0716704de02ccc08b21d95435d57965f0f76c112a751e5e5f0
                                                    • Instruction ID: 763c1b09ff2274cd7f04474d4ed4cf46faf3180f9bec0331b14a791489c5c970
                                                    • Opcode Fuzzy Hash: 3b3318421629ab0716704de02ccc08b21d95435d57965f0f76c112a751e5e5f0
                                                    • Instruction Fuzzy Hash: 1721B171E00249CBDB04DFEAD8046EDBBFAEFCA300F04D465D584A72A5DB708545CB65
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f454c20f68e0ce8a0e904a7b8016bc96e136e50b6ba6f93cb9b958373a229dfb
                                                    • Instruction ID: 225c5ef09237482b0ac8fe302cbb39dfd5fb9233de73463326bcc5d74c4aa1e7
                                                    • Opcode Fuzzy Hash: f454c20f68e0ce8a0e904a7b8016bc96e136e50b6ba6f93cb9b958373a229dfb
                                                    • Instruction Fuzzy Hash: CC2195343142054BEB2516398854A7E36DFBFC871DF1440B9D682CB799EE6DCC81E781
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10ac1b0ec00bd711c5cd4792846796d97fee2288af8f7a7f1382276f6d029f60
                                                    • Instruction ID: a53654dbdb27e9c574b884121354037f8b8ffaf3308702fd22eb0d51f3319f88
                                                    • Opcode Fuzzy Hash: 10ac1b0ec00bd711c5cd4792846796d97fee2288af8f7a7f1382276f6d029f60
                                                    • Instruction Fuzzy Hash: 1D215A31D10209DECF01EFE8E8146ECFBB8EF0A315F009665D9847B254EB70AA5ACB54
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f7feca10aa2231ae8d75193d85fa837d4d74d5393aebab25d022ece438dcd48
                                                    • Instruction ID: ac9be5beb63eab2ff59621daf72c839dac4f0d9ab393123802dd0def3afb27eb
                                                    • Opcode Fuzzy Hash: 7f7feca10aa2231ae8d75193d85fa837d4d74d5393aebab25d022ece438dcd48
                                                    • Instruction Fuzzy Hash: 6721C735A00105DFCF14DF64C8509AE77BAEB9D260F10C85DE9498B385EB32EA41CBD1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8648461705c6483ed608f17adad750b3084c487adef6babb2e11ea3e3f25e92c
                                                    • Instruction ID: 99a6fa631b8510c720d9b25af20bf3a47193d64d4ca64749708f6d0c734999ba
                                                    • Opcode Fuzzy Hash: 8648461705c6483ed608f17adad750b3084c487adef6babb2e11ea3e3f25e92c
                                                    • Instruction Fuzzy Hash: F321C0317056159BD725AB29C8A492EBBAAFB8879071441A9E986CB354DE35DC02CBC0
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4605324469.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_d0d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef2a11324c6f6fa8231328a6a8c3cde61070878ce505414323760ad2509f6daf
                                                    • Instruction ID: 202eeb8900d0137ce6342fd39c00a63343a006b4646914db13e259f945c09473
                                                    • Opcode Fuzzy Hash: ef2a11324c6f6fa8231328a6a8c3cde61070878ce505414323760ad2509f6daf
                                                    • Instruction Fuzzy Hash: 1E213475504304EFCB14CF60D9C0B26BB62FB84314F24C56EE94D0B292CB7AD846CA72
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c3e639c3d256d2136c762c76aeeaffaf30eb58adb0471011b586505f6f4e0be1
                                                    • Instruction ID: 25fbcfcb30e975f3adab3454194776245661a4faea6a34f0d03255a79816cc00
                                                    • Opcode Fuzzy Hash: c3e639c3d256d2136c762c76aeeaffaf30eb58adb0471011b586505f6f4e0be1
                                                    • Instruction Fuzzy Hash: E3113D367043685FDB4A6FB8586466E3FB3DFC9250B14442AE505EB3C1DF384D028796
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bc757c6c731580f16334a90203854e793e8d9268663a934579e2c4e93fa53d46
                                                    • Instruction ID: 537bd027c31e21f4bd34d035a4d5a3074c36a01eb0d87aa723c6dbc37eff3a7b
                                                    • Opcode Fuzzy Hash: bc757c6c731580f16334a90203854e793e8d9268663a934579e2c4e93fa53d46
                                                    • Instruction Fuzzy Hash: 081125317182948FD70506799C1427BBEAFAFCA220B588077E985C7397DD298C069771
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d9dc5cf3bd2214d4f6c14d857f1b46ee99e3a5916fdb85a9f8943b25df0b327e
                                                    • Instruction ID: bd1f380c2c562a4cbd8b7fc22026470cb2492b59c9eacd07104b881beb70e9bb
                                                    • Opcode Fuzzy Hash: d9dc5cf3bd2214d4f6c14d857f1b46ee99e3a5916fdb85a9f8943b25df0b327e
                                                    • Instruction Fuzzy Hash: DF117F70E006488BDB04DFAAC8086DEFBF6AFCD301F04C065D488AB255EB3049468F55
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d2cccb74201c12edd728af0289c250e105caeb4016f58ebe4ec0ff4faa86af8
                                                    • Instruction ID: 1101330ca41779a2e00ba2d6171814e4b96e4c9562fe94901a03d79500a1a428
                                                    • Opcode Fuzzy Hash: 6d2cccb74201c12edd728af0289c250e105caeb4016f58ebe4ec0ff4faa86af8
                                                    • Instruction Fuzzy Hash: 2F21927090524ADFDB45EFB8D95069EBFF1FF85304F0095A9C1489B326EB705A468B81
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70cbe6cc8520d334a0fdf2f8143e36785a52f233146076672773b30f33af395a
                                                    • Instruction ID: 472a59b067412066c7aa64d4fd73c068135737af98738c998315d7087ec60af3
                                                    • Opcode Fuzzy Hash: 70cbe6cc8520d334a0fdf2f8143e36785a52f233146076672773b30f33af395a
                                                    • Instruction Fuzzy Hash: B021C2B4C04249CFCB41EFA8D8455EEBFF1BF49300F5051AAD849B7224EB355A95CBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 948ef9ce0e3abccdf02a48c827b1da8b20277e9e0697313932b1ec82141472b2
                                                    • Instruction ID: 8fa6ff88f6491cf8c065174bd36ca2de305ded31f95eca91c1b46291eb823fc9
                                                    • Opcode Fuzzy Hash: 948ef9ce0e3abccdf02a48c827b1da8b20277e9e0697313932b1ec82141472b2
                                                    • Instruction Fuzzy Hash: CD1144B2800249DFDB10DF99C945BEEBBF5EF48320F108419EA14A7211C379A554DFA1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a11c86540fb1e7adcaff04e15be7f69aeeb3e5f82b7161c1812870a15d52bf8
                                                    • Instruction ID: a782c5a3ffee78fe7bc3e3b86c72022864f3453cf6e3e117eb8a3b727c7322dc
                                                    • Opcode Fuzzy Hash: 6a11c86540fb1e7adcaff04e15be7f69aeeb3e5f82b7161c1812870a15d52bf8
                                                    • Instruction Fuzzy Hash: AB2122B4C082098FCB50EFA8D8445EEBFB4FF49300F54816AD985B7364EB315A85CBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d13dc3a49d1f141d2ba73e3c43d33cc7c3af08fe85b6347775133627384864e1
                                                    • Instruction ID: d7b8b494e5b41c9909c7d790abd0eaebecb8afafc9bfdc9b9eb89e6c060f25ed
                                                    • Opcode Fuzzy Hash: d13dc3a49d1f141d2ba73e3c43d33cc7c3af08fe85b6347775133627384864e1
                                                    • Instruction Fuzzy Hash: 201126B6800249DFDB10CF9AC845BDEBFF4EF48320F148419E654A7251C379A554DFA5
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4613127460.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_5730000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: df8465e25918fc012677e15f7516275ef3db4b8f7678aa1f0145da38bf8d3a22
                                                    • Instruction ID: aa4b2646f792c4497758b57e70a752495f7c373d26b76de269354a66149faa97
                                                    • Opcode Fuzzy Hash: df8465e25918fc012677e15f7516275ef3db4b8f7678aa1f0145da38bf8d3a22
                                                    • Instruction Fuzzy Hash: 62117C78F001498FEB04DFF8D841BAEBBB2AB89310F009161E908A734AE67199428B50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2d11cec480a8218d76497a10c988456a018822de71af17c684c507dc6854437
                                                    • Instruction ID: 3ace5832ea1606c8cc681c9de3a598da120f362d43dd025da0e1c105e61a89df
                                                    • Opcode Fuzzy Hash: b2d11cec480a8218d76497a10c988456a018822de71af17c684c507dc6854437
                                                    • Instruction Fuzzy Hash: 461193B0D0120ADFDB44EFB8D95079EBFF2FB84304F0096A9C108AB715EB745A468B81
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4605324469.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_d0d000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction ID: acf6d07f6a68840efa8b56783bf89d2ea8310fa909740555924cb354079e00ef
                                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                    • Instruction Fuzzy Hash: 69119D79504284DFCB15CF50D9C4B15BBA2FB84318F28C6AAD84D4B696C73AD84ACF62
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ab01437983287ccd5447bbb6253e80b53848cde05c2c7847e827ba7ff6737f9e
                                                    • Instruction ID: b095ce7a06257fcfeb75dd53fc942f34a7559635d8bb54eace352d54a6eebf26
                                                    • Opcode Fuzzy Hash: ab01437983287ccd5447bbb6253e80b53848cde05c2c7847e827ba7ff6737f9e
                                                    • Instruction Fuzzy Hash: F701F571704104AFDB419E64A800BEF7BEBDBC8391F18806AFA85C7240CE358C028791
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5c97d4b4856bcd277c531a62491018d61fe982c66920f0167df1b239125706d
                                                    • Instruction ID: 0eb59430974cbf11cc6a5559c911965f33d0f631bc06d884886dbce9f92b85e3
                                                    • Opcode Fuzzy Hash: e5c97d4b4856bcd277c531a62491018d61fe982c66920f0167df1b239125706d
                                                    • Instruction Fuzzy Hash: E3F0427006974ACBD3202FA0B4AC02E7B30EB5F32B3056E81E0CE85599DB2A0455CB14
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3e0e8feaf6d4acfba800ef4344d003f95b64adbe59e5eafe09ac9283c36c8e4
                                                    • Instruction ID: 2d3f0e03bf518786fbd2c133c0d9e31c0b5574d8f78daaea8dcd076a2b291c65
                                                    • Opcode Fuzzy Hash: b3e0e8feaf6d4acfba800ef4344d003f95b64adbe59e5eafe09ac9283c36c8e4
                                                    • Instruction Fuzzy Hash: 1DF05530A4464AD7CB019FA9FC086EAB3B8AB8B301F4014A0D588DB291DF3158018BA0
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8a28b292383d8c1791e8c86bbb88b053ce4e7eee1c80d1bbe12a9b1e68d997d2
                                                    • Instruction ID: 620416004d7d8d2ca08791d0c1510076ec33abbdadecddd6c3badfdef82ecb2d
                                                    • Opcode Fuzzy Hash: 8a28b292383d8c1791e8c86bbb88b053ce4e7eee1c80d1bbe12a9b1e68d997d2
                                                    • Instruction Fuzzy Hash: FFF0E534A04749CBDB059FA9A8047EAB7B5EB8B301F4518A4D584A72A1DFB09908CBE5
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 11650230a06e92e9613c89e003c05959eea95b45c5308c18bf64d96feeeb3e3b
                                                    • Instruction ID: 428716b0d852fce8623d6aedb1f48d9975ffce90fab3e8a0d79702d58b431e11
                                                    • Opcode Fuzzy Hash: 11650230a06e92e9613c89e003c05959eea95b45c5308c18bf64d96feeeb3e3b
                                                    • Instruction Fuzzy Hash: C0F03471B11225CFCB84EFBCC844AAE7BF4AF08210B2144B9D54ADB321EB30DA008BD0
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1f981439c93bdac8e3a2976907d69ad24b005f153bf73cae9daae1bd736fa414
                                                    • Instruction ID: 02b0d4b49d304aaf8f60fed8df44c04f6597b9ea5e6f7f6498723cea8952b0e7
                                                    • Opcode Fuzzy Hash: 1f981439c93bdac8e3a2976907d69ad24b005f153bf73cae9daae1bd736fa414
                                                    • Instruction Fuzzy Hash: 59E022318203ABC7CB029BBAEC000DEBF34EE93210B400197E0242B112E770264AD3A2
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 184dd5c06fa7fcddf17535bbd8779d67fb8f1765940bee4aac8c01e019866033
                                                    • Instruction ID: 3e99dd4e899076fed549a68aca340e1d5af7bc029e31a50ceedb605a764f9e74
                                                    • Opcode Fuzzy Hash: 184dd5c06fa7fcddf17535bbd8779d67fb8f1765940bee4aac8c01e019866033
                                                    • Instruction Fuzzy Hash: FCE0D893E0C240CBD7105BE564151B97F74DDD325174461C7C0C9C7525DB55DA069B11
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3e494ae7b00c7d3588d7cb022b86a09a510b84bf27507ae6976796fa3af4bff
                                                    • Instruction ID: 9b44438f306742223ab7b2fb5e83c9f40eaf4e06d6a9e4a6c89f4adb3948baf4
                                                    • Opcode Fuzzy Hash: b3e494ae7b00c7d3588d7cb022b86a09a510b84bf27507ae6976796fa3af4bff
                                                    • Instruction Fuzzy Hash: 80D01231D2022B968B00A6A5DC044DEB739EE96261B904626D51537144EB71265986E1
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction ID: 013c576713a578446635506b6b4dee3f961c3455b8f39ee73868bf8f47cff4f9
                                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction Fuzzy Hash: D9C08C3320C2382AA635108F7C40EB7BB8CC3C13F4A258177FA9CE3200A8429C8001F9
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae3fa4146a66c127e27a39cfb3aa182d5683c5ffc03e7ffab0e1ecb93c615521
                                                    • Instruction ID: 6f067557917a9a7f161b9e52505c800765e42cd8eedeee3449af2f815d7aec4d
                                                    • Opcode Fuzzy Hash: ae3fa4146a66c127e27a39cfb3aa182d5683c5ffc03e7ffab0e1ecb93c615521
                                                    • Instruction Fuzzy Hash: ADD0677AB11108DFCF149F98E8409DDB7B6FB9C221B048126E915A3265C6319921DB50
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7d05c4fa67ae3bc89f046fdf545850d0a3701781f6a7dc04e3dde4a67684340e
                                                    • Instruction ID: 74de91b576c1393534768a0b265ef7ce0dceffa403e3c034e0435ffdfe6ad007
                                                    • Opcode Fuzzy Hash: 7d05c4fa67ae3bc89f046fdf545850d0a3701781f6a7dc04e3dde4a67684340e
                                                    • Instruction Fuzzy Hash: 53D0C2305093CA8BC712F774E9128683F2569C2208B8050DDA5484F81BEDBD081D4792
                                                    Memory Dump Source
                                                    • Source File: 0000000E.00000002.4606601607.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_14_2_1060000_FTlLqTRGrXZr.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 53587ef914424d156664c7739dba0251371ddf2e0a05de282e676699676b4d1b
                                                    • Instruction ID: 240f8db20938dbaa3a918a46e637e051b989b8813e01e74192dccebbb85dd0d1
                                                    • Opcode Fuzzy Hash: 53587ef914424d156664c7739dba0251371ddf2e0a05de282e676699676b4d1b
                                                    • Instruction Fuzzy Hash: 58C0223060434EC7C104FBB0EA028583B1AA6C0304F40A118B20D0B81AEEBC180803D1