Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rOrders.scr.exe

Overview

General Information

Sample name:rOrders.scr.exe
Analysis ID:1590011
MD5:1feb066e46d1beed60404a2a6adb3d5a
SHA1:a8a8627b651f037647294992cef1dc0924a6abbb
SHA256:2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4
Tags:exeuser-Porcupine
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy file to startup via Powershell
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Bypasses PowerShell execution policy
Drops PE files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Powershell drops PE file
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rOrders.scr.exe (PID: 1848 cmdline: "C:\Users\user\Desktop\rOrders.scr.exe" MD5: 1FEB066E46D1BEED60404A2A6ADB3D5A)
    • powershell.exe (PID: 1520 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rOrders.scr.exe (PID: 4760 cmdline: "C:\Users\user\Desktop\rOrders.scr.exe" MD5: 1FEB066E46D1BEED60404A2A6ADB3D5A)
  • svchost.exe (PID: 4708 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • 00.exe (PID: 6444 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe" MD5: 1FEB066E46D1BEED60404A2A6ADB3D5A)
    • powershell.exe (PID: 2608 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • 00.exe (PID: 7192 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe" MD5: 1FEB066E46D1BEED60404A2A6ADB3D5A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7880085226:AAFn59bjY_5aEtKKH3yN4wktDN454dzF1lM/sendMessage?chat_id=6055880871", "Token": "7880085226:AAFn59bjY_5aEtKKH3yN4wktDN454dzF1lM", "Chat_id": "6055880871", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.4557201022.0000000004391000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x12a4:$x1: $%SMTPDV$
          • 0x124c:$x3: %FTPDV$
          • 0x1270:$m2: Clipboard Logs ID
          • 0x14ae:$m2: Screenshot Logs ID
          • 0x15be:$m2: keystroke Logs ID
          • 0x1898:$m3: SnakePW
          • 0x1486:$m4: \SnakeKeylogger\
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          0.2.rOrders.scr.exe.3c99840.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0x1574b:$s1: UnHook
          • 0x15752:$s2: SetHook
          • 0x1575a:$s3: CallNextHook
          • 0x15767:$s4: _hook
          6.2.00.exe.4379840.4.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.rOrders.scr.exe.3c78e10.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.rOrders.scr.exe.3c78e10.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                0.2.rOrders.scr.exe.3c78e10.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x12d71:$a1: get_encryptedPassword
                • 0x1305d:$a2: get_encryptedUsername
                • 0x12b7d:$a3: get_timePasswordChanged
                • 0x12c78:$a4: get_passwordField
                • 0x12d87:$a5: set_encryptedPassword
                • 0x143ed:$a7: get_logins
                • 0x14350:$a10: KeyLoggerEventArgs
                • 0x13fbb:$a11: KeyLoggerEventArgsEventHandler
                Click to see the 13 entries

                System Summary

                barindex
                Source: Process startedAuthor: frack113: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rOrders.scr.exe", ParentImage: C:\Users\user\Desktop\rOrders.scr.exe, ParentProcessId: 1848, ParentProcessName: rOrders.scr.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', ProcessId: 1520, ProcessName: powershell.exe
                Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1520, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1520, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rOrders.scr.exe", ParentImage: C:\Users\user\Desktop\rOrders.scr.exe, ParentProcessId: 1848, ParentProcessName: rOrders.scr.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', ProcessId: 1520, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4708, ProcessName: svchost.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rOrders.scr.exe", ParentImage: C:\Users\user\Desktop\rOrders.scr.exe, ParentProcessId: 1848, ParentProcessName: rOrders.scr.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe', ProcessId: 1520, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T13:31:16.035820+010028033053Unknown Traffic192.168.2.549708104.21.32.1443TCP
                2025-01-13T13:31:21.003403+010028033053Unknown Traffic192.168.2.549717104.21.32.1443TCP
                2025-01-13T13:31:25.043406+010028033053Unknown Traffic192.168.2.549723104.21.32.1443TCP
                2025-01-13T13:31:29.997818+010028033053Unknown Traffic192.168.2.549740104.21.32.1443TCP
                2025-01-13T13:31:37.974428+010028033053Unknown Traffic192.168.2.549794104.21.32.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T13:31:14.236420+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
                2025-01-13T13:31:15.455053+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
                2025-01-13T13:31:16.767599+010028032742Potentially Bad Traffic192.168.2.549710132.226.247.7380TCP
                2025-01-13T13:31:28.111407+010028032742Potentially Bad Traffic192.168.2.549724132.226.247.7380TCP
                2025-01-13T13:31:29.455148+010028032742Potentially Bad Traffic192.168.2.549724132.226.247.7380TCP
                2025-01-13T13:31:30.752069+010028032742Potentially Bad Traffic192.168.2.549741132.226.247.7380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: rOrders.scr.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeAvira: detection malicious, Label: HEUR/AGEN.1309847
                Source: 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7880085226:AAFn59bjY_5aEtKKH3yN4wktDN454dzF1lM/sendMessage?chat_id=6055880871", "Token": "7880085226:AAFn59bjY_5aEtKKH3yN4wktDN454dzF1lM", "Chat_id": "6055880871", "Version": "5.1"}
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeReversingLabs: Detection: 65%
                Source: rOrders.scr.exeVirustotal: Detection: 56%Perma Link
                Source: rOrders.scr.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJoe Sandbox ML: detected
                Source: rOrders.scr.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: rOrders.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49707 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49727 version: TLS 1.0
                Source: rOrders.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: rOrders.scr.exe, 00000000.00000002.4536710280.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000006.00000002.4564681810.0000000005B10000.00000004.08000000.00040000.00000000.sdmp, 00.exe, 00000006.00000002.4536761451.0000000003271000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 02B5F1F6h4_2_02B5F007
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 02B5FB80h4_2_02B5F007
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02B5E528
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02B5EB5B
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02B5ED3C
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C8945h4_2_069C8608
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C0FF1h4_2_069C0D48
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_069C36CE
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C6171h4_2_069C5EC8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C58C1h4_2_069C5618
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C6A21h4_2_069C6778
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C0741h4_2_069C0498
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C7751h4_2_069C74A8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C8001h4_2_069C7D58
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C5D19h4_2_069C5A70
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_069C33B8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_069C33A8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C6E79h4_2_069C6BD0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C65C9h4_2_069C6320
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C0B99h4_2_069C08F0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C72FAh4_2_069C7050
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C02E9h4_2_069C0040
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C5441h4_2_069C5198
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C8459h4_2_069C81B0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4x nop then jmp 069C7BA9h4_2_069C7900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 014BF1F6h9_2_014BF007
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 014BFB80h9_2_014BF007
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_014BE528
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F1A38h9_2_069F1620
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F0751h9_2_069F04A0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F02F1h9_2_069F0040
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F1471h9_2_069F11C0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FD1A1h9_2_069FCEF8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F1A38h9_2_069F161F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FF8B9h9_2_069FF610
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FC8F1h9_2_069FC648
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FDA51h9_2_069FD7A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FE759h9_2_069FE4B0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FB791h9_2_069FB4E8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FDEA9h9_2_069FDC00
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FC041h9_2_069FBD98
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F1011h9_2_069F0D60
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FF009h9_2_069FED60
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FCD49h9_2_069FCAA0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FFD11h9_2_069FFA68
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FD5F9h9_2_069FD350
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FE301h9_2_069FE058
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FF461h9_2_069FF1B8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FC499h9_2_069FC1F0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FEBB1h9_2_069FE908
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F0BB1h9_2_069F0900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069FBBE9h9_2_069FB940
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 069F1A38h9_2_069F1966
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A28945h9_2_06A28608
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A20FF1h9_2_06A20D48
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A26171h9_2_06A25EC8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06A236CE
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A258C1h9_2_06A25618
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A25D19h9_2_06A25A70
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06A233A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06A233B8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A26E79h9_2_06A26BD0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A265C9h9_2_06A26320
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A26A21h9_2_06A26778
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A27751h9_2_06A274A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A20741h9_2_06A20498
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A20B99h9_2_06A208F0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A202E9h9_2_06A20040
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A272FAh9_2_06A27050
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A28459h9_2_06A281B0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A25441h9_2_06A25198
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A27BA9h9_2_06A27900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 4x nop then jmp 06A28001h9_2_06A27D58
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49741 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49710 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49724 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49708 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49794 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49717 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49723 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49740 -> 104.21.32.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49707 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49727 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comP
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E32000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D5C000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 00000005.00000002.3709232535.000002A0CFE00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: powershell.exe, 00000002.00000002.2092923724.000000000617A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E5F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: powershell.exe, 00000002.00000002.2089846660.0000000005111000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2219165054.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000002.00000002.2096916551.0000000007C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                Source: powershell.exe, 00000002.00000002.2089846660.0000000005111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2219165054.0000000004F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBsq
                Source: powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                Source: svchost.exe, 00000005.00000003.2088950532.000002A0CFCC0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                Source: powershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.2092923724.000000000617A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: qmgr.db.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C:
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

                System Summary

                barindex
                Source: 0.2.rOrders.scr.exe.3c99840.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 6.2.00.exe.42c8570.2.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.2ed8d64.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 6.2.00.exe.35b6fb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
                Source: 0.2.rOrders.scr.exe.2ed6524.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
                Source: 6.2.00.exe.35b97f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
                Source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: initial sampleStatic PE information: Filename: rOrders.scr.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to dropped file
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_0115D3040_2_0115D304
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_051665B00_2_051665B0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_0516B3580_2_0516B358
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_051600060_2_05160006
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_051600400_2_05160040
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A7E3A00_2_07A7E3A0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A71C800_2_07A71C80
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A72B880_2_07A72B88
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5B3284_2_02B5B328
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5F0074_2_02B5F007
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5C1904_2_02B5C190
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B561084_2_02B56108
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5C7534_2_02B5C753
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5C4704_2_02B5C470
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B54AD94_2_02B54AD9
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5CA334_2_02B5CA33
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5BBD34_2_02B5BBD3
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B568804_2_02B56880
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B598584_2_02B59858
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5BEB04_2_02B5BEB0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5B4F34_2_02B5B4F3
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5E5284_2_02B5E528
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B5E5174_2_02B5E517
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B535734_2_02B53573
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CB6E84_2_069CB6E8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C86084_2_069C8608
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CD6704_2_069CD670
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CA4084_2_069CA408
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CBD384_2_069CBD38
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C0D484_2_069C0D48
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CAA584_2_069CAA58
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CC3884_2_069CC388
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C8BF24_2_069C8BF2
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CB0A04_2_069CB0A0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CD0284_2_069CD028
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C11A04_2_069C11A0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CC9D84_2_069CC9D8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C5EB84_2_069C5EB8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CB6D94_2_069CB6D9
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C5EC84_2_069C5EC8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C56184_2_069C5618
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C560B4_2_069C560B
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CD6614_2_069CD661
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C37304_2_069C3730
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C67784_2_069C6778
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C676B4_2_069C676B
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C04984_2_069C0498
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C74974_2_069C7497
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C04884_2_069C0488
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C74A84_2_069C74A8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C44304_2_069C4430
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C85F84_2_069C85F8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C0D394_2_069C0D39
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CBD284_2_069CBD28
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C7D584_2_069C7D58
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C7D484_2_069C7D48
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CAA484_2_069CAA48
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C5A704_2_069C5A70
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C5A604_2_069C5A60
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C33B84_2_069C33B8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C33A84_2_069C33A8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C6BD04_2_069C6BD0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C6BC14_2_069C6BC1
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CA3F84_2_069CA3F8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C63134_2_069C6313
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C63204_2_069C6320
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CC3784_2_069CC378
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CB08F4_2_069CB08F
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C08F04_2_069C08F0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C78F04_2_069C78F0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C08E04_2_069C08E0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C28184_2_069C2818
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CD0184_2_069CD018
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C00064_2_069C0006
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C28074_2_069C2807
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C70504_2_069C7050
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C704B4_2_069C704B
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C00404_2_069C0040
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C51984_2_069C5198
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C518B4_2_069C518B
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C81B04_2_069C81B0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C81A04_2_069C81A0
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069CC9C84_2_069CC9C8
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_069C79004_2_069C7900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 6_2_030FD3046_2_030FD304
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014B61089_2_014B6108
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BF0079_2_014BF007
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BB3289_2_014BB328
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BC4709_2_014BC470
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BC7519_2_014BC751
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014B68809_2_014B6880
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BBBD39_2_014BBBD3
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BCA319_2_014BCA31
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014B4AD99_2_014B4AD9
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BBEB09_2_014BBEB0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014B35709_2_014B3570
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BE5289_2_014BE528
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BE5279_2_014BE527
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014BB4F39_2_014BB4F3
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F04A09_2_069F04A0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F84609_2_069F8460
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F7D909_2_069F7D90
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F00409_2_069F0040
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F38709_2_069F3870
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F11C09_2_069F11C0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FCEF89_2_069FCEF8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FCEEA9_2_069FCEEA
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FF6109_2_069FF610
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FF6009_2_069FF600
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FC6389_2_069FC638
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FC6489_2_069FC648
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FD7989_2_069FD798
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FD7A89_2_069FD7A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F04909_2_069F0490
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE4B09_2_069FE4B0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE4A09_2_069FE4A0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FB4E89_2_069FB4E8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FB4E79_2_069FB4E7
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FDC009_2_069FDC00
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FBD989_2_069FBD98
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F7D8F9_2_069F7D8F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FBD889_2_069FBD88
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F0D5F9_2_069F0D5F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FED509_2_069FED50
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F0D609_2_069F0D60
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FED609_2_069FED60
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FCA9F9_2_069FCA9F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FCAA09_2_069FCAA0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FFA599_2_069FFA59
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FFA689_2_069FFA68
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FDBF19_2_069FDBF1
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F73E89_2_069F73E8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FD3509_2_069FD350
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FD34F9_2_069FD34F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F08FF9_2_069F08FF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F003F9_2_069F003F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE0589_2_069FE058
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE0499_2_069FE049
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F386F9_2_069F386F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F11BF9_2_069F11BF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FF1B89_2_069FF1B8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FF1B79_2_069FF1B7
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FC1F09_2_069FC1F0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FC1E09_2_069FC1E0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE9089_2_069FE908
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FE9079_2_069FE907
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F09009_2_069F0900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FB9309_2_069FB930
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069FB9409_2_069FB940
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2B6E89_2_06A2B6E8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A286089_2_06A28608
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2D6709_2_06A2D670
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2AA589_2_06A2AA58
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2C3889_2_06A2C388
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2B0A09_2_06A2B0A0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2D0289_2_06A2D028
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2A4089_2_06A2A408
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A28C5F9_2_06A28C5F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A211A09_2_06A211A0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2C9D89_2_06A2C9D8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2BD389_2_06A2BD38
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A20D489_2_06A20D48
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A25EB89_2_06A25EB8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2B6E79_2_06A2B6E7
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A25EC89_2_06A25EC8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2560A9_2_06A2560A
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A256189_2_06A25618
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2D6639_2_06A2D663
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A25A609_2_06A25A60
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A25A709_2_06A25A70
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2AA489_2_06A2AA48
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A233A89_2_06A233A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A233B89_2_06A233B8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A26BCF9_2_06A26BCF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A26BD09_2_06A26BD0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A263209_2_06A26320
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A237309_2_06A23730
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2631F9_2_06A2631F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2676A9_2_06A2676A
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A267789_2_06A26778
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2C3789_2_06A2C378
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A274A89_2_06A274A8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A228B09_2_06A228B0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A204979_2_06A20497
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A274979_2_06A27497
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A204989_2_06A20498
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2B09F9_2_06A2B09F
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A208EF9_2_06A208EF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A208F09_2_06A208F0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A278FF9_2_06A278FF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A244309_2_06A24430
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A200079_2_06A20007
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A228079_2_06A22807
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2A4079_2_06A2A407
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A228099_2_06A22809
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2D0189_2_06A2D018
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A200409_2_06A20040
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A270409_2_06A27040
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A270509_2_06A27050
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A281AF9_2_06A281AF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A281B09_2_06A281B0
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2518A9_2_06A2518A
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A211919_2_06A21191
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A251989_2_06A25198
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A285FB9_2_06A285FB
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2C9C89_2_06A2C9C8
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A2BD289_2_06A2BD28
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A20D399_2_06A20D39
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A279009_2_06A27900
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A27D579_2_06A27D57
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_06A27D589_2_06A27D58
                Source: rOrders.scr.exe, 00000000.00000002.4532386478.0000000000EDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000000.00000000.2060312871.0000000000762000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFisa.exe* vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000000.00000002.4536710280.0000000002B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000000.00000002.4536710280.0000000002B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000000.00000002.4557355431.0000000003C98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000004.00000002.4531654601.0000000000D87000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs rOrders.scr.exe
                Source: rOrders.scr.exe, 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rOrders.scr.exe
                Source: rOrders.scr.exeBinary or memory string: OriginalFilenameFisa.exe* vs rOrders.scr.exe
                Source: rOrders.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.rOrders.scr.exe.3c99840.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 6.2.00.exe.42c8570.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.rOrders.scr.exe.2ed8d64.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 6.2.00.exe.35b6fb8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
                Source: 0.2.rOrders.scr.exe.2ed6524.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
                Source: 6.2.00.exe.35b97f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
                Source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@13/12@2/3
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7056:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6128:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iez5e3yu.3xw.ps1Jump to behavior
                Source: rOrders.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: rOrders.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\rOrders.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rOrders.scr.exe, 00000004.00000002.4536657049.0000000003010000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002FDC000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000003003000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4547004798.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002F30000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4548505146.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002EEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: rOrders.scr.exeVirustotal: Detection: 56%
                Source: rOrders.scr.exeReversingLabs: Detection: 65%
                Source: unknownProcess created: C:\Users\user\Desktop\rOrders.scr.exe "C:\Users\user\Desktop\rOrders.scr.exe"
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Users\user\Desktop\rOrders.scr.exe "C:\Users\user\Desktop\rOrders.scr.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Users\user\Desktop\rOrders.scr.exe "C:\Users\user\Desktop\rOrders.scr.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\rOrders.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: rOrders.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: rOrders.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: rOrders.scr.exe, 00000000.00000002.4536710280.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000006.00000002.4564681810.0000000005B10000.00000004.08000000.00040000.00000000.sdmp, 00.exe, 00000006.00000002.4536761451.0000000003271000.00000004.00000800.00020000.00000000.sdmp
                Source: rOrders.scr.exeStatic PE information: 0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_01155E17 push eax; iretd 0_2_01155E21
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A78620 push esp; retf 0_2_07A78621
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A78C98 pushfd ; iretd 0_2_07A78CA1
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 0_2_07A78C12 push eax; iretd 0_2_07A78C19
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775333 push edi; retf 2_2_03775342
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775323 push edi; retf 2_2_03775332
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775318 push edi; retf 2_2_03775322
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_037752A0 push ebp; retf 2_2_037752CA
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775153 push eax; retf 2_2_03775162
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775143 push eax; retf 2_2_03775152
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03775138 push eax; retf 2_2_03775142
                Source: C:\Users\user\Desktop\rOrders.scr.exeCode function: 4_2_02B524B9 push 8BFFFFFFh; retf 4_2_02B524BF
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_014B081C pushfd ; ret 9_2_014B081E
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F2E78 push esp; iretd 9_2_069F2E79
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F6F8B push es; ret 9_2_069F6FE4
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F6F13 push es; ret 9_2_069F6FE4
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F7059 push es; iretd 9_2_069F705C
                Source: rOrders.scr.exeStatic PE information: section name: .text entropy: 7.059154850937121
                Source: 00.exe.2.drStatic PE information: section name: .text entropy: 7.059154850937121
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe\:Zone.Identifier:$DATAJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 6444, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 1150000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 2D80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 3270000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 5270000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeMemory allocated: 4DA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599887Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598875Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598546Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598437Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598328Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598218Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597655Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596014Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595905Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595159Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594976Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594422Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599750Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598641Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598192Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598078Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597969Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597512Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596953Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596500Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596391Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596063Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595719Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595594Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595266Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594500Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1680Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeWindow / User API: threadDelayed 2664Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeWindow / User API: threadDelayed 7183Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5558Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeWindow / User API: threadDelayed 7378Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeWindow / User API: threadDelayed 2451Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7116Thread sleep count: 1680 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5808Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6552Thread sleep count: 191 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep count: 33 > 30Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2284Thread sleep count: 2664 > 30Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599887s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2284Thread sleep count: 7183 > 30Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599641s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598546s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -598000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597655s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597219s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -597000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -596014s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595905s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595797s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -595159s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594976s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exe TID: 2072Thread sleep time: -594312s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 5592Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2704Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6416Thread sleep count: 5558 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 528Thread sleep count: 676 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7184Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7172Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep count: 35 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7436Thread sleep count: 7378 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7436Thread sleep count: 2451 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599750s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599641s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599531s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599312s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599203s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598969s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598859s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598750s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598641s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598531s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598422s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598312s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598192s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -598078s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597969s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597844s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597734s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597625s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597512s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597391s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597281s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597172s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -597063s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596953s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596844s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596719s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596609s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596500s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596391s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596281s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596172s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -596063s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595938s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595828s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595719s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595594s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595484s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595375s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595266s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595156s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -595047s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -594937s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -594828s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -594718s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -594609s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe TID: 7432Thread sleep time: -594500s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599887Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598875Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598546Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598437Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598328Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598218Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597655Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 596014Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595905Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 595159Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594976Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594422Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599750Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598641Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598192Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 598078Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597969Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597512Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596953Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596500Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596391Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 596063Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595719Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595594Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595266Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeThread delayed: delay time: 594500Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                Source: rOrders.scr.exe, 00000004.00000002.4532169656.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllO
                Source: svchost.exe, 00000005.00000002.3708848404.000002A0CA82B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                Source: 00.exe, 00000009.00000002.4533112330.0000000001116000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlleQU
                Source: svchost.exe, 00000005.00000002.3709311375.000002A0CFE54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeCode function: 9_2_069F7D90 LdrInitializeThunk,9_2_069F7D90
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeProcess created: C:\Users\user\Desktop\rOrders.scr.exe "C:\Users\user\Desktop\rOrders.scr.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Users\user\Desktop\rOrders.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Users\user\Desktop\rOrders.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.00.exe.4379840.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4557201022.0000000004391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4536657049.0000000002F4D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 6444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 7192, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\rOrders.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 7192, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.00.exe.4379840.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c78e10.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rOrders.scr.exe.3c99840.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4557201022.0000000004391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4536657049.0000000002F4D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 1848, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rOrders.scr.exe PID: 4760, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 6444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 00.exe PID: 7192, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                PowerShell
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job12
                Registry Run Keys / Startup Folder
                11
                Process Injection
                3
                Obfuscated Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
                Registry Run Keys / Startup Folder
                1
                Software Packing
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Timestomp
                NTDS111
                Security Software Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials41
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                Process Injection
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590011 Sample: rOrders.scr.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 35 reallyfreegeoip.org 2->35 37 checkip.dyndns.org 2->37 39 checkip.dyndns.com 2->39 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus detection for dropped file 2->59 63 10 other signatures 2->63 8 rOrders.scr.exe 2 2->8         started        11 00.exe 2 2->11         started        13 svchost.exe 1 1 2->13         started        signatures3 61 Tries to detect the country of the analysis system (by using the IP) 35->61 process4 dnsIp5 65 Bypasses PowerShell execution policy 8->65 16 powershell.exe 13 8->16         started        20 rOrders.scr.exe 15 2 8->20         started        23 00.exe 14 2 11->23         started        25 powershell.exe 11 11->25         started        45 127.0.0.1 unknown unknown 13->45 signatures6 process7 dnsIp8 31 C:\Users\user\AppData\Roaming\...\00.exe, PE32 16->31 dropped 33 C:\Users\user\...\00.exe:Zone.Identifier, ASCII 16->33 dropped 47 Drops PE files to the startup folder 16->47 49 Powershell drops PE file 16->49 27 conhost.exe 16->27         started        41 checkip.dyndns.com 132.226.247.73, 49704, 49710, 49712 UTMEMUS United States 20->41 43 reallyfreegeoip.org 104.21.32.1, 443, 49707, 49708 CLOUDFLARENETUS United States 20->43 51 Tries to steal Mail credentials (via file / registry access) 23->51 53 Tries to harvest and steal browser information (history, passwords, etc) 23->53 29 conhost.exe 25->29         started        file9 signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rOrders.scr.exe56%VirustotalBrowse
                rOrders.scr.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                rOrders.scr.exe100%AviraHEUR/AGEN.1309847
                rOrders.scr.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe100%AviraHEUR/AGEN.1309847
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://checkip.dyndns.comP0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.32.1
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://g.live.com/odclientsettings/Prod/C:edb.log.5.drfalse
                            high
                            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2092923724.000000000617A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.comP00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.org/qrOrders.scr.exe, 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2092923724.000000000617A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://reallyfreegeoip.org/xml/8.46.123.189$rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgrOrders.scr.exe, 00000004.00000002.4536657049.0000000002E5F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://contoso.com/Iconpowershell.exe, 00000007.00000002.2225810987.0000000005FEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://reallyfreegeoip.orgrOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.ver)svchost.exe, 00000005.00000002.3709232535.000002A0CFE00000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000005.00000003.2088950532.000002A0CFCC0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drfalse
                                                      high
                                                      http://checkip.dyndns.orgrOrders.scr.exe, 00000004.00000002.4536657049.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E32000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D5C000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DAB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.microsoft.powershell.exe, 00000002.00000002.2096916551.0000000007C63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comrOrders.scr.exe, 00000004.00000002.4536657049.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002DFB000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002E52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2089846660.0000000005111000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2219165054.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://aka.ms/pscore6lBsqpowershell.exe, 00000002.00000002.2089846660.0000000005111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2219165054.0000000004F81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.2219165054.00000000050D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2227771780.000000000793D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://reallyfreegeoip.org/xml/rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4536657049.0000000002E47000.00000004.00000800.00020000.00000000.sdmp, rOrders.scr.exe, 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 00.exe, 00000009.00000002.4538005534.0000000002D68000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    104.21.32.1
                                                                    reallyfreegeoip.orgUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    132.226.247.73
                                                                    checkip.dyndns.comUnited States
                                                                    16989UTMEMUSfalse
                                                                    IP
                                                                    127.0.0.1
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1590011
                                                                    Start date and time:2025-01-13 13:30:16 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 10m 11s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:12
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:rOrders.scr.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@13/12@2/3
                                                                    EGA Information:
                                                                    • Successful, ratio: 50%
                                                                    HCA Information:
                                                                    • Successful, ratio: 99%
                                                                    • Number of executed functions: 270
                                                                    • Number of non-executed functions: 36
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                    • Excluded IPs from analysis (whitelisted): 2.19.106.160, 13.107.246.45, 20.12.23.50
                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                                    • Execution Graph export aborted for target powershell.exe, PID 1520 because it is empty
                                                                    • Execution Graph export aborted for target powershell.exe, PID 2608 because it is empty
                                                                    • Execution Graph export aborted for target rOrders.scr.exe, PID 4760 because it is empty
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    TimeTypeDescription
                                                                    07:31:10API Interceptor9x Sleep call for process: powershell.exe modified
                                                                    07:31:11API Interceptor3x Sleep call for process: svchost.exe modified
                                                                    07:31:14API Interceptor7762641x Sleep call for process: rOrders.scr.exe modified
                                                                    07:31:28API Interceptor6630996x Sleep call for process: 00.exe modified
                                                                    13:31:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    104.21.32.124010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                    • b2csa.icu/PL341/index.php
                                                                    bIcqeSVPW6.exeGet hashmaliciousFormBookBrowse
                                                                    • www.rafconstrutora.online/sa6l/
                                                                    BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                                    • www.aziziyeescortg.xyz/2pcx/
                                                                    25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                                                    • www.masterqq.pro/3vdc/
                                                                    QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                    • www.mzkd6gp5.top/3u0p/
                                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                    • redroomaudio.com/administrator/index.php
                                                                    132.226.247.73QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • checkip.dyndns.org/
                                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    reallyfreegeoip.orgMB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.112.1
                                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.112.1
                                                                    Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.32.1
                                                                    SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.112.1
                                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.80.1
                                                                    QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.80.1
                                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.64.1
                                                                    Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.32.1
                                                                    mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.16.1
                                                                    checkip.dyndns.comMB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 193.122.130.0
                                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 193.122.130.0
                                                                    SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 158.101.44.242
                                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 132.226.247.73
                                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 132.226.8.169
                                                                    nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 158.101.44.242
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    UTMEMUSQUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 132.226.247.73
                                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 132.226.8.169
                                                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 132.226.247.73
                                                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 132.226.8.169
                                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 132.226.247.73
                                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 132.226.247.73
                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    CLOUDFLARENETUSNursultanAlphaCrack.bat.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                    • 104.21.80.1
                                                                    recode.exeGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.21.16.1
                                                                    MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.112.1
                                                                    RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                                                                    • 104.21.80.156
                                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.112.1
                                                                    Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.32.1
                                                                    SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.112.1
                                                                    https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                                    • 104.19.132.76
                                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    https://smartbooking.ma/Get hashmaliciousUnknownBrowse
                                                                    • 188.114.97.3
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    54328bd36c14bd82ddaa0c04b25ed9adMB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.32.1
                                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.32.1
                                                                    SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.32.1
                                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 104.21.32.1
                                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.32.1
                                                                    Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.32.1
                                                                    Loader.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.32.1
                                                                    No context
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):8192
                                                                    Entropy (8bit):0.3588072191296206
                                                                    Encrypted:false
                                                                    SSDEEP:6:6xkoaaD0JOCEfMuaaD0JOCEfMKQmDhxkoaaD0JOCEfMuaaD0JOCEfMKQmD:maaD0JcaaD0JwQQ3aaD0JcaaD0JwQQ
                                                                    MD5:663C5D6018506231E334FB3EA962ED1C
                                                                    SHA1:539A4641CE92E57E4ADEE32750A817326E596D4C
                                                                    SHA-256:066CB701C03237D2612AA647E6BF08EF594360F96E433639B0CC9EED7335F1E1
                                                                    SHA-512:5F910653FD1B12B94D314EDEDF6EB2BEC70D369D921EB5B7CF4D199B0374D6C798336E39DBF2781F3B0457280E0DDA63BDF4861DF31C08152544B0F1039D5FCD
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:*.>.................D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.8337326629516084
                                                                    Encrypted:false
                                                                    SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugQ:gJjJGtpTq2yv1AuNZRY3diu8iBVqFO
                                                                    MD5:71A7E48DC1F9565530C6074FE69FE1FD
                                                                    SHA1:7B6551D21E68078BBA31CEA522AF8C7D99C89886
                                                                    SHA-256:B00F01505A37520CF11E359D53E55B05B7E34529C143638423BED0D91DDF81BB
                                                                    SHA-512:7D1150B537A33F1469BE948C8302403DE092D8305BF66ABA9AC552E81D483A92E7001AF5FE0733FE3C2457DF21DF94437C34F3336BB64B569C1F554A4FBC3D43
                                                                    Malicious:false
                                                                    Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x72b9a452, page size 16384, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.658460125101143
                                                                    Encrypted:false
                                                                    SSDEEP:1536:JSB2ESB2SSjlK/AxrO1T1B0CZSJWYkr3g16n2UPkLk+kdbI/0uznv0M1Dn/didMV:Jaza6xhzA2U8HDnAPZ4PZf9h/9h
                                                                    MD5:EBAD2B3FBE6379B83E16B97F3DC26F4E
                                                                    SHA1:8623F446EBD653DD71AB593EA6F5C1D70350C0C6
                                                                    SHA-256:46DAC50632A2A49F76989911E8AAA86CB2D8AE6D3D9E35B0FF193BF9E5DD5525
                                                                    SHA-512:38F26319019DCB440DCAEBB222C133EF68C88234B02A47B4AD4D8638FBABDBDABD31259B03B87D3264DE3B05154AB19F8211C36007AA654F167DD4B8BBBE6595
                                                                    Malicious:false
                                                                    Preview:r..R... ...............X\...;...{......................T.~......"...}%......}..h.|......"...}%.T.~.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{.....................................C."...}%.................2.'.."...}%..........................#......T.~.....................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):16384
                                                                    Entropy (8bit):0.07956751367070014
                                                                    Encrypted:false
                                                                    SSDEEP:3:J/setYeeCNUGkYatiGRMyJoXB+U0CX/0GYtall58Kgvvl/QoeP/ll:Jdz2GRp0zJoXBV0Cv9dz8KgR+t
                                                                    MD5:08463B1AA5648E7E6CE83336DBA6EB53
                                                                    SHA1:AB5F2D51F02E9EBB8956DF8483CC5D0668242F2F
                                                                    SHA-256:A3B2BADCF7F2A9A58FF1AA66965F337B4C9CFB4D83B105EA6757E6DA03365698
                                                                    SHA-512:4AA7B306EB96F743B61C1B186930AF3508CE5A247B1E00ED055745C847428C804BA6975D72FAC810F4ECA3955C5F1A78ABBD41634E4BE54FE2D87C6313234968
                                                                    Malicious:false
                                                                    Preview:..!.....................................;...{.......}..."...}%.........."...}..."...}%._...."...}..................2.'.."...}%.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1248
                                                                    Entropy (8bit):5.370059464396407
                                                                    Encrypted:false
                                                                    SSDEEP:24:3vQWWSKco4KmBs4RPT6BmFoUvjKTIKo+mZ9tXt/NK3R8UHr2:YWWSU4y4RQmFoULF+mZ9tlNWR8Wi
                                                                    MD5:43FB623D8A60BA37C15FCA89C5765626
                                                                    SHA1:9298A9BD719B6F0F61DC245283E354156D0524F8
                                                                    SHA-256:38E97F5190AB15058EC4316BEF40F68B0126F71A3AA6377978B603DF2D6EEBA0
                                                                    SHA-512:34F2AD825627088A4976974AC9E974856072964956FD1F1A11CE6EDDDE9DD58C7A2054924D74F9981DB2140A8C8F19D429D7900CA9ACA3EDC52AA34EDA1FEDEE
                                                                    Malicious:false
                                                                    Preview:@...e.................................f..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):829952
                                                                    Entropy (8bit):7.05208893531554
                                                                    Encrypted:false
                                                                    SSDEEP:12288:paMaSzOKy2r7SPN+3TzXhMlJ/AeHvC/yj0YVYdjTLdUR2:wMaSSKy2/SPNUbhve6/yyZTxU
                                                                    MD5:1FEB066E46D1BEED60404A2A6ADB3D5A
                                                                    SHA1:A8A8627B651F037647294992CEF1DC0924A6ABBB
                                                                    SHA-256:2553ADADD29AF4148BE4C10F1771573B149006815374121BB802FA7599AB06F4
                                                                    SHA-512:13ADAC6A8AAFC03608D04951F551C21A723081F800D311F4FF2061D145A6FE6A751A5FF69E42D980DDB8EF12633A846F92D3919714C8626D16D6FA61B750178F
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 66%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....0................0.................. ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........$...........D...d...........................................&.(......*".......*".(.....*Vs....(....t.........*v..}.....(......(....&.(.....*f.r...p.r...p.(2...(3....*..*N.s4...}.....(.....*j.(5.....(6....s....(7....*N.s4...}.....(.....*N.s4...}.....(.....*.(.........*N.s4...}.....(.....*F.~....(X....a...*6.~.....(Y...*F.~....(X....a...*6.~.....(Y...*F.~....(X....a...*6.~.....(Y...*F.~....(X........*J.~..........(Z...*F.~....(X....a...*6.~.....(Y...*F.~....(X......
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):7.05208893531554
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:rOrders.scr.exe
                                                                    File size:829'952 bytes
                                                                    MD5:1feb066e46d1beed60404a2a6adb3d5a
                                                                    SHA1:a8a8627b651f037647294992cef1dc0924a6abbb
                                                                    SHA256:2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4
                                                                    SHA512:13adac6a8aafc03608d04951f551c21a723081f800d311f4ff2061d145a6fe6a751a5ff69e42d980ddb8ef12633a846f92d3919714c8626d16d6fa61b750178f
                                                                    SSDEEP:12288:paMaSzOKy2r7SPN+3TzXhMlJ/AeHvC/yj0YVYdjTLdUR2:wMaSSKy2/SPNUbhve6/yyZTxU
                                                                    TLSH:21057C453EA044F8C5318AF6E8E7823CBA71B95166E3C46625CF2E9C7CC8B5046D71AF
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....0................0.................. ........@.. ....................................@................................
                                                                    Icon Hash:00928e8e8686b000
                                                                    Entrypoint:0x4cbe1e
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcbdcc0x4f.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x586.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000xc9e240xca0006a6664878531826ec8a6c828b88019c8False0.43772238551980197data7.059154850937121IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0xcc0000x5860x600023f933e236ce25e662698bcb26c192dFalse0.4134114583333333data4.009208314844858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xce0000xc0x200a009008c61fd21e7ab6caf0c9762c3ceFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_VERSION0xcc0a00x2fcdata0.43455497382198954
                                                                    RT_MANIFEST0xcc39c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2025-01-13T13:31:14.236420+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                                                    2025-01-13T13:31:15.455053+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                                                    2025-01-13T13:31:16.035820+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549708104.21.32.1443TCP
                                                                    2025-01-13T13:31:16.767599+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549710132.226.247.7380TCP
                                                                    2025-01-13T13:31:21.003403+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549717104.21.32.1443TCP
                                                                    2025-01-13T13:31:25.043406+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549723104.21.32.1443TCP
                                                                    2025-01-13T13:31:28.111407+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549724132.226.247.7380TCP
                                                                    2025-01-13T13:31:29.455148+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549724132.226.247.7380TCP
                                                                    2025-01-13T13:31:29.997818+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549740104.21.32.1443TCP
                                                                    2025-01-13T13:31:30.752069+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549741132.226.247.7380TCP
                                                                    2025-01-13T13:31:37.974428+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549794104.21.32.1443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 13, 2025 13:31:13.284159899 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:13.289156914 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:13.289243937 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:13.289658070 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:13.294536114 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:13.977036953 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:13.982013941 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:13.986870050 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:14.193799019 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:14.236419916 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:14.242403030 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:14.242439985 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.243896961 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:14.248018026 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:14.248033047 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.716727018 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.716800928 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:14.724844933 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:14.724868059 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.725264072 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.767679930 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.076505899 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.123326063 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.188241005 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.188302040 CET44349707104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.188347101 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.195594072 CET49707443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.199537039 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:15.204349041 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:15.412225962 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:15.415596008 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.415633917 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.415690899 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.416052103 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.416064978 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.455053091 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:15.892976046 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:15.895571947 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:15.895592928 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:16.035845995 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:16.035901070 CET44349708104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:16.035981894 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:16.036556959 CET49708443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:16.040193081 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:16.041384935 CET4971080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:16.045197964 CET8049704132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:16.045258999 CET4970480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:16.046185017 CET8049710132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:16.046262026 CET4971080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:16.046391964 CET4971080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:16.051256895 CET8049710132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:16.719012976 CET8049710132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:16.721509933 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:16.721554041 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:16.721893072 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:16.722260952 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:16.722276926 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:16.767599106 CET4971080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:17.179079056 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:17.180910110 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:17.180952072 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:17.331454039 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:17.331523895 CET44349711104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:17.331604004 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:17.332159996 CET49711443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:17.336385012 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:17.341211081 CET8049712132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:17.343952894 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:17.344068050 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:17.348882914 CET8049712132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:19.045001984 CET8049712132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:19.046721935 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.046770096 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.046833992 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.047122002 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.047137022 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.095699072 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.524580956 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.526258945 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.526295900 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.674246073 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.674309969 CET44349715104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:19.674570084 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.674809933 CET49715443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:19.677936077 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.679090023 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.682976961 CET8049712132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:19.683037043 CET4971280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.683862925 CET8049716132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:19.683927059 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.684025049 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:19.688811064 CET8049716132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:20.359136105 CET8049716132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:20.374636889 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:20.374695063 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.375458002 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:20.383661032 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:20.383677959 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.408282995 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:20.857517004 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.859955072 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:20.859998941 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.998155117 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.998224020 CET44349717104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:20.998284101 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:20.998806953 CET49717443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:21.003068924 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:21.004246950 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:21.008100986 CET8049716132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:21.008187056 CET4971680192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:21.009123087 CET8049718132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:21.009198904 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:21.009288073 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:21.014061928 CET8049718132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:21.862019062 CET8049718132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:21.863545895 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:21.863593102 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:21.863847017 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:21.864125013 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:21.864136934 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:21.908221006 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.321379900 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:22.323215008 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:22.323250055 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:22.466192961 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:22.466264009 CET44349719104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:22.466310978 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:22.466780901 CET49719443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:22.484296083 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.485729933 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.489248037 CET8049718132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:22.489332914 CET4971880192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.490525961 CET8049720132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:22.493958950 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.494086981 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:22.498954058 CET8049720132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:23.166779995 CET8049720132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:23.168217897 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.168262959 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.168339014 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.168745041 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.168759108 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.220721960 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.625741005 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.627405882 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.627439976 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.771254063 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.771445036 CET44349721104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:23.771502972 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.772247076 CET49721443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:23.780345917 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.781667948 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.785392046 CET8049720132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:23.785444975 CET4972080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.786479950 CET8049722132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:23.786540031 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.786642075 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:23.791385889 CET8049722132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:24.458194971 CET8049722132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:24.459404945 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:24.459453106 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:24.459508896 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:24.459755898 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:24.459764957 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:24.501988888 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:24.916613102 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:24.918276072 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:24.918306112 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:25.043565989 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:25.043716908 CET44349723104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:25.043978930 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:25.044233084 CET49723443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:26.144531012 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:26.153423071 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:26.153523922 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:26.153995991 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:26.158720016 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:27.853256941 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:27.853964090 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:27.854213953 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:27.854268074 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:27.854845047 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:27.854873896 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:27.854899883 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:27.856682062 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:27.864274025 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:28.070064068 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:28.111407042 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:28.568631887 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:28.568680048 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:28.568789959 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:28.573129892 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:28.573143005 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.026546955 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.027574062 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.029593945 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.029609919 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.029922009 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.080271006 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.083967924 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.131328106 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.186948061 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.187118053 CET44349727104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.187246084 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.190330982 CET49727443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.194169998 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:29.199042082 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:29.404639959 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:29.407011986 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.407032967 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.407095909 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.407377005 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.407385111 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.455147982 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:29.876873970 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.884799957 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.884830952 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.997855902 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.997941017 CET44349740104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:29.998188019 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:29.998452902 CET49740443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:30.001741886 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:30.003144026 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:30.006719112 CET8049724132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:30.006778955 CET4972480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:30.007961035 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:30.008045912 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:30.008130074 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:30.012881041 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:30.710335016 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:30.711622000 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:30.711663961 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:30.711734056 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:30.711997032 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:30.712012053 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:30.752068996 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:31.186744928 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:31.204758883 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:31.204792023 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:31.313977003 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:31.314141035 CET44349748104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:31.314203978 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:31.314662933 CET49748443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:31.319576979 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:31.324393034 CET8049754132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:31.324466944 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:31.324553013 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:31.329319954 CET8049754132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:32.000776052 CET8049754132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:32.002650023 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.002686024 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.002932072 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.003182888 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.003197908 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.046003103 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.485093117 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.487445116 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.487466097 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.611809015 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.611975908 CET44349759104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:32.612077951 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.612509012 CET49759443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:32.616211891 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.617348909 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.621205091 CET8049754132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:32.621316910 CET4975480192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.622154951 CET8049763132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:32.622268915 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.622405052 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:32.627254963 CET8049763132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:33.313203096 CET8049763132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:33.314923048 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.314943075 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.314997911 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.315243006 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.315253019 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.361399889 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.802104950 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.803855896 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.803884029 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.947652102 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.947715044 CET44349764104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:33.947772980 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.948685884 CET49764443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:33.952455997 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.953213930 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.957603931 CET8049763132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:33.957890034 CET4976380192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.958208084 CET8049769132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:33.958364010 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.959043980 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:33.963826895 CET8049769132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:34.656569958 CET8049769132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:34.657908916 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:34.657984972 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:34.658065081 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:34.658554077 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:34.658585072 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:34.705169916 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.148627996 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:35.150748968 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.150769949 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:35.282466888 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:35.282644987 CET44349774104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:35.282759905 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.283108950 CET49774443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.287451029 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.288536072 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.292433023 CET8049769132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:35.292498112 CET4976980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.293421030 CET8049779132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:35.293493986 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.293595076 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:35.298379898 CET8049779132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:35.990299940 CET8049779132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:35.993334055 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.993390083 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:35.996118069 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.996354103 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:35.996367931 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:36.033304930 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.476922035 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:36.478667021 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:36.478684902 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:36.625968933 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:36.626050949 CET44349784104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:36.626456022 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:36.626733065 CET49784443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:36.630140066 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.631325960 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.635106087 CET8049779132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:36.635175943 CET4977980192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.636094093 CET8049790132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:36.636163950 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.636236906 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:36.640959978 CET8049790132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:37.364162922 CET8049790132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:31:37.365567923 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:37.365623951 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.365689039 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:37.365932941 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:37.365951061 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.408339977 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:31:37.854207993 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.855984926 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:37.856023073 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.974445105 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.974524975 CET44349794104.21.32.1192.168.2.5
                                                                    Jan 13, 2025 13:31:37.974651098 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:31:37.975182056 CET49794443192.168.2.5104.21.32.1
                                                                    Jan 13, 2025 13:32:21.717418909 CET8049710132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:21.717545986 CET4971080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:32:29.458390951 CET8049722132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:29.458714008 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:32:36.553368092 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:36.553486109 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:32:36.553556919 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:36.553601980 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:32:36.553791046 CET8049741132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:36.553828001 CET4974180192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:32:42.325822115 CET8049790132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:32:42.326025009 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:33:04.471945047 CET4972280192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:33:04.476834059 CET8049722132.226.247.73192.168.2.5
                                                                    Jan 13, 2025 13:33:17.377758026 CET4979080192.168.2.5132.226.247.73
                                                                    Jan 13, 2025 13:33:17.382770061 CET8049790132.226.247.73192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 13, 2025 13:31:13.253032923 CET6417553192.168.2.51.1.1.1
                                                                    Jan 13, 2025 13:31:13.259849072 CET53641751.1.1.1192.168.2.5
                                                                    Jan 13, 2025 13:31:14.234524012 CET5733553192.168.2.51.1.1.1
                                                                    Jan 13, 2025 13:31:14.241564035 CET53573351.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 13, 2025 13:31:13.253032923 CET192.168.2.51.1.1.10x1742Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.234524012 CET192.168.2.51.1.1.10xf3d5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:13.259849072 CET1.1.1.1192.168.2.50x1742No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 13:31:14.241564035 CET1.1.1.1192.168.2.50xf3d5No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                    • reallyfreegeoip.org
                                                                    • checkip.dyndns.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549704132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:13.289658070 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:13.977036953 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:13 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:13.982013941 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:14.193799019 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:14 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:15.199537039 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:15.412225962 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:15 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.549710132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:16.046391964 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:16.719012976 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:16 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.549712132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:17.344068050 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:19.045001984 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:18 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.549716132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:19.684025049 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:20.359136105 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:20 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.549718132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:21.009288073 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:21.862019062 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:21 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.549720132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:22.494086981 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:23.166779995 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:23 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.549722132.226.247.73804760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:23.786642075 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:24.458194971 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:24 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.549724132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:26.153995991 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:27.853256941 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:26 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:27.853964090 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:26 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:27.854213953 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:26 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:27.854845047 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:26 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:27.856682062 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:28.070064068 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:27 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Jan 13, 2025 13:31:29.194169998 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:29.404639959 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:29 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.549741132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:30.008130074 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Jan 13, 2025 13:31:30.710335016 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:30 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    9192.168.2.549754132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:31.324553013 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:32.000776052 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:31 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    10192.168.2.549763132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:32.622405052 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:33.313203096 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:33 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    11192.168.2.549769132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:33.959043980 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:34.656569958 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:34 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    12192.168.2.549779132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:35.293595076 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:35.990299940 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:35 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    13192.168.2.549790132.226.247.73807192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 13, 2025 13:31:36.636236906 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Jan 13, 2025 13:31:37.364162922 CET273INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:37 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549707104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:15 UTC859INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:15 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086264
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ba388Pvv9GKMBnAcN2aWUiedUbNmYCJYWlaaYs6EQ2cio%2Badms45Bqak59uClC%2FoQrCko9yXbr54BgTcnAWKssJnHYWNF6h05ZofoaTfrPF%2FRgWti%2FVoax%2BR02HyxxkbKCU2W7TX"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901566f78e7841a6-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1559&min_rtt=1549&rtt_var=602&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1784841&cwnd=241&unsent_bytes=0&cid=b9ced1d6a95912df&ts=487&x=0"
                                                                    2025-01-13 12:31:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.549708104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:15 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2025-01-13 12:31:16 UTC857INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:15 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086265
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xb6G3nBxd%2B%2FI1XAazNGd6zXKzlXluKKMvATn15SuetIZpMrmCSw4yQgCIQYZsaIfeAPtp96dNvA2C15uK4WXgpuX42vu07t9BlRa0nWJPQTq2Vmwi%2BCjFKzdbP8gq5%2FzhQs2myeM"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901566fcde031875-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1647&min_rtt=1628&rtt_var=648&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1639528&cwnd=153&unsent_bytes=0&cid=7527c18342f70e81&ts=148&x=0"
                                                                    2025-01-13 12:31:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.549711104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:17 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:17 UTC851INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:17 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086266
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WuZAP7HDgQK5XkpUhBFhbQP7wI9zuSGNYnEYLQrfcQxOoO1Rmf0ORKEkM4%2BbIB5XjOHyaXSMvcb1wZABT0WnXEEfPxRmqValyWamNPR6Al4PUzlgK7w01hjw7H7BOVNctSOKOz1t"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 90156704fcebc327-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1597&min_rtt=1589&rtt_var=613&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1760096&cwnd=189&unsent_bytes=0&cid=7f21284a9638348d&ts=158&x=0"
                                                                    2025-01-13 12:31:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.549715104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:19 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:19 UTC857INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:19 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086268
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6xjJOBL8Rh%2FBRI7O%2Bi6rz4hsnWKL2%2BbuiuwgdcVElsxGuu5j2jt1u9oxUnYeevAdHsnKh8XFiHS7PvR75Vn%2B6nCenjjtePmmZ4vwYWrOaIF9cpFZ750dy4Y7mI1cuxFlBKfblcnS"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567139aed41a6-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1575&min_rtt=1554&rtt_var=626&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1690793&cwnd=241&unsent_bytes=0&cid=2f939c8047219dfd&ts=154&x=0"
                                                                    2025-01-13 12:31:19 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.549717104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:20 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2025-01-13 12:31:20 UTC862INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:20 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086270
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2TqFiS%2FIUbkEY%2BszFwvZDsUFybtL6PIGM%2FG0JDOP6Nzskzg3L4kwM%2FkVveQDRBRQhxNx8IduH708LszR979j6rR%2BqOU5hf%2BMNBOYkMxNZWqgD30ja6eSeC0Ywp46%2FkVVoHvvrzyR"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015671bcb2b4344-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1669&min_rtt=1663&rtt_var=636&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1702623&cwnd=47&unsent_bytes=0&cid=55fc613447082bee&ts=146&x=0"
                                                                    2025-01-13 12:31:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.549719104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:22 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:22 UTC861INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:22 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086271
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5Vscsq5KAUlJ0j1%2F1KXOOMc%2FluWxsFXqWLbW7wkFeLnHnNUrURw8cwiBd%2BDDCVuDR73KCRQpUTe2LP0FEpe%2BZ%2BjmZeEDslvYl8rG5%2FVffbpC4gajcjSMBshpgrWYd0BZDscazmBs"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567251bea1875-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1531&min_rtt=1524&rtt_var=587&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1841109&cwnd=153&unsent_bytes=0&cid=de408e63fc3e1ad5&ts=148&x=0"
                                                                    2025-01-13 12:31:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.549721104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:23 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:23 UTC869INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:23 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086272
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cFD30iZ%2BCboH191Y%2F%2Bp%2FwLpev6GXsFq%2Bcwv1vBCoIOfaoOUeL6s%2F9Cvow2bYYxxF%2B47IX8wIJBBlvGz74vdP3U%2F%2FqGPEoQpcc1GdJ9E3UKbWoKdilzxCZdtqwSQdEULUtn%2FxDrcL"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015672d3d3672b9-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1789&min_rtt=1785&rtt_var=678&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1602634&cwnd=217&unsent_bytes=0&cid=8e588f838ec5d43b&ts=151&x=0"
                                                                    2025-01-13 12:31:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.549723104.21.32.14434760C:\Users\user\Desktop\rOrders.scr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2025-01-13 12:31:25 UTC861INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:24 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086274
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1u4tfa%2FhHs6kxZ%2BPxhyuAKtCXW4%2FxjrsH2DMAmGnnod7eix178z5nqyG4FSp9Rzh3JcdeWLxiIPPdul3VfOCEptUmkwp%2Bes78ra%2FqqMmo0tzWgXXu%2FOoDf6EYuedDLU2DfRKKJLZ"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567353aed1875-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1576&rtt_var=600&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1808049&cwnd=153&unsent_bytes=0&cid=29ebc483faf53d2e&ts=134&x=0"
                                                                    2025-01-13 12:31:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.549727104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:29 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:29 UTC864INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:29 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086278
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ER2y1NAatdzV3ZyBV%2Bg0rFoKhpM%2BCZDYUm%2BGPiK%2BT0kstTp5xwpYu3w%2FjSb61LmkHbJNy5xjgZKQ39HwlzT0qTNPclGXs2IFjdMJAp66%2FKKyGe%2FzhWzmOeb2ikO21xAP638xhC%2Fa"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015674f1b854344-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1665&min_rtt=1659&rtt_var=635&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1705607&cwnd=47&unsent_bytes=0&cid=5de50acadb3cfe2b&ts=164&x=0"
                                                                    2025-01-13 12:31:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    9192.168.2.549740104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:29 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2025-01-13 12:31:29 UTC859INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:29 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086279
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BrV0Oel2ammY9dSqqLlmGAElZXtNLUXgwzR53Kp7j%2FnUcxq2rhJY%2BIYjmfUsnxKNTfv6vlhV%2BsA%2FRT7AMJZLOQORLGz1NmDQ7fiVIJ%2FEGfpfUer16L2ol6MCyoQdsIkMZdXk5IPF"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567542c4972b9-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1853&min_rtt=1835&rtt_var=701&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1591280&cwnd=217&unsent_bytes=0&cid=4990ffe5ba48e334&ts=130&x=0"
                                                                    2025-01-13 12:31:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    10192.168.2.549748104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:31 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:31 UTC857INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:31 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086280
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1pLokVinbqhoqqGh1bWVlxLkVy%2BNrsY4k6jWNebiRM0gZPJkeAQJmu6oeGwytrfuGEN1rwFWkrQRRjxGOXhUn5FEGtOnt6heJiMecjZ9TET9Hd0T%2BhE2%2F%2BLN99oqVmt6HnOLrC2A"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015675c5dddc327-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1627&rtt_var=612&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1794714&cwnd=189&unsent_bytes=0&cid=5cec34c14af241df&ts=135&x=0"
                                                                    2025-01-13 12:31:31 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    11192.168.2.549759104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:32 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:32 UTC863INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:32 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086281
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SQnubKEbA49xerbbqAJzhopK%2FNvHdeoIuWMKDBsBCPoQ%2ByOvvJGB9cAJUgid07WJRz1OwJa%2BgLuKwfg7sELmogwX9t3GEFiGhnPuUU7nj2%2B1Bf2d%2FbQh%2BLvgVOF8X%2BEYo7a4fFFZ"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567647a5cc327-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1752&min_rtt=1710&rtt_var=672&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1707602&cwnd=189&unsent_bytes=0&cid=0d140c58a932f4ef&ts=130&x=0"
                                                                    2025-01-13 12:31:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    12192.168.2.549764104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:33 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:33 UTC856INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:33 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086283
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YLCB0rStKmOUbhOInpgCDDdVg9raTiFtssW16qQ56udm3T0pKjZeOYpy1RwQ2NF0DoA%2BuAm3fB2Nho0GeUYbd%2F1ln%2BsQPRRcnFIeNYwvSz9UnlPm7PotN81aYtgk7PHD%2BePNtTFf"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015676cc8384344-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1637&min_rtt=1631&rtt_var=625&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1733966&cwnd=47&unsent_bytes=0&cid=a9b2ef216e6a6c04&ts=139&x=0"
                                                                    2025-01-13 12:31:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    13192.168.2.549774104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:35 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:35 UTC853INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:35 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086284
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eKgNC2pg%2BJVyR0pN6B3X3NB9Q7fVtVaHG2rQgELwV9ay8v3BzMr2n9M0Au9yNdPmri1eNkNGJEQtPSwPKjI0HObbG5g3fvzf44xu3AUQl6qUss1IOX409CiLMrdLXLFUKG%2BwAm0K"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901567752bfd1875-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1662&min_rtt=1635&rtt_var=632&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1785932&cwnd=153&unsent_bytes=0&cid=ec142c291447f76d&ts=142&x=0"
                                                                    2025-01-13 12:31:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    14192.168.2.549784104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:36 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 12:31:36 UTC857INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:36 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086285
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sDjK4BMgKYv7ihNmb152JPPBB5u%2BviZ31yn7zVShmqDM2%2B3wEopMFfCV%2FWmDuAuVl9TYmXelgl9nkSd86Lq5CNcKRyiD36ocXTJ2ZqCzNUMpeMsyxzTxQoW0gL97IQ2mSygX6l%2Bi"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 9015677d7bfd41a6-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1541&min_rtt=1537&rtt_var=584&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1859872&cwnd=241&unsent_bytes=0&cid=0bfb73e63a7719ef&ts=160&x=0"
                                                                    2025-01-13 12:31:36 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    15192.168.2.549794104.21.32.14437192C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 12:31:37 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2025-01-13 12:31:37 UTC860INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 12:31:37 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    Age: 2086287
                                                                    Cache-Control: max-age=31536000
                                                                    cf-cache-status: HIT
                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N%2BilAZ3UgJNZVsUhfQoc%2BotWQjKyqDyiUM%2FllOxf4TAKPQ3g6i6NsFgE%2Bi6%2FNXVE2KF6PiaHlrWjl0xnSI8wBKopks%2BYttL2od2zspNHFPsB31KVN1RRHTa9LIktNH9fWXVHE2ar"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 90156785f89a72b9-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1777&min_rtt=1777&rtt_var=888&sent=4&recv=6&lost=0&retrans=1&sent_bytes=4236&recv_bytes=699&delivery_rate=226303&cwnd=217&unsent_bytes=0&cid=e55bea24dbb3e79e&ts=142&x=0"
                                                                    2025-01-13 12:31:37 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:07:31:09
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\Desktop\rOrders.scr.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\rOrders.scr.exe"
                                                                    Imagebase:0x760000
                                                                    File size:829'952 bytes
                                                                    MD5 hash:1FEB066E46D1BEED60404A2A6ADB3D5A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003CB2000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003C88000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.4557355431.0000000003CD0000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Target ID:2
                                                                    Start time:07:31:10
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\rOrders.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'
                                                                    Imagebase:0xd00000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:07:31:10
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:07:31:11
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\Desktop\rOrders.scr.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\rOrders.scr.exe"
                                                                    Imagebase:0x930000
                                                                    File size:829'952 bytes
                                                                    MD5 hash:1FEB066E46D1BEED60404A2A6ADB3D5A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4536657049.0000000002F4D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.4531261400.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4536657049.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Target ID:5
                                                                    Start time:07:31:11
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:07:31:22
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"
                                                                    Imagebase:0xed0000
                                                                    File size:829'952 bytes
                                                                    MD5 hash:1FEB066E46D1BEED60404A2A6ADB3D5A
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.4557201022.0000000004391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 66%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Target ID:7
                                                                    Start time:07:31:23
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe'
                                                                    Imagebase:0xd00000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:07:31:23
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:9
                                                                    Start time:07:31:24
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00.exe"
                                                                    Imagebase:0x990000
                                                                    File size:829'952 bytes
                                                                    MD5 hash:1FEB066E46D1BEED60404A2A6ADB3D5A
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4538005534.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4538005534.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:10.8%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0.7%
                                                                      Total number of Nodes:440
                                                                      Total number of Limit Nodes:28
                                                                      execution_graph 38838 ecd01c 38839 ecd034 38838->38839 38840 ecd08e 38839->38840 38846 5161a97 38839->38846 38851 5161aa8 38839->38851 38856 5162808 38839->38856 38861 5162818 38839->38861 38866 5161bd1 38839->38866 38847 5161aa8 38846->38847 38849 5162818 3 API calls 38847->38849 38850 5162808 3 API calls 38847->38850 38848 5161aef 38848->38840 38849->38848 38850->38848 38852 5161ace 38851->38852 38854 5162818 3 API calls 38852->38854 38855 5162808 3 API calls 38852->38855 38853 5161aef 38853->38840 38854->38853 38855->38853 38857 516280d 38856->38857 38858 5162877 38857->38858 38871 5162d88 38857->38871 38876 5162da8 38857->38876 38862 5162845 38861->38862 38863 5162877 38862->38863 38864 5162d88 3 API calls 38862->38864 38865 5162da8 3 API calls 38862->38865 38864->38863 38865->38863 38867 5161bbf 38866->38867 38868 5161bda 38866->38868 38867->38840 38869 5161be7 38868->38869 39046 5161d1e 38868->39046 38869->38840 38873 5162dbc 38871->38873 38872 5162e48 38872->38858 38881 5162e50 38873->38881 38889 5162e60 38873->38889 38878 5162dbc 38876->38878 38877 5162e48 38877->38858 38879 5162e50 3 API calls 38878->38879 38880 5162e60 3 API calls 38878->38880 38879->38877 38880->38877 38882 5162e60 38881->38882 38883 5162e71 38882->38883 38896 5164022 38882->38896 38900 7a70acf 38882->38900 38926 7a70ae0 38882->38926 38952 5163420 38882->38952 38957 5163412 38882->38957 38883->38872 38890 5162e71 38889->38890 38891 5164022 2 API calls 38889->38891 38892 5163412 2 API calls 38889->38892 38893 5163420 2 API calls 38889->38893 38894 7a70ae0 3 API calls 38889->38894 38895 7a70acf 3 API calls 38889->38895 38890->38872 38891->38890 38892->38890 38893->38890 38894->38890 38895->38890 38962 5164050 38896->38962 38966 5164040 38896->38966 38897 516403a 38897->38883 38901 7a70ad5 38900->38901 38902 7a70b40 38901->38902 38903 7a70afe 38901->38903 38915 7a70b15 38901->38915 38910 7a70b51 38902->38910 38911 7a70dcc 38902->38911 38902->38915 38904 7a70b03 38903->38904 38905 7a70b1a 38903->38905 38906 7a70b0c 38904->38906 38907 7a70d2a 38904->38907 38908 7a70b23 38905->38908 38909 7a70ca1 38905->38909 38906->38915 38916 7a70da2 38906->38916 38983 7a70230 38907->38983 38908->38915 38917 7a70d94 38908->38917 38918 7a70c8e 38908->38918 38919 7a70d38 38908->38919 38922 7a70c46 38908->38922 38977 7a701e0 38909->38977 38910->38915 38910->38918 38910->38922 38991 7a702e0 38911->38991 38915->38918 38925 7a710b0 2 API calls 38915->38925 38995 7a702b0 CallWindowProcW CallWindowProcW 38916->38995 38987 7a702a0 38917->38987 38918->38883 38924 7a710b0 2 API calls 38919->38924 38970 7a710b0 38922->38970 38924->38918 38925->38918 38927 7a70af9 38926->38927 38932 7a70b15 38926->38932 38928 7a70b40 38927->38928 38929 7a70afe 38927->38929 38928->38932 38936 7a70b51 38928->38936 38937 7a70dcc 38928->38937 38930 7a70b03 38929->38930 38931 7a70b1a 38929->38931 38933 7a70b0c 38930->38933 38934 7a70d2a 38930->38934 38935 7a70ca1 38931->38935 38942 7a70b23 38931->38942 38945 7a70c8e 38932->38945 38951 7a710b0 2 API calls 38932->38951 38933->38932 38941 7a70da2 38933->38941 38938 7a70230 2 API calls 38934->38938 38940 7a701e0 OleInitialize 38935->38940 38936->38932 38936->38945 38948 7a70c46 38936->38948 38939 7a702e0 2 API calls 38937->38939 38938->38945 38939->38945 38940->38945 39035 7a702b0 CallWindowProcW CallWindowProcW 38941->39035 38942->38932 38943 7a70d94 38942->38943 38944 7a70d38 38942->38944 38942->38945 38942->38948 38947 7a702a0 2 API calls 38943->38947 38950 7a710b0 2 API calls 38944->38950 38945->38883 38947->38945 38949 7a710b0 2 API calls 38948->38949 38949->38945 38950->38945 38951->38945 38954 516346c 38952->38954 38953 51634bd 38953->38883 38954->38953 39036 7a71140 38954->39036 39041 7a71150 38954->39041 38959 5163420 38957->38959 38958 51634bd 38958->38883 38959->38958 38960 7a71140 2 API calls 38959->38960 38961 7a71150 2 API calls 38959->38961 38960->38958 38961->38958 38963 5164092 38962->38963 38965 5164099 38962->38965 38964 51640ea CallWindowProcW 38963->38964 38963->38965 38964->38965 38965->38897 38967 5164050 38966->38967 38968 51640ea CallWindowProcW 38967->38968 38969 5164099 38967->38969 38968->38969 38969->38897 38971 7a710c2 38970->38971 38972 7a710bb 38970->38972 39005 7a710e0 38971->39005 38996 7a70340 38972->38996 38974 7a710c0 38974->38918 38975 7a710c8 38975->38918 38978 7a701eb 38977->38978 38981 7a767bd 38978->38981 39011 7a754a0 38978->39011 38980 7a76803 38980->38918 38981->38980 38982 7a754a0 OleInitialize 38981->38982 38982->38980 38984 7a7023b 38983->38984 38985 7a710b0 2 API calls 38984->38985 38986 7a712c6 38985->38986 38986->38918 38988 7a702ab 38987->38988 38989 7a710b0 2 API calls 38988->38989 38990 7a74434 38989->38990 38990->38918 38992 7a702eb 38991->38992 38993 7a710b0 2 API calls 38992->38993 38994 7a73de1 38993->38994 38994->38918 38995->38918 38997 7a7034b 38996->38997 38998 7a788f6 38997->38998 39004 7a787fb 38997->39004 38999 7a710e0 2 API calls 38998->38999 39000 7a78901 38999->39000 39000->38974 39001 7a710e0 2 API calls 39002 7a788ef 39001->39002 39002->38974 39003 7a78807 39003->38974 39004->39001 39004->39003 39006 7a710ee 39005->39006 39008 7a71110 39005->39008 39007 7a710fc 39006->39007 39009 5163412 2 API calls 39006->39009 39010 5163420 2 API calls 39006->39010 39007->38975 39008->38975 39009->39007 39010->39007 39012 7a754ab 39011->39012 39013 7a7682e 39012->39013 39016 7a76868 39012->39016 39022 7a76858 39012->39022 39013->38981 39017 7a76b70 39016->39017 39018 7a76890 39016->39018 39017->39013 39019 7a76899 39018->39019 39028 7a7553c 39018->39028 39019->39013 39021 7a768bc 39023 7a76b70 39022->39023 39024 7a76890 39022->39024 39023->39013 39025 7a76899 39024->39025 39026 7a7553c OleInitialize 39024->39026 39025->39013 39027 7a768bc 39026->39027 39030 7a75547 39028->39030 39029 7a76bb3 39029->39021 39030->39029 39032 7a75558 39030->39032 39033 7a76be8 OleInitialize 39032->39033 39034 7a76c4c 39033->39034 39034->39029 39035->38945 39037 7a71150 39036->39037 39038 7a711b9 39037->39038 39039 5164050 CallWindowProcW 39037->39039 39040 5164040 CallWindowProcW 39037->39040 39038->38953 39039->39038 39040->39038 39042 7a71196 39041->39042 39043 7a711b9 39042->39043 39044 5164050 CallWindowProcW 39042->39044 39045 5164040 CallWindowProcW 39042->39045 39043->38953 39044->39043 39045->39043 39048 5161d27 39046->39048 39047 5161e76 39048->39047 39049 5161b08 2 API calls 39048->39049 39049->39047 38605 7a7e3a0 38606 7a7e405 38605->38606 38608 7a7e452 38606->38608 38609 7a7dff0 38606->38609 38610 7a7f108 DispatchMessageW 38609->38610 38611 7a7f174 38610->38611 38611->38606 38612 7a73be0 38613 7a73bf0 38612->38613 38617 5161af7 38613->38617 38622 5161b08 38613->38622 38614 7a73c02 38618 5161b08 38617->38618 38626 5161b30 38618->38626 38629 5161b38 SetWindowLongW 38618->38629 38619 5161b20 38619->38614 38624 5161b30 SetWindowLongW 38622->38624 38625 5161b38 SetWindowLongW 38622->38625 38623 5161b20 38623->38614 38624->38623 38625->38623 38627 5161b38 SetWindowLongW 38626->38627 38628 5161ba4 38627->38628 38628->38619 38630 5161ba4 38629->38630 38630->38619 38650 7a74fbb 38651 7a74fce 38650->38651 38655 7a75271 PostMessageW 38651->38655 38657 7a752a0 PostMessageW 38651->38657 38652 7a74ff1 38656 7a7530c 38655->38656 38656->38652 38658 7a7530c 38657->38658 38658->38652 38631 115d3d8 38632 115d41e 38631->38632 38636 115d5b8 38632->38636 38639 115d5a8 38632->38639 38633 115d50b 38643 115b730 38636->38643 38640 115d5b8 38639->38640 38641 115b730 DuplicateHandle 38640->38641 38642 115d5e6 38641->38642 38642->38633 38644 115d620 DuplicateHandle 38643->38644 38645 115d5e6 38644->38645 38645->38633 39050 1154668 39051 115467a 39050->39051 39054 1154686 39051->39054 39056 1154779 39051->39056 39053 11546a5 39061 1153e10 39054->39061 39057 115479d 39056->39057 39065 1154878 39057->39065 39069 1154888 39057->39069 39062 1153e1b 39061->39062 39077 1155c64 39062->39077 39064 1156fcf 39064->39053 39067 1154888 39065->39067 39066 115498c 39066->39066 39067->39066 39073 1154248 39067->39073 39071 11548af 39069->39071 39070 115498c 39070->39070 39071->39070 39072 1154248 CreateActCtxA 39071->39072 39072->39070 39074 1155918 CreateActCtxA 39073->39074 39076 11559db 39074->39076 39078 1155c6f 39077->39078 39081 1155c84 39078->39081 39080 1157085 39080->39064 39082 1155c8f 39081->39082 39085 1155cb4 39082->39085 39084 1157162 39084->39080 39086 1155cbf 39085->39086 39089 1155ce4 39086->39089 39088 1157265 39088->39084 39090 1155cef 39089->39090 39091 115856b 39090->39091 39096 115ac18 39090->39096 39092 11585a9 39091->39092 39100 115cd00 39091->39100 39105 115cd10 39091->39105 39092->39088 39110 115ac50 39096->39110 39113 115ac40 39096->39113 39097 115ac2e 39097->39091 39101 115cd31 39100->39101 39102 115cd55 39101->39102 39121 115cec0 39101->39121 39125 115ceb1 39101->39125 39102->39092 39106 115cd31 39105->39106 39107 115cd55 39106->39107 39108 115ceb1 7 API calls 39106->39108 39109 115cec0 7 API calls 39106->39109 39107->39092 39108->39107 39109->39107 39116 115ad48 39110->39116 39111 115ac5f 39111->39097 39114 115ac5f 39113->39114 39115 115ad48 GetModuleHandleW 39113->39115 39114->39097 39115->39114 39117 115ad7c 39116->39117 39118 115ad59 39116->39118 39117->39111 39118->39117 39119 115af80 GetModuleHandleW 39118->39119 39120 115afad 39119->39120 39120->39111 39122 115cecd 39121->39122 39124 115cf07 39122->39124 39129 115b720 39122->39129 39124->39102 39126 115cec0 39125->39126 39127 115cf07 39126->39127 39128 115b720 7 API calls 39126->39128 39127->39102 39128->39127 39130 115b72b 39129->39130 39132 115dc18 39130->39132 39133 115d024 39130->39133 39132->39132 39134 115d02f 39133->39134 39135 1155ce4 7 API calls 39134->39135 39136 115dc87 39135->39136 39137 115dc96 39136->39137 39141 115dd00 5 API calls 39136->39141 39142 115dcf0 5 API calls 39136->39142 39139 115f9f0 2 API calls 39137->39139 39140 115fa08 2 API calls 39137->39140 39138 115dcc1 39138->39132 39139->39138 39140->39138 39141->39137 39142->39137 38659 51641b8 38660 51641c8 38659->38660 38664 7a714a8 38660->38664 38670 7a714b8 38660->38670 38661 51641f1 38665 7a714b8 38664->38665 38676 51657f0 38665->38676 38688 5165aac 38665->38688 38694 5165800 38665->38694 38666 7a71542 38666->38661 38671 7a714ed 38670->38671 38673 51657f0 4 API calls 38671->38673 38674 5165800 4 API calls 38671->38674 38675 5165aac 4 API calls 38671->38675 38672 7a71542 38672->38661 38673->38672 38674->38672 38675->38672 38679 5165800 38676->38679 38678 5164330 4 API calls 38680 5165c0c 38678->38680 38687 5165a64 38679->38687 38706 51651f4 38679->38706 38680->38666 38681 51658e5 38682 5164330 4 API calls 38681->38682 38686 516598d 38681->38686 38683 5165957 38682->38683 38684 5164330 4 API calls 38683->38684 38684->38686 38712 5164330 38686->38712 38687->38678 38687->38680 38689 5165ab5 38688->38689 38691 5165ad3 38688->38691 38690 5164330 4 API calls 38689->38690 38689->38691 38690->38691 38692 5164330 4 API calls 38691->38692 38693 5165c0c 38691->38693 38692->38693 38693->38666 38699 516582c 38694->38699 38695 51651f4 4 API calls 38701 51658e5 38695->38701 38696 5165a64 38697 5164330 4 API calls 38696->38697 38698 5165c0c 38696->38698 38697->38698 38698->38666 38699->38695 38699->38696 38700 516598d 38705 5164330 4 API calls 38700->38705 38701->38700 38702 5164330 4 API calls 38701->38702 38703 5165957 38702->38703 38704 5164330 4 API calls 38703->38704 38704->38700 38705->38696 38707 51651ff 38706->38707 38709 5164330 4 API calls 38707->38709 38710 5165da7 38707->38710 38711 5165d69 38707->38711 38708 5164330 4 API calls 38708->38711 38709->38711 38710->38681 38711->38708 38711->38710 38713 5164334 38712->38713 38714 516437d 38713->38714 38717 7a707da 38713->38717 38733 7a707e8 38713->38733 38714->38687 38719 7a70821 38717->38719 38720 7a708bf 38719->38720 38749 115f9f0 38719->38749 38754 115fa08 38719->38754 38759 7a700f8 38720->38759 38721 7a7092b 38722 7a70a55 38721->38722 38763 7a70128 38721->38763 38724 7a709fc 38724->38722 38725 7a70128 2 API calls 38724->38725 38726 7a70a27 38725->38726 38726->38722 38727 7a70128 2 API calls 38726->38727 38728 7a70a38 38727->38728 38768 7a736f9 38728->38768 38773 7a73708 38728->38773 38735 7a70821 38733->38735 38734 7a700f8 2 API calls 38737 7a7092b 38734->38737 38736 7a708bf 38735->38736 38745 115f9f0 2 API calls 38735->38745 38746 115fa08 2 API calls 38735->38746 38736->38734 38738 7a70a55 38737->38738 38739 7a70128 2 API calls 38737->38739 38740 7a709fc 38739->38740 38740->38738 38741 7a70128 2 API calls 38740->38741 38742 7a70a27 38741->38742 38742->38738 38743 7a70128 2 API calls 38742->38743 38744 7a70a38 38743->38744 38747 7a736f9 SendMessageW 38744->38747 38748 7a73708 SendMessageW 38744->38748 38745->38736 38746->38736 38747->38738 38748->38738 38750 115fa08 38749->38750 38751 115fa45 38750->38751 38778 51609b0 38750->38778 38783 51609c0 38750->38783 38751->38720 38755 115fa39 38754->38755 38756 115fa45 38754->38756 38755->38756 38757 51609b0 2 API calls 38755->38757 38758 51609c0 2 API calls 38755->38758 38756->38720 38757->38756 38758->38756 38760 7a70103 38759->38760 38761 7a70128 2 API calls 38760->38761 38762 7a719d0 38760->38762 38761->38762 38762->38721 38764 7a70133 38763->38764 38765 7a71a93 38764->38765 38766 51609b0 2 API calls 38764->38766 38767 51609c0 2 API calls 38764->38767 38765->38724 38766->38765 38767->38765 38769 7a73716 38768->38769 38770 7a7371a SendMessageW 38768->38770 38769->38722 38772 7a737cc 38770->38772 38772->38722 38774 7a73716 38773->38774 38775 7a7371a SendMessageW 38773->38775 38774->38722 38777 7a737cc 38775->38777 38777->38722 38779 51609eb 38778->38779 38780 5160a9a 38779->38780 38788 5161890 38779->38788 38793 51618a0 38779->38793 38784 51609eb 38783->38784 38785 5160a9a 38784->38785 38786 5161890 2 API calls 38784->38786 38787 51618a0 2 API calls 38784->38787 38786->38785 38787->38785 38789 51618a0 38788->38789 38797 51618e4 38789->38797 38801 51618f0 38789->38801 38795 51618e4 CreateWindowExW 38793->38795 38796 51618f0 CreateWindowExW 38793->38796 38794 51618d5 38794->38780 38795->38794 38796->38794 38798 51618f0 CreateWindowExW 38797->38798 38800 5161a14 38798->38800 38800->38800 38802 5161958 CreateWindowExW 38801->38802 38804 5161a14 38802->38804 38804->38804 38646 7a71568 38647 7a715b0 SetWindowTextW 38646->38647 38648 7a715aa 38646->38648 38649 7a715e1 38647->38649 38648->38647 38805 7a71b08 38806 7a71b18 38805->38806 38809 7a7009c 38806->38809 38810 7a71b40 SendMessageW 38809->38810 38811 7a71b29 38810->38811 38812 7a70448 38814 7a7046e 38812->38814 38813 7a70482 38814->38813 38819 115dd00 38814->38819 38826 115dcf0 38814->38826 38820 115dd2e 38819->38820 38823 115ddff 38820->38823 38824 5164330 4 API calls 38820->38824 38833 5164320 38820->38833 38821 115dda6 38822 115ddfa KiUserCallbackDispatcher 38821->38822 38822->38823 38824->38821 38827 115dd2e 38826->38827 38828 115ddff 38827->38828 38831 5164330 4 API calls 38827->38831 38832 5164320 4 API calls 38827->38832 38829 115dda6 38830 115ddfa KiUserCallbackDispatcher 38829->38830 38830->38828 38831->38829 38832->38829 38834 516432a 38833->38834 38835 516437d 38834->38835 38836 7a707da 4 API calls 38834->38836 38837 7a707e8 4 API calls 38834->38837 38835->38821 38836->38835 38837->38835
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$(osq$,wq$,wq$Hwq
                                                                      • API String ID: 0-660065146
                                                                      • Opcode ID: 0138f16153d3190d010ec3c58482f880d0e80ade0c11bbe3cd82a8bc5689553c
                                                                      • Instruction ID: d3489e66fd5b1f60a8d40347743d4de7871d71e7c3aecc6f0f35e7066942699f
                                                                      • Opcode Fuzzy Hash: 0138f16153d3190d010ec3c58482f880d0e80ade0c11bbe3cd82a8bc5689553c
                                                                      • Instruction Fuzzy Hash: A5528E75B081159FCB18DF69C494AAEBBB2FF88310F158069E806EB361DB31ED51CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 634 7a71c80-7a72bc0 637 7a72bc6-7a72bcb 634->637 638 7a730a3-7a7310c 634->638 637->638 639 7a72bd1-7a72bee 637->639 646 7a73113-7a7319b 638->646 645 7a72bf4-7a72bf8 639->645 639->646 647 7a72c07-7a72c0b 645->647 648 7a72bfa-7a72bff call 7a71c90 645->648 688 7a731a6-7a73226 646->688 651 7a72c0d-7a72c17 call 7a71c90 647->651 652 7a72c1a-7a72c21 647->652 654 7a72c04 648->654 651->652 656 7a72c27-7a72c57 652->656 657 7a72d3c-7a72d41 652->657 654->647 667 7a73426-7a734a2 656->667 668 7a72c5d-7a72d30 call 7a71c9c * 2 656->668 661 7a72d43-7a72d47 657->661 662 7a72d49-7a72d4e 657->662 661->662 663 7a72d50-7a72d54 661->663 664 7a72d60-7a72d90 call 7a71ca8 * 3 662->664 663->667 671 7a72d5a-7a72d5d 663->671 664->688 689 7a72d96-7a72d99 664->689 690 7a734a4-7a734aa 667->690 691 7a734ab-7a734c8 667->691 668->657 701 7a72d32 668->701 671->664 709 7a7322d-7a732af 688->709 689->688 694 7a72d9f-7a72da1 689->694 690->691 694->688 696 7a72da7-7a72ddc 694->696 708 7a72de2-7a72deb 696->708 696->709 701->657 711 7a72df1-7a72e4b call 7a71ca8 * 2 call 7a71cb8 * 2 708->711 712 7a72f4e-7a72f52 708->712 714 7a732b7-7a73339 709->714 755 7a72e5d 711->755 756 7a72e4d-7a72e56 711->756 712->714 715 7a72f58-7a72f5c 712->715 720 7a73341-7a7336e 714->720 719 7a72f62-7a72f68 715->719 715->720 724 7a72f6c-7a72fa1 719->724 725 7a72f6a 719->725 733 7a73375-7a733f5 720->733 729 7a72fa8-7a72fae 724->729 725->729 729->733 734 7a72fb4-7a72fbc 729->734 790 7a733fc-7a7341e 733->790 738 7a72fc3-7a72fc5 734->738 739 7a72fbe-7a72fc2 734->739 745 7a73027-7a7302d 738->745 746 7a72fc7-7a72feb 738->746 739->738 751 7a7302f-7a7304a 745->751 752 7a7304c-7a7307a 745->752 774 7a72ff4-7a72ff8 746->774 775 7a72fed-7a72ff2 746->775 772 7a73082-7a7308e 751->772 752->772 761 7a72e61-7a72e63 755->761 756->761 762 7a72e58-7a72e5b 756->762 770 7a72e65 761->770 771 7a72e6a-7a72e6e 761->771 762->761 770->771 776 7a72e70-7a72e77 771->776 777 7a72e7c-7a72e82 771->777 789 7a73094-7a730a0 772->789 772->790 774->667 780 7a72ffe-7a73001 774->780 779 7a73004-7a73025 775->779 784 7a72f19-7a72f1d 776->784 785 7a72e84-7a72e8a 777->785 786 7a72e8c-7a72e91 777->786 779->772 780->779 791 7a72f1f-7a72f39 784->791 792 7a72f3c-7a72f48 784->792 787 7a72e97-7a72e9d 785->787 786->787 794 7a72ea3-7a72ea8 787->794 795 7a72e9f-7a72ea1 787->795 790->667 791->792 792->711 792->712 801 7a72eaa-7a72ebc 794->801 795->801 807 7a72ec6-7a72ecb 801->807 808 7a72ebe-7a72ec4 801->808 809 7a72ed1-7a72ed8 807->809 808->809 814 7a72ede 809->814 815 7a72eda-7a72edc 809->815 817 7a72ee3-7a72eee 814->817 815->817 818 7a72f12 817->818 819 7a72ef0-7a72ef3 817->819 818->784 819->784 821 7a72ef5-7a72efb 819->821 822 7a72f02-7a72f0b 821->822 823 7a72efd-7a72f00 821->823 822->784 825 7a72f0d-7a72f10 822->825 823->818 823->822 825->784 825->818
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hwq$Hwq$Hwq$Hwq$Hwq
                                                                      • API String ID: 0-154242596
                                                                      • Opcode ID: cd1080df9ee5370d0cf29ea60d3fbd23fe7566938c07efe1475baa4bc4f093f7
                                                                      • Instruction ID: 90df198bfdee0fcee35f064d878d13cd74039ef8ba800b2b1e5241bc4d4a969b
                                                                      • Opcode Fuzzy Hash: cd1080df9ee5370d0cf29ea60d3fbd23fe7566938c07efe1475baa4bc4f093f7
                                                                      • Instruction Fuzzy Hash: CA426DB1E002588FDB54DFA8C89079EBBF2BF88300F14856AD419AB395DB349D45CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: DispatchMessage
                                                                      • String ID:
                                                                      • API String ID: 2061451462-0
                                                                      • Opcode ID: 101985f155dd4af8257cf951ee47640010def48c0e82a0831a848552947d282e
                                                                      • Instruction ID: f7eecc10b768798a8d79f6c1ff462675bff1e6a147289333a016531be1c202b2
                                                                      • Opcode Fuzzy Hash: 101985f155dd4af8257cf951ee47640010def48c0e82a0831a848552947d282e
                                                                      • Instruction Fuzzy Hash: 09F16AB0A04209CFDB14DFA9CD84B9DBBF2BF88314F1485A9E415AB2A5DB70E945CB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 68188e1eb5574274e708904199eb845f6130378b3838b71225a9820ed2aa0cc8
                                                                      • Instruction ID: 856d150021f8d66187106b6b675169f70a56a6a7a9d13620261305cf4cfd2526
                                                                      • Opcode Fuzzy Hash: 68188e1eb5574274e708904199eb845f6130378b3838b71225a9820ed2aa0cc8
                                                                      • Instruction Fuzzy Hash: EAC158B1E002498FDF15CFA5C98079EBBF2BF89300F15C5AAD859AB255EB309985CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6f62a686ff9ed1e8b00697e916319a925d0f1a5eca0f61158e74fcd7f9f94fda
                                                                      • Instruction ID: 4f208890407954ef86bd8a45fdff3f77d0c56afb1c5a63ffe96011ba91e972cd
                                                                      • Opcode Fuzzy Hash: 6f62a686ff9ed1e8b00697e916319a925d0f1a5eca0f61158e74fcd7f9f94fda
                                                                      • Instruction Fuzzy Hash: 66A1CE74E052198FCB14DFA9D684A9EFBF2FF48310F1481AAE409AB356D734A985CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 826 115ad48-115ad57 827 115ad83-115ad87 826->827 828 115ad59-115ad66 call 115a0a0 826->828 830 115ad89-115ad93 827->830 831 115ad9b-115addc 827->831 833 115ad7c 828->833 834 115ad68 828->834 830->831 837 115adde-115ade6 831->837 838 115ade9-115adf7 831->838 833->827 882 115ad6e call 115afd0 834->882 883 115ad6e call 115afe0 834->883 837->838 839 115adf9-115adfe 838->839 840 115ae1b-115ae1d 838->840 842 115ae00-115ae07 call 115a0ac 839->842 843 115ae09 839->843 845 115ae20-115ae27 840->845 841 115ad74-115ad76 841->833 844 115aeb8-115af78 841->844 847 115ae0b-115ae19 842->847 843->847 877 115af80-115afab GetModuleHandleW 844->877 878 115af7a-115af7d 844->878 848 115ae34-115ae3b 845->848 849 115ae29-115ae31 845->849 847->845 851 115ae3d-115ae45 848->851 852 115ae48-115ae4a call 115a0bc 848->852 849->848 851->852 856 115ae4f-115ae51 852->856 857 115ae53-115ae5b 856->857 858 115ae5e-115ae63 856->858 857->858 859 115ae65-115ae6c 858->859 860 115ae81-115ae8e 858->860 859->860 862 115ae6e-115ae7e call 115a0cc call 115a0dc 859->862 867 115aeb1-115aeb7 860->867 868 115ae90-115aeae 860->868 862->860 868->867 879 115afb4-115afc8 877->879 880 115afad-115afb3 877->880 878->877 880->879 882->841 883->841
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0115AF9E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID: ,O$,O
                                                                      • API String ID: 4139908857-201552661
                                                                      • Opcode ID: bb35be1c27c7b8635f7d5457232cf61d17add28738aee7b0776c157ac0f6bac9
                                                                      • Instruction ID: 3c7d3c484c9750ce011bd3dc0c65137f31de0a6f043b7a519844446419946827
                                                                      • Opcode Fuzzy Hash: bb35be1c27c7b8635f7d5457232cf61d17add28738aee7b0776c157ac0f6bac9
                                                                      • Instruction Fuzzy Hash: 21713370A00B05CFD768DF29E54175ABBF1FF88304F008A2DE99AD7A40DB75E8458B91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1167 51618e4-5161956 1169 5161961-5161968 1167->1169 1170 5161958-516195e 1167->1170 1171 5161973-5161a12 CreateWindowExW 1169->1171 1172 516196a-5161970 1169->1172 1170->1169 1174 5161a14-5161a1a 1171->1174 1175 5161a1b-5161a53 1171->1175 1172->1171 1174->1175 1179 5161a55-5161a58 1175->1179 1180 5161a60 1175->1180 1179->1180 1181 5161a61 1180->1181 1181->1181
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05161A02
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: f5f42f6949c5d24b1f2996e2c45cb749939c10b9333dbb3edee2ea4bb7228e52
                                                                      • Instruction ID: 51f8f0093510175d44ce603003d5cd65f6eebbe5aa85bae84e068d106e3f47c9
                                                                      • Opcode Fuzzy Hash: f5f42f6949c5d24b1f2996e2c45cb749939c10b9333dbb3edee2ea4bb7228e52
                                                                      • Instruction Fuzzy Hash: B351C2B1D10349AFDF14CF9AC984ADEBBB5FF88310F24812AE819AB210D7759945CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1182 51618f0-5161956 1183 5161961-5161968 1182->1183 1184 5161958-516195e 1182->1184 1185 5161973-5161a12 CreateWindowExW 1183->1185 1186 516196a-5161970 1183->1186 1184->1183 1188 5161a14-5161a1a 1185->1188 1189 5161a1b-5161a53 1185->1189 1186->1185 1188->1189 1193 5161a55-5161a58 1189->1193 1194 5161a60 1189->1194 1193->1194 1195 5161a61 1194->1195 1195->1195
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05161A02
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 2a6e00828a78dd24eaae2643b30b058d190768d419950931e39bad9f9184920b
                                                                      • Instruction ID: 7122f1a728d54ea4e5cb51c8fd9315d99568b30a1b0f0b73ccd142fa07e34862
                                                                      • Opcode Fuzzy Hash: 2a6e00828a78dd24eaae2643b30b058d190768d419950931e39bad9f9184920b
                                                                      • Instruction Fuzzy Hash: 1741B2B5D10349AFDF14CF9AC984ADEBBB5BF88310F24812AE819AB210D7759945CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1196 1154248-11559d9 CreateActCtxA 1199 11559e2-1155a3c 1196->1199 1200 11559db-11559e1 1196->1200 1207 1155a3e-1155a41 1199->1207 1208 1155a4b-1155a4f 1199->1208 1200->1199 1207->1208 1209 1155a51-1155a5d 1208->1209 1210 1155a60 1208->1210 1209->1210 1212 1155a61 1210->1212 1212->1212
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 011559C9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: 8366074681d682bede6820074161e4a9b7fa95c54e0012e1231acd8c49474038
                                                                      • Instruction ID: ac580b2a41159698c52fda1ee4ab8ca6a291a616f50baac83ddf1db153b3a272
                                                                      • Opcode Fuzzy Hash: 8366074681d682bede6820074161e4a9b7fa95c54e0012e1231acd8c49474038
                                                                      • Instruction Fuzzy Hash: 7041E0B0C0071DCBDB68CFA9C985B9EBBB6FF49304F60806AD418AB251DB756945CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1213 115590d-11559d9 CreateActCtxA 1215 11559e2-1155a3c 1213->1215 1216 11559db-11559e1 1213->1216 1223 1155a3e-1155a41 1215->1223 1224 1155a4b-1155a4f 1215->1224 1216->1215 1223->1224 1225 1155a51-1155a5d 1224->1225 1226 1155a60 1224->1226 1225->1226 1228 1155a61 1226->1228 1228->1228
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 011559C9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: 371ab372acc8fd258c4cc9a941d112013ac049f17cc9567f61280b4a756ccf23
                                                                      • Instruction ID: 2380e4ac3d7f797792f1d243e64438982e785c9fa1a803f62d9b0411b168fab9
                                                                      • Opcode Fuzzy Hash: 371ab372acc8fd258c4cc9a941d112013ac049f17cc9567f61280b4a756ccf23
                                                                      • Instruction Fuzzy Hash: 7941DFB0C10719CEDB28CFA9C985B9EBBB6FF49304F60806AD418AB251DB756946CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1229 5164050-516408c 1230 5164092-5164097 1229->1230 1231 516413c-516415c 1229->1231 1232 51640ea-5164122 CallWindowProcW 1230->1232 1233 5164099-51640d0 1230->1233 1237 516415f-516416c 1231->1237 1234 5164124-516412a 1232->1234 1235 516412b-516413a 1232->1235 1239 51640d2-51640d8 1233->1239 1240 51640d9-51640e8 1233->1240 1234->1235 1235->1237 1239->1240 1240->1237
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 05164111
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: CallProcWindow
                                                                      • String ID:
                                                                      • API String ID: 2714655100-0
                                                                      • Opcode ID: 0ced981e197c90e604571180cc632f25cec2a0df44ac95ae4c9c43bf7facece4
                                                                      • Instruction ID: ab225bc8a47bf6980e2ab3e69465ab9bd4a98db3e5cb46cae17d8b34141092b3
                                                                      • Opcode Fuzzy Hash: 0ced981e197c90e604571180cc632f25cec2a0df44ac95ae4c9c43bf7facece4
                                                                      • Instruction Fuzzy Hash: 90411DB9900305CFCB14CF99C889AAABBF6FF88314F24C559D519AB321D775A841CFA0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,?,?,?), ref: 07A737BD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 20fd51e9e58ba2ae4c8daff1d6036bd43b2e4e55991c1854fd9d3be4b4774d1e
                                                                      • Instruction ID: 89395d776662bd32a08b4c8fd8437e9ea9d5272c7fb51bac7ad0440411b6f0d6
                                                                      • Opcode Fuzzy Hash: 20fd51e9e58ba2ae4c8daff1d6036bd43b2e4e55991c1854fd9d3be4b4774d1e
                                                                      • Instruction Fuzzy Hash: C1215AB59002499FCB14DFA9C885BDEBFF8EF48320F24445AE519A7751C775A940CFA0
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0115D5E6,?,?,?,?,?), ref: 0115D6A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: c2a9b96e51c0a6ff09dac9d87d235124777c40b90936e326899acacbf5024369
                                                                      • Instruction ID: 068f4496a37401975063b1199e85b02ad6933cf2190b0864ade067a48bd54dbc
                                                                      • Opcode Fuzzy Hash: c2a9b96e51c0a6ff09dac9d87d235124777c40b90936e326899acacbf5024369
                                                                      • Instruction Fuzzy Hash: 1C21E6B5900208DFDB10CF9AD584ADEBFF8FB48310F14841AE918A7310D374A940CFA5
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0115D5E6,?,?,?,?,?), ref: 0115D6A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: d21ed9b8bcccf6c4995a843c21951e893e89c5058cb82f68e8763068807fca52
                                                                      • Instruction ID: 621d9aa89ee5cb5a6d41b5a61e8a5933f068867bab876f6fc476ea2df61eeb6e
                                                                      • Opcode Fuzzy Hash: d21ed9b8bcccf6c4995a843c21951e893e89c5058cb82f68e8763068807fca52
                                                                      • Instruction Fuzzy Hash: 3A21E0B5D00209DFDB10CFAAD985ADEBBF5EB48320F24801AE918B7310D378A944CF60
                                                                      APIs
                                                                      • PostMessageW.USER32(?,?,?,?), ref: 07A752FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost
                                                                      • String ID:
                                                                      • API String ID: 410705778-0
                                                                      • Opcode ID: 62cf836de5924312c5d588b2d06554c788123da0784cb363101bea6f53b987c8
                                                                      • Instruction ID: e1e4db34afa08888d79fb25043555632f0ebb7b227895c13288491f43da7802c
                                                                      • Opcode Fuzzy Hash: 62cf836de5924312c5d588b2d06554c788123da0784cb363101bea6f53b987c8
                                                                      • Instruction Fuzzy Hash: 262167B58003099FDB10CF99C985BDEBBF8EF48320F14845AE454A7251C378A944CFA1
                                                                      APIs
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 07A715D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: TextWindow
                                                                      • String ID:
                                                                      • API String ID: 530164218-0
                                                                      • Opcode ID: 7c4e64b3069714ad7a5486a8f87e9daff6651ccbbc52745bc51b7213ee916f09
                                                                      • Instruction ID: 3e28bf35a819689464df11bf19c82abc3b474c034417809c986ed0d7392c68c8
                                                                      • Opcode Fuzzy Hash: 7c4e64b3069714ad7a5486a8f87e9daff6651ccbbc52745bc51b7213ee916f09
                                                                      • Instruction Fuzzy Hash: 4D1106B2D002498FDB14CF9AC845BDEBBF4EB88320F14842AD869A7640D779A545CFA1
                                                                      APIs
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 07A715D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: TextWindow
                                                                      • String ID:
                                                                      • API String ID: 530164218-0
                                                                      • Opcode ID: 9717672f8916341bfcc446cf2ea7c4be10b3d99b048b960e5813764347e851ce
                                                                      • Instruction ID: 0d190ea85cc014e22451b5654b4a570cd55e1ec0436628503777f24a37baf1a2
                                                                      • Opcode Fuzzy Hash: 9717672f8916341bfcc446cf2ea7c4be10b3d99b048b960e5813764347e851ce
                                                                      • Instruction Fuzzy Hash: 4D1123B2C002498FDB14CF9AC844BDEFBF4EF88320F14842AD869A7640D778A545CFA1
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000018,00000001,?), ref: 07A71B9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: d6b87061032b7b262a13c83827b10fa11255d3cf5369598fc293f63365d58d05
                                                                      • Instruction ID: 7a63313190b5d1d0529db0b1087d02ceac2468d7bebc31474ffaea4d487e137f
                                                                      • Opcode Fuzzy Hash: d6b87061032b7b262a13c83827b10fa11255d3cf5369598fc293f63365d58d05
                                                                      • Instruction Fuzzy Hash: 811125B58002099FCB10CF9AC985BDEBBF8FB88320F10841AE418A7640D375A544CFA0
                                                                      APIs
                                                                      • PostMessageW.USER32(?,?,?,?), ref: 07A752FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost
                                                                      • String ID:
                                                                      • API String ID: 410705778-0
                                                                      • Opcode ID: 428631943b49ca6cf7de12db8b6bacf16a7de7e9aa15ccb6f8f6e4d99f4bd532
                                                                      • Instruction ID: 10ae8796106e5f4a02d4f03a17d937a9c12f9f86759931df03b4e573a217ad5b
                                                                      • Opcode Fuzzy Hash: 428631943b49ca6cf7de12db8b6bacf16a7de7e9aa15ccb6f8f6e4d99f4bd532
                                                                      • Instruction Fuzzy Hash: D31106B5800349DFDB10CF9AC945BDEFBF8EB48320F14841AE554A3251D379A544CFA5
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0115AF9E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 518a7be68987d4754bd8890887edbea8e9dccb3d123d6a4fe5fbc4b1fe6b5211
                                                                      • Instruction ID: a0eef8b1297eafdac0ae6cac6c54c24ca4856a775ae0e01d1710ff326bdfcb3c
                                                                      • Opcode Fuzzy Hash: 518a7be68987d4754bd8890887edbea8e9dccb3d123d6a4fe5fbc4b1fe6b5211
                                                                      • Instruction Fuzzy Hash: 8E110FB5C00249CFDB14CF9AD544BDEFBF4AF88224F14851AD928A7240C379A545CFA1
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000018,00000001,?), ref: 07A71B9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: d131524f8d961ed0af3980eb95424d48cebb90e25b11a81edd5986c98a3b130a
                                                                      • Instruction ID: 604052f6abe37e6eb3b28e2e9e77fcad8223f5c95152aeac47033161a2d21d8d
                                                                      • Opcode Fuzzy Hash: d131524f8d961ed0af3980eb95424d48cebb90e25b11a81edd5986c98a3b130a
                                                                      • Instruction Fuzzy Hash: BD1106B5800349DFCB10DF9AD985BDEFBF8EB88320F108459E954A7600D375A944CFA1
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 05161B95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: e9a22aaa1f7118401aaa3395dd9ef90f8c36ca7b35181b27b676fac602e70050
                                                                      • Instruction ID: 82c9b802030ad51c02f4b04bb0d13a0301a367b77dd64b6ab9ef19accf2dc2db
                                                                      • Opcode Fuzzy Hash: e9a22aaa1f7118401aaa3395dd9ef90f8c36ca7b35181b27b676fac602e70050
                                                                      • Instruction Fuzzy Hash: 0C11F5B58002499FDB10CF9AD585B9EBBF8FB88320F24841AD915B3300D375A944CFA5
                                                                      APIs
                                                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,07A7E6C7), ref: 07A7F165
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: DispatchMessage
                                                                      • String ID:
                                                                      • API String ID: 2061451462-0
                                                                      • Opcode ID: 7c21341d86021b2702c39e9a30bc2503182c612d79b16e79b488f0b29f218a9f
                                                                      • Instruction ID: df9b4981aeca1705791681de1502d7b590f812ccd0985d9e2df5229e369125ef
                                                                      • Opcode Fuzzy Hash: 7c21341d86021b2702c39e9a30bc2503182c612d79b16e79b488f0b29f218a9f
                                                                      • Instruction Fuzzy Hash: 9D11F2B5C046498FCB10CF9AD984BDEFBF4EB88324F10842AE528A3700D379A544CFA5
                                                                      APIs
                                                                      • OleInitialize.OLE32(00000000), ref: 07A76C3D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize
                                                                      • String ID:
                                                                      • API String ID: 2538663250-0
                                                                      • Opcode ID: d2da39f637da49cb5807369c7fc6923f781749f8eeb75b08d54a0af4d75282b5
                                                                      • Instruction ID: 51661b177276202647d06664d686ee5ca0e06fdf55785602bcc70ee515d7f121
                                                                      • Opcode Fuzzy Hash: d2da39f637da49cb5807369c7fc6923f781749f8eeb75b08d54a0af4d75282b5
                                                                      • Instruction Fuzzy Hash: C71118B58007499FCB20DF9AD945BDEBBF8EB48324F248459D518A7300D375A544CFA5
                                                                      APIs
                                                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,07A7E6C7), ref: 07A7F165
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: DispatchMessage
                                                                      • String ID:
                                                                      • API String ID: 2061451462-0
                                                                      • Opcode ID: ffc8ad6d8542ef61095def7bd5eafd5759bc59882364bebd262fbf4c9ddef5a0
                                                                      • Instruction ID: 61ececc9a199eeac2a7a7fbdc7765c72c55607aff5bc3b14319feb4d82e85ec6
                                                                      • Opcode Fuzzy Hash: ffc8ad6d8542ef61095def7bd5eafd5759bc59882364bebd262fbf4c9ddef5a0
                                                                      • Instruction Fuzzy Hash: A61125B4C002498FCB10CFAAD844BDEFBF4AB88324F24855ED419A7610C3746545CFA1
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 05161B95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: f90e8b1b625ddcd7ed79510c573eb9ebc934fedb29ff608bf931a30c92f5d6cc
                                                                      • Instruction ID: 2f3850e8ae71042fdcfb70bef075cad5f1bef09074f146574b5094788756af61
                                                                      • Opcode Fuzzy Hash: f90e8b1b625ddcd7ed79510c573eb9ebc934fedb29ff608bf931a30c92f5d6cc
                                                                      • Instruction Fuzzy Hash: EF1103B58002499FDB10CF9AC585BDEBBF8EB88320F20841AD918B3300C375A944CFA1
                                                                      APIs
                                                                      • OleInitialize.OLE32(00000000), ref: 07A76C3D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4567507147.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7a70000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize
                                                                      • String ID:
                                                                      • API String ID: 2538663250-0
                                                                      • Opcode ID: 5465c665199fb17724c72d6825d802d51e04e3914a83a88351267f553507dd2a
                                                                      • Instruction ID: 7580fbaba9398f0557d0d309992ad3b1892181d6aefacb65f858d69155efd90b
                                                                      • Opcode Fuzzy Hash: 5465c665199fb17724c72d6825d802d51e04e3914a83a88351267f553507dd2a
                                                                      • Instruction Fuzzy Hash: 061112B5C006098FCB10CF9AD985BDEBBF8EB48324F24845AD528B7200D378A944CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4532326508.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_ecd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a71853545a0ed34c3cdfbb5bf359769bb21e39424f6ad6741102350d94291ec3
                                                                      • Instruction ID: 886a3c2c8243d266be509a34aa5ad021af3d5502a622b5533dc738847c940347
                                                                      • Opcode Fuzzy Hash: a71853545a0ed34c3cdfbb5bf359769bb21e39424f6ad6741102350d94291ec3
                                                                      • Instruction Fuzzy Hash: 0521C1755082009FCB14DF18DAC1F26BB66EB84318F24C56DD94A5B296C337D847CA61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4532326508.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_ecd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 861edd26245741296a489be140e7dc2e76faa2cfd9d11b35c31b1bd63c4d06e8
                                                                      • Instruction ID: d5744bfb2f5f581496e9229e74ebc2e7c9be7f68e25f3a35bbaa80c0773010f0
                                                                      • Opcode Fuzzy Hash: 861edd26245741296a489be140e7dc2e76faa2cfd9d11b35c31b1bd63c4d06e8
                                                                      • Instruction Fuzzy Hash: CB21C2B55082849FDB159F18DAC0F2ABB65FB84328F24C57ED8495B241C33BD847DAA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4532326508.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_ecd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 38344df8b6a200da256d4ffb70ccae5a009b5e433b45da23ad14f5d5e24c4fdc
                                                                      • Instruction ID: c4d4f6f8fc73f8234159504042bbd9bd71a8ca032dabecb00a99987f17a31d73
                                                                      • Opcode Fuzzy Hash: 38344df8b6a200da256d4ffb70ccae5a009b5e433b45da23ad14f5d5e24c4fdc
                                                                      • Instruction Fuzzy Hash: D12171755093808FD712CF24D990B15BF72EB46214F28C5EAD8498B6A7C33B980BCB62
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4532326508.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_ecd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6571a979d86382cef3f3a0ee6dcd591210bcaba3c37dfea3d6794a8d99f67603
                                                                      • Instruction ID: 13ec7b17c82bdd0f70d1913eb994074e81f903ead333991247b33977520bcd55
                                                                      • Opcode Fuzzy Hash: 6571a979d86382cef3f3a0ee6dcd591210bcaba3c37dfea3d6794a8d99f67603
                                                                      • Instruction Fuzzy Hash: FF119375508680CFDB11CF14DAC4B19BB61FB84318F24C5AED8495B656C33BD456CB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9eac5bd28887512e50d749fdb6627590dfb244fe3ec56e9a80fabc6f36cc9eac
                                                                      • Instruction ID: 8c6409224259caa1f6c323a443c63c7160775872c5b439fa42fce78ba0d30c83
                                                                      • Opcode Fuzzy Hash: 9eac5bd28887512e50d749fdb6627590dfb244fe3ec56e9a80fabc6f36cc9eac
                                                                      • Instruction Fuzzy Hash: 9612C6F0C897458BE710CF25E94C1A93BB1BB55318BF24A09C1617F2E5DBB825AACF44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4535467298.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1150000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6eb0280d7fc29da1e2bc7d2a7066d1a819e2e5bb3f2fbe2b6db5106c32242e00
                                                                      • Instruction ID: 3f807fccf52a4e97274f5996fb28aa38ea43c3c44f7c4442546a39304884c41b
                                                                      • Opcode Fuzzy Hash: 6eb0280d7fc29da1e2bc7d2a7066d1a819e2e5bb3f2fbe2b6db5106c32242e00
                                                                      • Instruction Fuzzy Hash: F1A19336E00606CFCF49DFB4C84459EBBB2FF85304B2585AAED15AB261DB31E916CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4562712723.0000000005160000.00000040.00000800.00020000.00000000.sdmp, Offset: 05160000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5160000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c40a52d7da7753ad1734c44702b63aeb414ed820a1906b4ebb888c7537937aa1
                                                                      • Instruction ID: bb986de40a73a660e1dbc2168a45bd74dcd9c2dab15a5fe03f102e9c70ae79a2
                                                                      • Opcode Fuzzy Hash: c40a52d7da7753ad1734c44702b63aeb414ed820a1906b4ebb888c7537937aa1
                                                                      • Instruction Fuzzy Hash: 0FC128B0C887458BD710CF24E8481A93BB1BF95324FF64A19D1617B2E5DBB835AACF44
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2089432529.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_3770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 19efcc873595620025a020ddfbf340e468d201294c552eb4fd7364346a981ae6
                                                                      • Instruction ID: b6030fb1bd150288512d8038e8897cd74436ac50f72c7f601ee34700b2c38c2c
                                                                      • Opcode Fuzzy Hash: 19efcc873595620025a020ddfbf340e468d201294c552eb4fd7364346a981ae6
                                                                      • Instruction Fuzzy Hash: 55819334A052489FCB05CFA5D4809AEFBF2FF89310F1480AAE954AB361C735AD45DB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2089432529.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_3770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4b8e577ff5143adff542d8a5820859cdc77bd7bef8e2474c02d1e80140bfbf9e
                                                                      • Instruction ID: 8466b1ad5ebc0bf3ca974d80998bac99f1615531972d467bf555598665eb0817
                                                                      • Opcode Fuzzy Hash: 4b8e577ff5143adff542d8a5820859cdc77bd7bef8e2474c02d1e80140bfbf9e
                                                                      • Instruction Fuzzy Hash: 0A916C74A006458FCB15CF9DC4949BEFBB1FF88310B298699D825AB366C735EC51CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2089432529.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_3770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 332b20457b3dda24deb86fb90cbc35227df3bc8da303cd20186c7d4ee579dc6a
                                                                      • Instruction ID: c09ae6d9fa1691fbeb2fdaa86b8566dd5fda0c1678d4dce1469a5e98bdbde285
                                                                      • Opcode Fuzzy Hash: 332b20457b3dda24deb86fb90cbc35227df3bc8da303cd20186c7d4ee579dc6a
                                                                      • Instruction Fuzzy Hash: 16410674A005059FCB06CF59C4989BEFBB5FF48310B258699D825AB366C732ED91CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2089432529.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_3770000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4deefad83204e7b34bea3c31a152bd3c94410e57121b02e212a3ea4fd1223f6c
                                                                      • Instruction ID: de62121ec2fe050a8e3fb9ede16cf453e8aec01bc8fc54ce10822db7e42c91ba
                                                                      • Opcode Fuzzy Hash: 4deefad83204e7b34bea3c31a152bd3c94410e57121b02e212a3ea4fd1223f6c
                                                                      • Instruction Fuzzy Hash: 7521923190A3914FCB07DB68D8A05DABF70EF47224B1945C7D0909F2A3C6368D5AC766
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2088419362.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_35ad000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e4a491d3cd984a6f0e2d7d08c900f13c223d2c3378c91f57e757aa0299db2b0e
                                                                      • Instruction ID: 91ca9acebbc7c3d749314810a19cf2925d837103800091e6c8a73275b3092e28
                                                                      • Opcode Fuzzy Hash: e4a491d3cd984a6f0e2d7d08c900f13c223d2c3378c91f57e757aa0299db2b0e
                                                                      • Instruction Fuzzy Hash: 3A01D471405B409AE720DA29E8C4B6ABFF8FB41724F0CC45AED484A562D6799841E6B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2088419362.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_35ad000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fb13763a38474b5e1545b5ecc45ae8638642f3cf8c3ad4ffcabe82e9b195861e
                                                                      • Instruction ID: 827db010c404aeb443bdc280289c823f15bdbf014cf4ec2e4deb4a2996dadf9a
                                                                      • Opcode Fuzzy Hash: fb13763a38474b5e1545b5ecc45ae8638642f3cf8c3ad4ffcabe82e9b195861e
                                                                      • Instruction Fuzzy Hash: 35016D6240E3C05ED7128B259894B56BFB8EF53224F1D80CBD8888F5A3C2689845D772
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 315ca9e17c8c5155eeac257d3aef7e9fa451d2805440dfd7107f5d5ae644b0db
                                                                      • Instruction ID: 1cc7673508d630759bded2b28f57462579c20b18186cc9b55ff907e708f2cd81
                                                                      • Opcode Fuzzy Hash: 315ca9e17c8c5155eeac257d3aef7e9fa451d2805440dfd7107f5d5ae644b0db
                                                                      • Instruction Fuzzy Hash: BDE1C775A00228CFDB14DFA9C994B9DBBF1FF59314F1980A9E819AB365DB30A841CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 49438fc4b40204c37693e6edd8a72a732689ba872a1c29ece5311583c568c6c1
                                                                      • Instruction ID: a1414f464b4a746e2e00f83d62505f013e4e83a70dd3be13a49ea778a6c97c86
                                                                      • Opcode Fuzzy Hash: 49438fc4b40204c37693e6edd8a72a732689ba872a1c29ece5311583c568c6c1
                                                                      • Instruction Fuzzy Hash: BB81B674E01218CFDB18DFA9D994B9DBBF2BF88310F1490AAE819AB355DB705981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 16c7db1252f0557eb0810ccc848311a5efea0fb50924084524c78c830845fb93
                                                                      • Instruction ID: 5ef5037964770bdefd1fa3f824905d0909ff7e29cc9fc36b4b21a79da1eb1d7d
                                                                      • Opcode Fuzzy Hash: 16c7db1252f0557eb0810ccc848311a5efea0fb50924084524c78c830845fb93
                                                                      • Instruction Fuzzy Hash: A981A474E00218CFDB14DFA9D994B9DBBF2BF88314F1490AAE819AB355DB709981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 4112a8cef0d471c24929cf5153b2b28bb3273ac2e485119044c23b6923f88e73
                                                                      • Instruction ID: 3558e87fa3758231e39e61f2b86eb00663b4d30f9e67eb981fac25dede296611
                                                                      • Opcode Fuzzy Hash: 4112a8cef0d471c24929cf5153b2b28bb3273ac2e485119044c23b6923f88e73
                                                                      • Instruction Fuzzy Hash: 7E818475E002189FDB14DFA9D984A9DBBF2FF88300F14D0AAE819AB355DB709981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 50b09abe9f30b14059478e9fc5e37da1adce5f9d69933cc9780f961baa94dd36
                                                                      • Instruction ID: 7205362d3151e72df28b51fb5ac9963a98fde1e9ba40aaa4023a335e6778eb12
                                                                      • Opcode Fuzzy Hash: 50b09abe9f30b14059478e9fc5e37da1adce5f9d69933cc9780f961baa94dd36
                                                                      • Instruction Fuzzy Hash: 6C8195B5E00218CFDB14DFA9D994A9DBBF2BF88300F14D0AAE819AB355DB705981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 959f2511f023bda3a4e1a25e6d0a380536e4a3bbae1afbfe19ee3b8c7606878d
                                                                      • Instruction ID: 718cc85ec056dc4754a47cbcba0d8d7ac111d2f686810804fc8f38aee1fcd2a5
                                                                      • Opcode Fuzzy Hash: 959f2511f023bda3a4e1a25e6d0a380536e4a3bbae1afbfe19ee3b8c7606878d
                                                                      • Instruction Fuzzy Hash: 11818474E00258DFDB18DFA9D994A9DBBF2BF89300F1490A9E819AB355DB309981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 03acef8a4a3d635de49424bba53a202dd98d33882e55d71d977b24a2b2cb5332
                                                                      • Instruction ID: 0e758efb11c6b5ceb6e0ce8048eccd4d5c61c3323b0377c328099c7a83e99f89
                                                                      • Opcode Fuzzy Hash: 03acef8a4a3d635de49424bba53a202dd98d33882e55d71d977b24a2b2cb5332
                                                                      • Instruction Fuzzy Hash: 98818474E002189FDB14DFA9D994A9DBBF2BF88300F1490AAE819AB365DB705981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 74ddccafafe6e0d7198678f1302a0a8ab34e0daab396799b69da90fd7f9660d9
                                                                      • Instruction ID: 1853eb7a599a3f8c42444519084cdaa238dba369a585122a9174b0265011f62f
                                                                      • Opcode Fuzzy Hash: 74ddccafafe6e0d7198678f1302a0a8ab34e0daab396799b69da90fd7f9660d9
                                                                      • Instruction Fuzzy Hash: 27819274E00218DFDB18DFA9D984A9DFBF2BF88304F1491A9E819AB355DB309981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$(osq$,wq$,wq
                                                                      • API String ID: 0-3303631882
                                                                      • Opcode ID: c7b682645cb0d7b3c728fd72eb2fcd42e5554dab95ebcddafbc6d69a73a637ad
                                                                      • Instruction ID: 35fdc75fe307a7a39c90787f7d242abec389947a038fa717cecade25308c80b0
                                                                      • Opcode Fuzzy Hash: c7b682645cb0d7b3c728fd72eb2fcd42e5554dab95ebcddafbc6d69a73a637ad
                                                                      • Instruction Fuzzy Hash: 7BD11D71A00129DFCB14CFA9C984BADBBFAFF88344F958199E815AB265D730DD81CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$PHsq$PHsq
                                                                      • API String ID: 0-255689168
                                                                      • Opcode ID: 42d0e8c927f82b3efe6dd8b1514ea29bdff9a75c7d6df5fbf57923cbfb7668e1
                                                                      • Instruction ID: 97bb00340c090468bce8fc8b4cd94f92b5ab0e9774ebd9fd6e67adb828cf0da7
                                                                      • Opcode Fuzzy Hash: 42d0e8c927f82b3efe6dd8b1514ea29bdff9a75c7d6df5fbf57923cbfb7668e1
                                                                      • Instruction Fuzzy Hash: E56191B5E002189FDB18DFAAD994A9DFBF2FF88304F149069E815AB365DB309941CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$4'sq
                                                                      • API String ID: 0-2651803416
                                                                      • Opcode ID: 5058dc6ee7d15b5b803ccff043678214c83eb25ca970286b9a473aea926f2da6
                                                                      • Instruction ID: 5365382798a5c2daec7563e49bb2cf2831ebcd35ed8abe09c7e7ee02654b0c6e
                                                                      • Opcode Fuzzy Hash: 5058dc6ee7d15b5b803ccff043678214c83eb25ca970286b9a473aea926f2da6
                                                                      • Instruction Fuzzy Hash: AC727075A00619DFCB15CF68C984BAEBBF2FF89304F158695E815AB391D730E981CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$Hwq
                                                                      • API String ID: 0-1668724233
                                                                      • Opcode ID: 3421493cbe8b009569387be4d59faf3169338de4b3963711e5aa143c9128975f
                                                                      • Instruction ID: 55488d2072e323573a2ab324b5cca22a15e6174161077792a477aa5591f12f20
                                                                      • Opcode Fuzzy Hash: 3421493cbe8b009569387be4d59faf3169338de4b3963711e5aa143c9128975f
                                                                      • Instruction Fuzzy Hash: F3128C71A002298FDB18DFA9C854BAEBBF6FF88304F548569E9159B394DF309D41CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHsq$PHsq
                                                                      • API String ID: 0-3507005907
                                                                      • Opcode ID: b4dd8b0741653e77e225ed404a7977c3241d10f7bde3804a12a83913af0f1dd5
                                                                      • Instruction ID: 20b72dba00d992e743eed92bc7e6a2bff549aa1b7cdf79f8d79e2713cf988bc7
                                                                      • Opcode Fuzzy Hash: b4dd8b0741653e77e225ed404a7977c3241d10f7bde3804a12a83913af0f1dd5
                                                                      • Instruction Fuzzy Hash: 6D910370E01218CFDB68CFA9C984AEDBBF2BF89310F24846AD419AB755DB305945CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f097ebdcb7a063af49820666f94963f54d0152cf7b93dd75307fa5782db7222
                                                                      • Instruction ID: 4b242533348f00a0d6f6f3681c3c713b7301848597002870762374daf2583f69
                                                                      • Opcode Fuzzy Hash: 8f097ebdcb7a063af49820666f94963f54d0152cf7b93dd75307fa5782db7222
                                                                      • Instruction Fuzzy Hash: 0E826C74E012289FDB64DF69C998BDDBBB2BB89310F1081EA980DA7255DB305EC1CF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4ac2d063992aa24a814fda8178f22568018248ea2f137ce0575303cfef84959a
                                                                      • Instruction ID: 54724824550ae037a855884b91d22152773d9c70ba65db79c8beb70304ff7673
                                                                      • Opcode Fuzzy Hash: 4ac2d063992aa24a814fda8178f22568018248ea2f137ce0575303cfef84959a
                                                                      • Instruction Fuzzy Hash: 3F72B074E012298FDB64DF69C994BE9BBB2BB49304F1491E9D808AB355DB349EC1CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dbdeebb53b754942423139fed4c7b946b4b8fccd452501950b3c920a0b51243b
                                                                      • Instruction ID: 297e5f1577cedfc39b78df0badaa295e7d7f37faa537f777c49409d569423335
                                                                      • Opcode Fuzzy Hash: dbdeebb53b754942423139fed4c7b946b4b8fccd452501950b3c920a0b51243b
                                                                      • Instruction Fuzzy Hash: E5E1D7B4E01218CFDB54DFA5C994B9DBBB2BF48304F2081A9D408A7394DB355E85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 456a1ba8fdb0ba5d85912b625b270d00c04f783d88f3e3d3a633b48ff16ccd02
                                                                      • Instruction ID: 39861819814beabf680a63c4c294d51f4ffa55b20960d0d7db999b990260639c
                                                                      • Opcode Fuzzy Hash: 456a1ba8fdb0ba5d85912b625b270d00c04f783d88f3e3d3a633b48ff16ccd02
                                                                      • Instruction Fuzzy Hash: FEC1C374E00218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E81DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b4b36515d7978a61a75391d43f246d975171c5705d9dca1a379121b70968e7a9
                                                                      • Instruction ID: 8990e147336916a3b129de797c8da98917ed280b29a7c920921911c96fb25c18
                                                                      • Opcode Fuzzy Hash: b4b36515d7978a61a75391d43f246d975171c5705d9dca1a379121b70968e7a9
                                                                      • Instruction Fuzzy Hash: 32A192B5E012188FEB68CF6AC945B9DFBF2AF89310F14C0AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af70c4f804fe09ca61922beb46627018977ef1cdd5ed5af50a7f1ee0e1531db6
                                                                      • Instruction ID: 4dc4cc28eb1b84e903bf8ffed97399cfa666c6dd9d25b69a4977f43f5fa4db83
                                                                      • Opcode Fuzzy Hash: af70c4f804fe09ca61922beb46627018977ef1cdd5ed5af50a7f1ee0e1531db6
                                                                      • Instruction Fuzzy Hash: 6DA1A2B5E012188FEB68CF6AC944B9DFBF2BF89310F14D0AAD409A7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7e666766bbc4faeb64263565b2521318bd6d1109ff3668b43fef0f8cf1090575
                                                                      • Instruction ID: cf52b2eeac8bbdeda8fa91976f38caf3e6b4150214e36e4b8a65a39bf189b887
                                                                      • Opcode Fuzzy Hash: 7e666766bbc4faeb64263565b2521318bd6d1109ff3668b43fef0f8cf1090575
                                                                      • Instruction Fuzzy Hash: 5CA191B5E05218CFEB68CF6AC944B9DBAF2AF89310F14C0AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4549a54ac7fb3421d82d6ae5cb9a854f18c79cbc08b84f62f9f48125dae433da
                                                                      • Instruction ID: 05eb2976a7a293918611fdbb2bbaaaeedc69c3c00f3766b5d8d282029509c00c
                                                                      • Opcode Fuzzy Hash: 4549a54ac7fb3421d82d6ae5cb9a854f18c79cbc08b84f62f9f48125dae433da
                                                                      • Instruction Fuzzy Hash: C5A191B5E016188FEB68CF6AC944B9DBBF2BF89310F14C0AAD409A7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: abe356ec9f0257efff825b2321ffbafe86797ec114ef0a3eb155c080a75c714c
                                                                      • Instruction ID: b564593f74cb554d8b30dc2f77e7e9679473689804cda2cdba868d3a6ab8ea1f
                                                                      • Opcode Fuzzy Hash: abe356ec9f0257efff825b2321ffbafe86797ec114ef0a3eb155c080a75c714c
                                                                      • Instruction Fuzzy Hash: AEA1A2B1E01218CFEB68CF6AC944B9DBAF2AF89310F14C4AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af2c5a59cf85441f64ac714815fc69411fe777477e274abf1c5461b388cb925d
                                                                      • Instruction ID: 4e88373aa94cea7417ff5edc0bbf5cb0f795ef076e79d7421bf85ffd351ea6b6
                                                                      • Opcode Fuzzy Hash: af2c5a59cf85441f64ac714815fc69411fe777477e274abf1c5461b388cb925d
                                                                      • Instruction Fuzzy Hash: 42A1A1B5E012188FEB68CF6AC944B9DBBF2BF89310F14C0AAD40DA7255DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: de53b8a51d0856c567fd385112686ed5a0f82ef80614c137915ae1d699da6b8c
                                                                      • Instruction ID: 00757fe5ac7d58df13309148ffb15e873cb5f98b78a69f43682995d98bc00aec
                                                                      • Opcode Fuzzy Hash: de53b8a51d0856c567fd385112686ed5a0f82ef80614c137915ae1d699da6b8c
                                                                      • Instruction Fuzzy Hash: 75A193B5E012188FEB68CF6AD944B9DFBF2BF89310F14C0AAD409A7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11a6c8c66603c612fb9b9c856b953c914188fe4d0ebda6fccbcd2364eedf03a2
                                                                      • Instruction ID: 9f45261442bbece1a8e0f493769003894de09a4ea358371588d60975a9305e2b
                                                                      • Opcode Fuzzy Hash: 11a6c8c66603c612fb9b9c856b953c914188fe4d0ebda6fccbcd2364eedf03a2
                                                                      • Instruction Fuzzy Hash: 12A1A375E012288FEB68CF6AC945B9DFBF2BF89310F14C1AAD408A7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 18eb3a49d39a25274348d7af8b0b7494d64739fbf8c12a9ad9c56f1b31be1b79
                                                                      • Instruction ID: b65f412639282c2bdee32e7ac45b6a053bd3e6d37c36f391ab4adca3948b1ddf
                                                                      • Opcode Fuzzy Hash: 18eb3a49d39a25274348d7af8b0b7494d64739fbf8c12a9ad9c56f1b31be1b79
                                                                      • Instruction Fuzzy Hash: 2DA181B5E012188FEB68CF6AC944B9DFBF2AF89310F14C0AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9226cd5d1993280bb3fb1bffc5c880a6e2e62b25549c145f019a68638dbdfae3
                                                                      • Instruction ID: 06961885fa9be44216aa3e96341c93079c0e31d20750a713e481d184c49d1f66
                                                                      • Opcode Fuzzy Hash: 9226cd5d1993280bb3fb1bffc5c880a6e2e62b25549c145f019a68638dbdfae3
                                                                      • Instruction Fuzzy Hash: 2881C670E016188FEB68CF6AC945B9EFBF2AF89310F14C1AAD40DA7255DB344A85CF11
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d8ef6879268a31e946061d16d2fbf0dbc49473e101bcea923d253a27ba162b9
                                                                      • Instruction ID: 5f48a1b15ecccd7e30a39bba30e02adcf6830c129419d70f8ba0fbb0c95ea5d8
                                                                      • Opcode Fuzzy Hash: 9d8ef6879268a31e946061d16d2fbf0dbc49473e101bcea923d253a27ba162b9
                                                                      • Instruction Fuzzy Hash: 0B718671E016188FEB68CF6AC944B9EFBF2AF89310F14C0AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3c990d1c1b12df33d46238ff99bfb8859d688d4748e7d4e7ca32cec604f3c86c
                                                                      • Instruction ID: 19e09db876dd22e4c5baa019bd69feb8c7b23077f492446a93d53a7c2498aa0f
                                                                      • Opcode Fuzzy Hash: 3c990d1c1b12df33d46238ff99bfb8859d688d4748e7d4e7ca32cec604f3c86c
                                                                      • Instruction Fuzzy Hash: E67185B1E016188FEB68CF6AC944B9DFBF2AF89310F14C0AAD40DA7254DB345A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7271ba068102624bbcd89a5dd27253797cf1820d866742f212d0c31286fdc8d6
                                                                      • Instruction ID: 4ff1aead9c3f8428d89cf42a20ec3df4bae5900e92d337c7abddb05c84f6e0d7
                                                                      • Opcode Fuzzy Hash: 7271ba068102624bbcd89a5dd27253797cf1820d866742f212d0c31286fdc8d6
                                                                      • Instruction Fuzzy Hash: 8A5106B1D00618CBEB58DFAACA447DEBBB2BF88310F24C169C419AB254EB714946CF55
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0a3548cc73167371616e5e7c2eff23657de40993a9356205cde8586bb77dbe87
                                                                      • Instruction ID: fc8a94da2ad8584edfe311d59a271b5d8867114d579736d22f11992f9a0bd6fb
                                                                      • Opcode Fuzzy Hash: 0a3548cc73167371616e5e7c2eff23657de40993a9356205cde8586bb77dbe87
                                                                      • Instruction Fuzzy Hash: A84199B1E016189BEB58CF6BCD557CAFAF3AFC9300F14C0AAD40CA6255DB740A868F55
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: de0e6b0d515e0f19a74a3541285133e9beb80bca2cbbaa2ca1dba07f3ab74a92
                                                                      • Instruction ID: b23ec4170dfb7065f00d48b198c16793e54f32612db4b7acf2962eabef0edd7f
                                                                      • Opcode Fuzzy Hash: de0e6b0d515e0f19a74a3541285133e9beb80bca2cbbaa2ca1dba07f3ab74a92
                                                                      • Instruction Fuzzy Hash: 484188B1E016189BEB58CF6BDD447DAFAF3AFC8310F14C1AAC50CA6254DB740A858F55
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fec3646edbcd64468f41079e1c6de59f0ff323fcfdfb3e3c935716b825c10adc
                                                                      • Instruction ID: 2d367bee1c0ac7f1a112d207d2dcb2bbc056bb73c611d6aa0a39cc522911c350
                                                                      • Opcode Fuzzy Hash: fec3646edbcd64468f41079e1c6de59f0ff323fcfdfb3e3c935716b825c10adc
                                                                      • Instruction Fuzzy Hash: 59418AB1E016189BEB58CF6BCD457CAFAF3AFC8310F14C1AAD50CA6254DB340A858F55
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 692b2e0921475379e70a1dd5075f618a001794a4a9a083482db3f78f612cf6fe
                                                                      • Instruction ID: 888587127cc8046b3c08ad1be6e9670dacde6fb83c4641d393071dd75b8e51b3
                                                                      • Opcode Fuzzy Hash: 692b2e0921475379e70a1dd5075f618a001794a4a9a083482db3f78f612cf6fe
                                                                      • Instruction Fuzzy Hash: 574168B1E016189BEB58CF6BC9457CAFAF3AFC8310F14C1AAD50CA6264DB740A858F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1e9a2be3153516fb4621a445719dd483bf9fc0b42c6817611b9844652084898e
                                                                      • Instruction ID: a0dd4867ec3ff204e75424d5fff4900e1de5e3bf3dde17c64adf8456a9790b72
                                                                      • Opcode Fuzzy Hash: 1e9a2be3153516fb4621a445719dd483bf9fc0b42c6817611b9844652084898e
                                                                      • Instruction Fuzzy Hash: 8B4158B1E016188BEB58CF6BDD457CAFAF3AFC9310F14C1AAD50CA6264DB740A858F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 41deb76f10bd686bd09e77e8de7f61f2d25a4fa977d6f2290bef5c2180da66cf
                                                                      • Instruction ID: ad6ecc615dec4e4d46218fd78191b25134460b218e644379f10813d207168d29
                                                                      • Opcode Fuzzy Hash: 41deb76f10bd686bd09e77e8de7f61f2d25a4fa977d6f2290bef5c2180da66cf
                                                                      • Instruction Fuzzy Hash: 89412671E00648CBEB58DFEAD9446AEBBB2BF88310F20C129C415AB354DB355946CF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ca47e586a956999c6ce285b38dc25c9e2c3667180a6cd3f7dfab47253007c84a
                                                                      • Instruction ID: 51c8876e23a9bfe857278ad23c6e0a0106fccb8727de5c66ff48fb07d8c28521
                                                                      • Opcode Fuzzy Hash: ca47e586a956999c6ce285b38dc25c9e2c3667180a6cd3f7dfab47253007c84a
                                                                      • Instruction Fuzzy Hash: 994168B1E016188BEB58CF6BD9457CAFAF3AFC8310F14C1AAD50CA6254DB740A85CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$(osq$(osq$(osq$(osq$(osq$,wq$,wq
                                                                      • API String ID: 0-1935560061
                                                                      • Opcode ID: 78358074681045e46d7f761667bc8a6d8e167587c8ab89dd4dc30f53a02ef8e2
                                                                      • Instruction ID: a6be5f8a1fc5ca183d3b5160320727c92797ff1846e890fdd96ffb3e22d47e25
                                                                      • Opcode Fuzzy Hash: 78358074681045e46d7f761667bc8a6d8e167587c8ab89dd4dc30f53a02ef8e2
                                                                      • Instruction Fuzzy Hash: 3B125731B002198FCB14DFA9D884B9EBBF2FF89314F158599E8499B2A1DB31ED41CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $sq$$sq
                                                                      • API String ID: 0-1184984226
                                                                      • Opcode ID: ecb2322d0b6a46de29caf5636e49975889d6299348a1e0f746089dbc2d3d89e8
                                                                      • Instruction ID: bb7abe5e748f7decdad57703fd34de70d9606bb1f3fdb37d74e390c812ca7ec2
                                                                      • Opcode Fuzzy Hash: ecb2322d0b6a46de29caf5636e49975889d6299348a1e0f746089dbc2d3d89e8
                                                                      • Instruction Fuzzy Hash: E6522D74A102198FEB249BE4C860B9EBB73FF94300F1080AAD61A6B395DF359D85DF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq
                                                                      • API String ID: 0-780347173
                                                                      • Opcode ID: d85b76dd62daec749da2d2ff68a779f42cde940f19a73a51fc929fc47cf6d21d
                                                                      • Instruction ID: cb70b8b50c9e9ae78472387c6992ea5d88161bb9b185e0c2518eb3b10c56273d
                                                                      • Opcode Fuzzy Hash: d85b76dd62daec749da2d2ff68a779f42cde940f19a73a51fc929fc47cf6d21d
                                                                      • Instruction Fuzzy Hash: 99B15FB07145218FDB159B29C969B39379AEF85704F1844EAE912CF3B1EB2ADCC1C741
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hwq$Hwq
                                                                      • API String ID: 0-741242263
                                                                      • Opcode ID: bde66df7f169da10ed601bf268eabd763d41810c04d61b4843522ba01049fd4d
                                                                      • Instruction ID: 323f6407204b79edba8463756f3f1b6d6402fbe3e6903b15d65d10577405d3f3
                                                                      • Opcode Fuzzy Hash: bde66df7f169da10ed601bf268eabd763d41810c04d61b4843522ba01049fd4d
                                                                      • Instruction Fuzzy Hash: 2F91E2357042648FDB259F68C894B6E7BE2FF88305F5488A9E9468B385DF38DC41CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq$LRsq
                                                                      • API String ID: 0-2113534932
                                                                      • Opcode ID: 873ac1dc0ce2781e4431a1f6033221585e11c61564d362afde635bb54b1a32f0
                                                                      • Instruction ID: 6ccc6e4ce9ba44e05b02c2baf37a8aeb0519cb783bc1ab0b61d348bd85f2080d
                                                                      • Opcode Fuzzy Hash: 873ac1dc0ce2781e4431a1f6033221585e11c61564d362afde635bb54b1a32f0
                                                                      • Instruction Fuzzy Hash: F381C075B101158FCB48EF7CC95496E7BB6AF88620B2585ADE405CB3B5DB30DD01CBA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,wq$,wq
                                                                      • API String ID: 0-1895925779
                                                                      • Opcode ID: da117d0a1540f6fceaf333c5565203f503bf9574a8b2465e22fd9672f47e7c57
                                                                      • Instruction ID: 6440d61ecb13931372f01c420efb46fc5e5e1c14bbd0282332bb2eeb2ab8a11f
                                                                      • Opcode Fuzzy Hash: da117d0a1540f6fceaf333c5565203f503bf9574a8b2465e22fd9672f47e7c57
                                                                      • Instruction Fuzzy Hash: ED81A275A00125CFCB24CF69C488BA9B7B2FF89316B9581A9D805DF365DB31E841CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (&sq$(wq
                                                                      • API String ID: 0-153982265
                                                                      • Opcode ID: 179d3bf6bf0d34fbc34378ef145899072a979608c6b8f973001a0cf1b12036ee
                                                                      • Instruction ID: 0e619b2eac38fb31b887770e002c6ad7ba1a653e0782db00787c61e5dffd1653
                                                                      • Opcode Fuzzy Hash: 179d3bf6bf0d34fbc34378ef145899072a979608c6b8f973001a0cf1b12036ee
                                                                      • Instruction Fuzzy Hash: CC719331F006195BDF59DFA9D8906AEBBB6AFD8710F148429E405AB380DF309D02C7E2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xwq$Xwq
                                                                      • API String ID: 0-2617233878
                                                                      • Opcode ID: bdea9efab01c38ac7c19bbdf0fa9dca62a1b0dd34e6944df5dd4d41e0905ce86
                                                                      • Instruction ID: cf17f3a289d7a5a349b4d5b31087b93f7e6d2ccaea87d7ab708ce23b8d044bb7
                                                                      • Opcode Fuzzy Hash: bdea9efab01c38ac7c19bbdf0fa9dca62a1b0dd34e6944df5dd4d41e0905ce86
                                                                      • Instruction Fuzzy Hash: E731D071B042348BDF299AAA599437EA6EAEBC4290F1C44F9DC16CB380DFB4CC418691
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq
                                                                      • API String ID: 0-3165563352
                                                                      • Opcode ID: 5eac119fb89ee56b9cebfc5df380e21a7033d27f2491d2e05822e3440afd9b59
                                                                      • Instruction ID: 67997b97158da2ea395336bf0182bace5989d2efd1d8f43147fab6eb28a8f3c5
                                                                      • Opcode Fuzzy Hash: 5eac119fb89ee56b9cebfc5df380e21a7033d27f2491d2e05822e3440afd9b59
                                                                      • Instruction Fuzzy Hash: 7822CC79E11219CFCB54EF64E994A9DBBB2FF88301F1089A9D819A7358DB306D85CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq
                                                                      • API String ID: 0-3165563352
                                                                      • Opcode ID: 45ae0afe12149c1fba042160fbe06408dcb9710463d290eb01b4545f597b34ae
                                                                      • Instruction ID: e482e7b654c4a7d6ab76ad83bc5d9b87f144054c4cf89face326e4e67427c460
                                                                      • Opcode Fuzzy Hash: 45ae0afe12149c1fba042160fbe06408dcb9710463d290eb01b4545f597b34ae
                                                                      • Instruction Fuzzy Hash: 8222BC79E11219CFCB54EF64E994A9DBBB2FF88301F1089A9D819A7358DB306D85CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq
                                                                      • API String ID: 0-609861455
                                                                      • Opcode ID: 49176354d38c766a64b7c250638fd5edac2b4f516ee1418d4e6de56bc0a0b9d3
                                                                      • Instruction ID: c403512ceb7e96158e474545aba0c172812eff52f34a07a39b5afe303cd2c831
                                                                      • Opcode Fuzzy Hash: 49176354d38c766a64b7c250638fd5edac2b4f516ee1418d4e6de56bc0a0b9d3
                                                                      • Instruction Fuzzy Hash: 6541D235B042549FCB099F79D864AAEBBF6BBC8210F148569E916E7391CE309C02CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a2cb948c27c58f7e36c4da3575e795a64db8d5c38a8e1576684e75e6d4957ac3
                                                                      • Instruction ID: 5c2e8791454f3fae592d9324f92979d97b0cfb30593d195abdbdcb0d4322398e
                                                                      • Opcode Fuzzy Hash: a2cb948c27c58f7e36c4da3575e795a64db8d5c38a8e1576684e75e6d4957ac3
                                                                      • Instruction Fuzzy Hash: F9F13075E405258FCB04DFACC994A9DBBF2FF88314B1A8199E915AB361DB31EC41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2c9488b20ea99f0b72b76a9b1a4d8430a579cd14d5e2fc1a890535b60e50be2
                                                                      • Instruction ID: e452e896477c4b2ee64efdd8d888e4238bca2eac0fbe3293fd374f236aa5d296
                                                                      • Opcode Fuzzy Hash: d2c9488b20ea99f0b72b76a9b1a4d8430a579cd14d5e2fc1a890535b60e50be2
                                                                      • Instruction Fuzzy Hash: 4671E6347002258FCB15DF29D898BAABBE6EF49604B1940E9E906CB3B1DF70DC41DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3898a4130cf39cfc2bc0b5e2c91200e5b377023fa52eb6bd66f3a4e411ab5dff
                                                                      • Instruction ID: d3a3229ad9075fc93ee3241b5786ebc9fadd1a3b119ed33ae97a3d954971e98f
                                                                      • Opcode Fuzzy Hash: 3898a4130cf39cfc2bc0b5e2c91200e5b377023fa52eb6bd66f3a4e411ab5dff
                                                                      • Instruction Fuzzy Hash: 5081BF74E412299FDBA5DF29DC90BDDBBB2BB89310F1081EAD808A7354DB305E818F45
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6550e7ebe2434f1b6e1440a3187a2c7ed9d22176fd855ff0c1781e08ad1b9e8a
                                                                      • Instruction ID: e01be163f08ac13ff107f7599a2244b23119750fc54a1508e4cb743a5dd6c2ff
                                                                      • Opcode Fuzzy Hash: 6550e7ebe2434f1b6e1440a3187a2c7ed9d22176fd855ff0c1781e08ad1b9e8a
                                                                      • Instruction Fuzzy Hash: D351BF389A23468FC3582F61E1AD12E7BF6FB0F72B744AC14E55E85219DB3058A5CB20
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ecd74331ebb5a09f92fbb4c50502a3b54105c2fdb920b4b1940364a8c7a9b06
                                                                      • Instruction ID: 513d139cac887286ee79b27db224048edb7dac36af8df87319e6fd6beff4cf0d
                                                                      • Opcode Fuzzy Hash: 3ecd74331ebb5a09f92fbb4c50502a3b54105c2fdb920b4b1940364a8c7a9b06
                                                                      • Instruction Fuzzy Hash: BA51A0389A23478FC3582F61A1ED12E7BF6FB4F72B744AC14E55E812199B3058A5CF20
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4a87cf2e786767c28a5fdbbffa177a98b6ddeca672af5357c0e00de026f72361
                                                                      • Instruction ID: 7f0ea7ccf940de0422d95ee78017c4d6e3af44f3ac9ea7bcf6a733be36c09987
                                                                      • Opcode Fuzzy Hash: 4a87cf2e786767c28a5fdbbffa177a98b6ddeca672af5357c0e00de026f72361
                                                                      • Instruction Fuzzy Hash: 93511374D11218DFDB15DFE5D894AAEBBB2FF88300F208969D809AB355DB345A85CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 441d704b5d829e652469a8b3522aae79070478b82d0a4d81d657181670efdd14
                                                                      • Instruction ID: d8698d1be0dac74797fc298e8e8d8a1a775750631d552a4951f7a5fe0d27d8d0
                                                                      • Opcode Fuzzy Hash: 441d704b5d829e652469a8b3522aae79070478b82d0a4d81d657181670efdd14
                                                                      • Instruction Fuzzy Hash: CF518275E11208DFDB58DFA9D98499DBBF2FF89300F24816AE419AB364DB30A805CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: daaa5957aa51ead6d4b726d42232db8226f603419facac6588a7c261e5285421
                                                                      • Instruction ID: d5a26c270530d3cbbe7db37ffbfbdbe9b681babf9fc26a2c5d961cddf3b01d28
                                                                      • Opcode Fuzzy Hash: daaa5957aa51ead6d4b726d42232db8226f603419facac6588a7c261e5285421
                                                                      • Instruction Fuzzy Hash: 9A41AF7580231ACFD758AFB4D05D7FE7BB2EB4A322F104829D11167298DB780A88CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 96f9cbc0ee93707146455e233084c3cae747c1afa1167ad30d138b08faffd2b8
                                                                      • Instruction ID: 1602d55dd5875d7b275698f16d7f331f2fe4e7a8de5d382826a4d1e2b7504874
                                                                      • Opcode Fuzzy Hash: 96f9cbc0ee93707146455e233084c3cae747c1afa1167ad30d138b08faffd2b8
                                                                      • Instruction Fuzzy Hash: D151A275E11218CFCB48EFA9D59499DBBF2FF89311B209469E815AB324DB31A842CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bcc20fc52f7cff3ea1df37e73380d3f1aa40f1816d4cef58849d56a582a09d37
                                                                      • Instruction ID: 56b9a9088c7c72bb3d94d714d86932c9429c5bf039bcbd637096bb28631bca30
                                                                      • Opcode Fuzzy Hash: bcc20fc52f7cff3ea1df37e73380d3f1aa40f1816d4cef58849d56a582a09d37
                                                                      • Instruction Fuzzy Hash: 4551E379E01209DFDB04DFA5D584AEDBBF2BF88311F20842AD815AB394EB346A45CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a427b7ad5cf8b9c84d2ede1c94862ac91d6781fe7c5f4ad0d12323fe081a8e1
                                                                      • Instruction ID: b4c30c04fbf617b512c7901ce53490c1a02281e1e87b4d532b2728b1ef65ace8
                                                                      • Opcode Fuzzy Hash: 7a427b7ad5cf8b9c84d2ede1c94862ac91d6781fe7c5f4ad0d12323fe081a8e1
                                                                      • Instruction Fuzzy Hash: 27519C75E01228CFCB64DF64D984BEDBBB2BB49305F1055EAD809AB350D735AA81CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f4702b79ea2f1a7c4153c9824285f61e01600eca3e328feba5de1b4a8c8cc61
                                                                      • Instruction ID: 668f52324af4333d165998438336ae9d9ea103ada6ea28375bf27e77a7bb7238
                                                                      • Opcode Fuzzy Hash: 8f4702b79ea2f1a7c4153c9824285f61e01600eca3e328feba5de1b4a8c8cc61
                                                                      • Instruction Fuzzy Hash: 51417A31A04A69DFDF11CFA8C844B9DBBB2EF49314F048595F865AF2A1D334E910CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: aa0598b79752a24f8920f63739b0d2ec819527a47bd591ac6653ae760c08139e
                                                                      • Instruction ID: e49c95c7ac03cd1b2b759611355172aa6f26a5769af21badad5984ee43a8e35b
                                                                      • Opcode Fuzzy Hash: aa0598b79752a24f8920f63739b0d2ec819527a47bd591ac6653ae760c08139e
                                                                      • Instruction Fuzzy Hash: D8418071E006199BDF54DFA5C980ADEFBF5BF88710F248129E415B7280EB70A946CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dbcf1f88c56eac0473bcbaba72fc1a7461aa136e110c0c8af73276e29d429940
                                                                      • Instruction ID: 17f7195a86d4a57c0f38fef4b9586f044fcdf198dc51d811922882e524d1689a
                                                                      • Opcode Fuzzy Hash: dbcf1f88c56eac0473bcbaba72fc1a7461aa136e110c0c8af73276e29d429940
                                                                      • Instruction Fuzzy Hash: 28411675D0522ACFCB04DFA8D4947EDBBF2FB49305F609699D81AAB244D734A842CF14
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2efee4b8593637190ad21d68cd63a2972b6d28a340e120020af4ae8f335a9cd6
                                                                      • Instruction ID: ca5a0a9321c1d08c3711d0fe8b0c5bf5aebb863c4104e9379dc5ae9e244a77a0
                                                                      • Opcode Fuzzy Hash: 2efee4b8593637190ad21d68cd63a2972b6d28a340e120020af4ae8f335a9cd6
                                                                      • Instruction Fuzzy Hash: 5441C178E01209CFDB44DFA5D5946EDBBF2BF89310F20942AD815AB394EB345A46CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d16bb630a59500fba8872ef4f74a7373c9c16eb8fb73dea6e83ca04dd867a406
                                                                      • Instruction ID: 1ec4c634c65d1e47ae8b503126b0fde36f7456bbdefe8ea71d24524cbacdb110
                                                                      • Opcode Fuzzy Hash: d16bb630a59500fba8872ef4f74a7373c9c16eb8fb73dea6e83ca04dd867a406
                                                                      • Instruction Fuzzy Hash: 5E41EF31A00258DFCB14CF64C804BAABBFAEB44304F4484AEEC559B241DB78ED59CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0bd651f55e34b6b5386cac1f97730d003ab7100fdb98b15f7b9ed521b6d2732a
                                                                      • Instruction ID: fc31166ebf819e016926e55a0fef0aca3ce7446bb4e1cf7a9830e9bf12568c7c
                                                                      • Opcode Fuzzy Hash: 0bd651f55e34b6b5386cac1f97730d003ab7100fdb98b15f7b9ed521b6d2732a
                                                                      • Instruction Fuzzy Hash: F541E475D05229CFCB00DFA8D4947EDBBF2FB49305F209699D819AB244D735A882CF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a411f1bca02b211a360485d864ca3fb4faaabed7ebc6604fd035bed8f3acd9c
                                                                      • Instruction ID: f07559a4e696d79e97cef73298893f874841513d92d01bdf7e80d7d55676749d
                                                                      • Opcode Fuzzy Hash: 7a411f1bca02b211a360485d864ca3fb4faaabed7ebc6604fd035bed8f3acd9c
                                                                      • Instruction Fuzzy Hash: 02412475D012198BCB04DFAAD454BDEBBF2AB89300F10D2A9D808AB254DB34A842CF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bab907411c3ec751745a0cbb91290a9f05d82a8b53b5fac7dee05eb078efe536
                                                                      • Instruction ID: 3cee530cf5f266d1d454991895a17fbbdd5335d3cb36e2659ae009bb7d1a11d4
                                                                      • Opcode Fuzzy Hash: bab907411c3ec751745a0cbb91290a9f05d82a8b53b5fac7dee05eb078efe536
                                                                      • Instruction Fuzzy Hash: 1C318D7564011AAFCB099F64D854BAF7BB6FB88305F108868FD158B350CB34DDA1DBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e5d639105b10604344a4291531d9c9dc344a82779e9a856a86705d35bfbb9416
                                                                      • Instruction ID: 99b48f27d7654886cf885428f768b1cd4bfb2f21a4e13d86ed5b41ffce7d2b52
                                                                      • Opcode Fuzzy Hash: e5d639105b10604344a4291531d9c9dc344a82779e9a856a86705d35bfbb9416
                                                                      • Instruction Fuzzy Hash: 5C31A071C0231ACFDB58AFA4D45C7FE7BB1EF4A316F104829D11166294DB780688CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c717cdc74584e81b2ba77aaca2e77248405ef2d2bd5150f0d2e9df7fe05191df
                                                                      • Instruction ID: 0530f1a53216efcc7502f67fed6f8d084f4edfabb50634abd79aae881729c823
                                                                      • Opcode Fuzzy Hash: c717cdc74584e81b2ba77aaca2e77248405ef2d2bd5150f0d2e9df7fe05191df
                                                                      • Instruction Fuzzy Hash: 14219D387042254BEB24562AA994B7AA697EFC4A19F1444B9D906CF798EF25CC42E2C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a707387a956342a8af69809344384b2629d6b9aa326709d6795b5156a4ddcbb9
                                                                      • Instruction ID: 18db2ed5d8d8f4e1195a19fb83064ee4675cf36ec2a7c4464f9484e4fdd00767
                                                                      • Opcode Fuzzy Hash: a707387a956342a8af69809344384b2629d6b9aa326709d6795b5156a4ddcbb9
                                                                      • Instruction Fuzzy Hash: 7131A970F001258FCB04DF69C884AAEBBF2FF88354B158259E955AB3A5C7349C12CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5bd20547c2dc4e765ce2a43f6c693ec7b5c1c21f33c6e61ef61cd3db8012baf0
                                                                      • Instruction ID: 82da3a1d2d6fce30bea93fe7751a0f05d47f6fd09494e8c2bb2f66b6568c12f3
                                                                      • Opcode Fuzzy Hash: 5bd20547c2dc4e765ce2a43f6c693ec7b5c1c21f33c6e61ef61cd3db8012baf0
                                                                      • Instruction Fuzzy Hash: 8921EA71D052198BDB08DFAAE8047EEBBB2AFC9300F04E175D814BB295DB708585CF61
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5a8e78bfde448267867b485743ac5638f18c11a6bb4b1012e98e578eb02df697
                                                                      • Instruction ID: a58ec1d2dfdfbcee5d3b7f808f6ce43a0fdc18954bd015ead15d7cf3cabc0757
                                                                      • Opcode Fuzzy Hash: 5a8e78bfde448267867b485743ac5638f18c11a6bb4b1012e98e578eb02df697
                                                                      • Instruction Fuzzy Hash: DA21B271A01216AFCF18DB64C450AAE77B5EF9C260B10C899ED099B384DB31EA41CBD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dae3a0718a87e4df61378b2741433d3843a001a72cf9a8bef989f65ce697a17a
                                                                      • Instruction ID: 7b6becb9b5905d61020d7a031febb426bdad4ed6e5b6cbbb33773572e945bdb9
                                                                      • Opcode Fuzzy Hash: dae3a0718a87e4df61378b2741433d3843a001a72cf9a8bef989f65ce697a17a
                                                                      • Instruction Fuzzy Hash: 761129373042541FCF8A6BAC6C545AE7EA7EBD5370B14443AE905DB381DE358D0293B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f18e8ac0d375550ade6026f91e6dde8356c1a88f6d777b43f24ed11476f492fd
                                                                      • Instruction ID: dbe1bb4e9c2b8dc1b05178980de744ec9eedd9554dec68bf2c4329f99b05bc81
                                                                      • Opcode Fuzzy Hash: f18e8ac0d375550ade6026f91e6dde8356c1a88f6d777b43f24ed11476f492fd
                                                                      • Instruction Fuzzy Hash: 8321A1357019228BD7299F29C4A862BB7A6EB88656B5585A8ED16CF354CF30DC06C7C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4534871007.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_11dd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6bfdc6c1362ff27f7c4f2775eaee7fe1d61c353e206f9d2e4059bd6c2acde290
                                                                      • Instruction ID: bf57eefb10302da1c1023140d8f17350a7924cb3ac7bcfd902bcf70c8b4cf7ca
                                                                      • Opcode Fuzzy Hash: 6bfdc6c1362ff27f7c4f2775eaee7fe1d61c353e206f9d2e4059bd6c2acde290
                                                                      • Instruction Fuzzy Hash: D32107B1504204EFDF19CF68E9C0B26BB65FBC4354F24C9ADE9494B292C736D446CA62
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5991b1f5af13797d530189710ec0e63721637ac722cc4fe411fb5a944797ac1b
                                                                      • Instruction ID: eda8a0f9de74877bd82dc9828d0ddbfc7267cb8bcbe72a57c63b8b69a5d6b877
                                                                      • Opcode Fuzzy Hash: 5991b1f5af13797d530189710ec0e63721637ac722cc4fe411fb5a944797ac1b
                                                                      • Instruction Fuzzy Hash: DC113372E042599FCB01DBF8DC105DEBB70FF89210B248796DA25B7290EA312946C7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5a2f7a9022f8b66335b231fd75e188eb8edf50ab7ed64ab3fd4da03877dec2a9
                                                                      • Instruction ID: 2a6d04849201d2981ee846c0add60e1a7186a57a9b48a1bf9e6b0874e76dc924
                                                                      • Opcode Fuzzy Hash: 5a2f7a9022f8b66335b231fd75e188eb8edf50ab7ed64ab3fd4da03877dec2a9
                                                                      • Instruction Fuzzy Hash: 20316279E11208DFCB48EFA8E59489DBBF2FF49311B20546AE819AB324D731AD15CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7b0a86121c21a832fbb56ee14558f8034f5dae4ae640ff6c6a756dd9dcafb414
                                                                      • Instruction ID: 5f23dfea3c782860d519b88e29c3a7cc50e1d83009eb74bce5263f802f1b906b
                                                                      • Opcode Fuzzy Hash: 7b0a86121c21a832fbb56ee14558f8034f5dae4ae640ff6c6a756dd9dcafb414
                                                                      • Instruction Fuzzy Hash: 7C21C03664415A9FDB199F64E454B6B7BB2FB48715F108468F8158F340CB34DDA1CBE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a6a2f862305799f4fb071a66a61aa32b4baa9537ce876996625778a6b0c5aaf1
                                                                      • Instruction ID: a7e90b0108adaa59ed279af1d5233bee010bf3c666ff64f8d48511d5b792c1c6
                                                                      • Opcode Fuzzy Hash: a6a2f862305799f4fb071a66a61aa32b4baa9537ce876996625778a6b0c5aaf1
                                                                      • Instruction Fuzzy Hash: 0B1108347042545FD7050BBA5C545ABBFEBAFCA360B14887AE246C3386CE248C168371
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e6acd7a748cb2c1c46ae4d39ef364844ebd9740bb1d56d173fe359b3b1290477
                                                                      • Instruction ID: 4a11c5f8b970921ee7ae6a62a27c3159e9352ca681e4ee04b2b81647679bfed5
                                                                      • Opcode Fuzzy Hash: e6acd7a748cb2c1c46ae4d39ef364844ebd9740bb1d56d173fe359b3b1290477
                                                                      • Instruction Fuzzy Hash: 4B116D75E012198BDB08CFABD8446DEBBF2EBC9300F08D169D818AB295DB745546CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f2c3219931adcc58618577e7e506c0b9d0f499308115d4eeb4d38a35183a18d
                                                                      • Instruction ID: 1f69a825dc898ee9803a5d412dd922c0676f11307e2162b08b3c9a70e9b23fef
                                                                      • Opcode Fuzzy Hash: 8f2c3219931adcc58618577e7e506c0b9d0f499308115d4eeb4d38a35183a18d
                                                                      • Instruction Fuzzy Hash: 6E1114B6800249DFDB10CF99C845BDEBFF5EF88320F24841AE528A7610D379A550DFA6
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0871e5c733f7da309542a55d5bdf4b453d85cd62644e1395b8bc714cae5c5a6d
                                                                      • Instruction ID: 8d73475d9bf3b909db5e3c91aa844c1219b157dac4711b967623d8dd24f146b0
                                                                      • Opcode Fuzzy Hash: 0871e5c733f7da309542a55d5bdf4b453d85cd62644e1395b8bc714cae5c5a6d
                                                                      • Instruction Fuzzy Hash: 0B11A07AE00611CFC790EB7DE64855E3BF8EF88721711086AE805DB711DB31DE058BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 216d87d88a7d43ffea87685cca43a9e6c9bba667e2fdc3a6268e49ad8552d07d
                                                                      • Instruction ID: daffdef23acf674d96691eb553e7a3b5c91400383965837798e84cf15ea34f81
                                                                      • Opcode Fuzzy Hash: 216d87d88a7d43ffea87685cca43a9e6c9bba667e2fdc3a6268e49ad8552d07d
                                                                      • Instruction Fuzzy Hash: 222181B5D012099FCB48EFB8D54169EBFF2FB44304F00D5A9D058AB318EB309A85CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e07195f235b1c33a6e2ffb098757f8666244c39846e6539e603635ebd4462e2a
                                                                      • Instruction ID: bfe04cb623c75c7b1164f66057d499ad7ac4db5dcdc69a054f4f4405b881a6d2
                                                                      • Opcode Fuzzy Hash: e07195f235b1c33a6e2ffb098757f8666244c39846e6539e603635ebd4462e2a
                                                                      • Instruction Fuzzy Hash: 1621CEB8C056098FCB45EFA8D8555EDBBF1BB49300F10456AD819B7210EB305A95CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 44d144b9a21bd4542d08b16eb4fd121f96c9b847523293ed0ac36232e94421b5
                                                                      • Instruction ID: abbc7d3b21d845a3f17bc928ef4fed4b89fa6bdcfed5f3918f0a7a438e678c45
                                                                      • Opcode Fuzzy Hash: 44d144b9a21bd4542d08b16eb4fd121f96c9b847523293ed0ac36232e94421b5
                                                                      • Instruction Fuzzy Hash: DC1126B6800249DFDB10CF99C945BEEBFF5EB48320F248419E518A7610D379A950DFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f3ce294d355bcd0c52f3ad6b60bb60cfa373c449800de136955d5ac35e2b542
                                                                      • Instruction ID: 3ce126d43de6597ced2ed5d13f9e1f042bc09a8c82c49f68313594edbd51f915
                                                                      • Opcode Fuzzy Hash: 8f3ce294d355bcd0c52f3ad6b60bb60cfa373c449800de136955d5ac35e2b542
                                                                      • Instruction Fuzzy Hash: 6A110074F001498FDB04DBECDA50BAEBFB6AB48325F40D465E908A7745E73099828B51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3d1eafc87f23fdc30f4b936c32c750008828b9bb76e826b0bdbdd2483afed6a
                                                                      • Instruction ID: c6ad821818dda5ace00237767c34020dd7f46481acc2c8f06ce24ddfc6504b66
                                                                      • Opcode Fuzzy Hash: b3d1eafc87f23fdc30f4b936c32c750008828b9bb76e826b0bdbdd2483afed6a
                                                                      • Instruction Fuzzy Hash: 191151B5D011099FDB48EFB9D54169EBBF2FB44304F00D5A9D058AB314EB309A85CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eb7c3f186b76a211ca48282ae4f99d44a2a76cce53dafd75896b95b23a9496b1
                                                                      • Instruction ID: 6a92008c52b10189010c2039a7c63f5d2dd1a9b91bf76c3a4237708213a798c5
                                                                      • Opcode Fuzzy Hash: eb7c3f186b76a211ca48282ae4f99d44a2a76cce53dafd75896b95b23a9496b1
                                                                      • Instruction Fuzzy Hash: 4521C0B4D056198FCB15EFA8D8545EEBBF0BF49300F1441AAD805B6254EB305A95CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4534871007.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_11dd000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                      • Instruction ID: 17ea84059d4742cfd4baa68fd500e599dbd0576fe06660ffcb4a9f2899d48959
                                                                      • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                      • Instruction Fuzzy Hash: 9E11DD76504284CFDB16CF64D9C4B15BFB2FB84314F24C6AAD8494B692C33AD44ACF62
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5a75ea30f9c14067b63d7560f8cdbb53b632ccf7bc6328b6daf6fef923115ce6
                                                                      • Instruction ID: 436bd362c51cc772f6119c4bd3792b6cf10c0cd468fe25759a2f5f8559bdbc40
                                                                      • Opcode Fuzzy Hash: 5a75ea30f9c14067b63d7560f8cdbb53b632ccf7bc6328b6daf6fef923115ce6
                                                                      • Instruction Fuzzy Hash: 9B012873B401156FCB159E54E820BAF3BDBEBD8651F188069F914CB340DF718C228BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ad97bca7f25d3a88f7eedcbcfae520b1525d1365b17e90354aadd873dede136f
                                                                      • Instruction ID: 9ea126075eca9798111d861cb80571a574200eb76d103a20f85c86ac70d653bb
                                                                      • Opcode Fuzzy Hash: ad97bca7f25d3a88f7eedcbcfae520b1525d1365b17e90354aadd873dede136f
                                                                      • Instruction Fuzzy Hash: 4301F671E002198FCF44EFB9C905AEEBBF5AF48210F50856AD919E7350E7345A018BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 86d24036df29b80154545e418303e1a5513a2945cfde97700b6d320ea0d79208
                                                                      • Instruction ID: c6a9bd9ee9b6acf49b497f63379ffacf8ea03e7c4155144c596a6ef4fb4b6810
                                                                      • Opcode Fuzzy Hash: 86d24036df29b80154545e418303e1a5513a2945cfde97700b6d320ea0d79208
                                                                      • Instruction Fuzzy Hash: 58F03A71A11126CFCB84EF7CC44466E77F0AF0821072145E9D809DB320EB30D9008BD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6966e0d60ed536d145ef342267d2ebcad8e7e99073323a12e50812fc1ca5582c
                                                                      • Instruction ID: f71c287ad37a3793a1498e9950f804406e9b0dc6064099e8b2dcad76003debde
                                                                      • Opcode Fuzzy Hash: 6966e0d60ed536d145ef342267d2ebcad8e7e99073323a12e50812fc1ca5582c
                                                                      • Instruction Fuzzy Hash: 1AE0A23098B20492CB08CAA6B80A2EABB79C7C6300F046038D800E7086CBB451148791
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f0f936898c654540a3bdec7de7a9851abe6b883dd68a7b344b7c3fc2bae8f37
                                                                      • Instruction ID: 072a8d891fa959c239fbbe7c0d8413f07a7d51e4402c9f1a0870863ea2575fcb
                                                                      • Opcode Fuzzy Hash: 1f0f936898c654540a3bdec7de7a9851abe6b883dd68a7b344b7c3fc2bae8f37
                                                                      • Instruction Fuzzy Hash: 3EE0D8B2C1035A5BCB019AA49C114DEBB34EDA3310B5146A6D02437041F7A126098BF1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6ccd3c91e5c7bc7b4121d33678bd4bd23c33e0ab64c625e91284c22a20fe2e2f
                                                                      • Instruction ID: 216238a9cb746521342dfc72d9a3ba3906217dba4eeaacdfd3b8ce34f6b52ae4
                                                                      • Opcode Fuzzy Hash: 6ccd3c91e5c7bc7b4121d33678bd4bd23c33e0ab64c625e91284c22a20fe2e2f
                                                                      • Instruction Fuzzy Hash: 51E0DF92C0D161CBD7198BAAA4161B9BF30CBE321574862D7D4898F225DA58E606DB11
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2d8b4fa7e0148c9e0b4d3d1198c2ce8769b93aa6b6a3c2778c1aca9dbbaf9259
                                                                      • Instruction ID: 1ab1502e076ffd5ef510b2cd693d4f22b1b1ac7b184996de0ba355b6d54b6104
                                                                      • Opcode Fuzzy Hash: 2d8b4fa7e0148c9e0b4d3d1198c2ce8769b93aa6b6a3c2778c1aca9dbbaf9259
                                                                      • Instruction Fuzzy Hash: 4BE06830C1B201CFCB08CFA9BA183FABF72EB8A302F046468D014720A2CBB08218C741
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 45ec3da4de0d1e1d7f0ba1d5eae6c2e88c7df04a1a6143c53f2e8650062c3f81
                                                                      • Instruction ID: 2be7e9a532f9ddf656837a3c96b66edeb62f39ef54a242ce2bd4e50450fd548f
                                                                      • Opcode Fuzzy Hash: 45ec3da4de0d1e1d7f0ba1d5eae6c2e88c7df04a1a6143c53f2e8650062c3f81
                                                                      • Instruction Fuzzy Hash: 10D02B31D2022F83CF04E7A5DC004DFF738EEC2260B514622D41033000FB302658C2E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction ID: ed73559076092706b3043afec08fc361eacafaa59ce1ca17357ed0e2c5a1914d
                                                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction Fuzzy Hash: 1BC0123320C1382AA624208F7C40BA3AB8CC3C12B4A2501B7F95CEB200A8829C8041A8
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 282533b3bc5dbc690c023683af071295dcbc61c733b0cee77ff4f3afa8695ebf
                                                                      • Instruction ID: e0b9a6ef4222d7f9ac86c34ecabdd0c7bcfb96df5add669099c63344e1cd35b4
                                                                      • Opcode Fuzzy Hash: 282533b3bc5dbc690c023683af071295dcbc61c733b0cee77ff4f3afa8695ebf
                                                                      • Instruction Fuzzy Hash: B4D0677BB410189FCB049F98E8908DDB7B6FB9C221B048556FA15A3261C6319921DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 03d2b6b06abdc4ba272f7de60874de5b95f15e278c03636d68cd620fc96d57a1
                                                                      • Instruction ID: 6d2794448276a01bcd19af5691ed5e69eb1012378e6073be8b698870492a5f27
                                                                      • Opcode Fuzzy Hash: 03d2b6b06abdc4ba272f7de60874de5b95f15e278c03636d68cd620fc96d57a1
                                                                      • Instruction Fuzzy Hash: ADD02B714543490FC30AFB34E8515053F25BA80308B909998B80605606EE681D494752
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dacae78cc540d773f4dacd6c41918e6c003cebf52ff8835212c81040213e2fa1
                                                                      • Instruction ID: 66f74965361e18ca0c3de41de0cba5c2874102bd77b373173c465c27e50ff075
                                                                      • Opcode Fuzzy Hash: dacae78cc540d773f4dacd6c41918e6c003cebf52ff8835212c81040213e2fa1
                                                                      • Instruction Fuzzy Hash: D5D06C78D4412C9BCB20DFA8EA547ECB7B0EB8A300F0024E69C09B7200DB305EA09F12
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36457f6500399ab19c1b3054a0b95ec4439ef7a8195f8cbc681466bc24db0635
                                                                      • Instruction ID: 9b5383da8e1abc6dc9795322854d5c88785c20e9045c082656ad7904c6ca56df
                                                                      • Opcode Fuzzy Hash: 36457f6500399ab19c1b3054a0b95ec4439ef7a8195f8cbc681466bc24db0635
                                                                      • Instruction Fuzzy Hash: 1DC0227012030E0BC148FF30E9806043B2AB7C0308F009914B00905308DE782A880692
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$0oVp$Hwq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq
                                                                      • API String ID: 0-3469494655
                                                                      • Opcode ID: 83e30d37d9c3af6dd77091e253a9f6997fc7721f5a4888c2d412a21d4da5fcdf
                                                                      • Instruction ID: 8890ec9d154dd458794a1f5c999a22bab5b087be52a2e0259266357bd5c7f0a1
                                                                      • Opcode Fuzzy Hash: 83e30d37d9c3af6dd77091e253a9f6997fc7721f5a4888c2d412a21d4da5fcdf
                                                                      • Instruction Fuzzy Hash: 2412D3B4E002188FDB58DFA9C984B9DBBF2BF89300F2080A9D509AB355DB315E85CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp
                                                                      • API String ID: 0-771760206
                                                                      • Opcode ID: 13e1b1acf3e1c4f74e2cf6bb2fdfd2025c71aa518f19d0adbfbc8b3c01de01ed
                                                                      • Instruction ID: bef8b6f53de78d83ec0e7fefcb25287eb8824374d05046d953eca524c2f6390d
                                                                      • Opcode Fuzzy Hash: 13e1b1acf3e1c4f74e2cf6bb2fdfd2025c71aa518f19d0adbfbc8b3c01de01ed
                                                                      • Instruction Fuzzy Hash: 2AB19874E10218CFDB54DFA9D994A9DBBB2FF89310F1081A9E819AB365DB30AD41CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp
                                                                      • API String ID: 0-771760206
                                                                      • Opcode ID: 8c985c9644fcc852cfb4ce57ecb4ea360a81e39990b83d40180cc8baf8362798
                                                                      • Instruction ID: 0e71498bd98b806e2a232f4cc9ed6ccac6cdfe4a47491baa85c5139c08ee4ed8
                                                                      • Opcode Fuzzy Hash: 8c985c9644fcc852cfb4ce57ecb4ea360a81e39990b83d40180cc8baf8362798
                                                                      • Instruction Fuzzy Hash: B5519475E006088FDB48DFAAD584A9DFBF2BF89310F14C169D419AB365DB309941CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c68eda06c971930638d038c082e2c7d92987e7801e05d4981c0d0f8e992631fd
                                                                      • Instruction ID: f8b008ded01a681c08d947d10e0608719c86e37be6f02c68437429d82623fbdb
                                                                      • Opcode Fuzzy Hash: c68eda06c971930638d038c082e2c7d92987e7801e05d4981c0d0f8e992631fd
                                                                      • Instruction Fuzzy Hash: 9F527B74E01269CFDB64DF65C984B9DBBB2BB89300F1085EAD909AB354DB319E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 033616dfbb76c11f85ff40c257a1f7f843af60ec64c119037d519e3c9c5240ce
                                                                      • Instruction ID: 443232bf9edf4511384af1211a2b97141cfd3da93de473f3aafa959bd6ec667d
                                                                      • Opcode Fuzzy Hash: 033616dfbb76c11f85ff40c257a1f7f843af60ec64c119037d519e3c9c5240ce
                                                                      • Instruction Fuzzy Hash: D9C1B374E00218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E81CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a4c3dc1763bcddb85d8dd5d9dbafb493484cc01fe5d5c1f0c05e42135ed6b3df
                                                                      • Instruction ID: 75c4d03826b59e81ad27b408b01a052cb05480254b45635e68c3372dda07c5bd
                                                                      • Opcode Fuzzy Hash: a4c3dc1763bcddb85d8dd5d9dbafb493484cc01fe5d5c1f0c05e42135ed6b3df
                                                                      • Instruction Fuzzy Hash: BBC1B474E01218CFDB54DFA5D994B9DBBB2BF88300F2081A9D809AB355DB359E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 039b00caecbfa8e3fbcfc67d6287a96d6974284bd32bcd836e6820156c9bc15c
                                                                      • Instruction ID: 9e3f140ec6df70132cdd7ae9daf018b3d2a00871d1d2f13fd6b434513ebe6244
                                                                      • Opcode Fuzzy Hash: 039b00caecbfa8e3fbcfc67d6287a96d6974284bd32bcd836e6820156c9bc15c
                                                                      • Instruction Fuzzy Hash: 08C1B474E01218CFDB54DFA5D994B9DBBB2BF88304F2080A9D809AB354DB355E85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 27e2dcec07a3d9ebd0729aba097c591669e99469ea435bd72eaa51bc2bb564e5
                                                                      • Instruction ID: aef25b1806aefae61ad12a8d13f26086b415b21c659177c91b14aa5fe3c45ec0
                                                                      • Opcode Fuzzy Hash: 27e2dcec07a3d9ebd0729aba097c591669e99469ea435bd72eaa51bc2bb564e5
                                                                      • Instruction Fuzzy Hash: 02C1B274E00218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E85DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 58bbd538b67171fa681dd0a951ae691d91a61c580b85dc1e41b2090a5034c4ed
                                                                      • Instruction ID: 56e41136b66da766a31b1b7d4f1f74df73917c1cb49438f697e8df6d950469b7
                                                                      • Opcode Fuzzy Hash: 58bbd538b67171fa681dd0a951ae691d91a61c580b85dc1e41b2090a5034c4ed
                                                                      • Instruction Fuzzy Hash: 3BC1B374E01218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E81DF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f9878cd50836bb66da393f4206346059cf7a0340799a5fee328959de6d3d7ae2
                                                                      • Instruction ID: 142a4163f605008aa59afa4dce42cb6deba200a55d44b29505adfe61cf0427c8
                                                                      • Opcode Fuzzy Hash: f9878cd50836bb66da393f4206346059cf7a0340799a5fee328959de6d3d7ae2
                                                                      • Instruction Fuzzy Hash: D9C1C274E00218CFDB58DFA5D994B9DBBB2BF89304F2080A9D809AB354DB359E85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7232fc5d5ced205c6dd33075a8acc4901151da31a6b46d6eccefd1ee1b9e01d2
                                                                      • Instruction ID: b69e5961252025e950ec2494fb2b4e57c3e7725ebf8435fede01de14429b01f5
                                                                      • Opcode Fuzzy Hash: 7232fc5d5ced205c6dd33075a8acc4901151da31a6b46d6eccefd1ee1b9e01d2
                                                                      • Instruction Fuzzy Hash: A6C1B274E01218CFDB58DFA5D994B9DBBB2BF88300F2081A9D809AB354DB359E81DF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d8de754b3493dd089a69502515029b3373a1e74339e662a193215cfe63f70040
                                                                      • Instruction ID: c4f493a6e1f9567aae60e63b4bf97af4cde6dd05a4b7c4f512dd2ed146ba9284
                                                                      • Opcode Fuzzy Hash: d8de754b3493dd089a69502515029b3373a1e74339e662a193215cfe63f70040
                                                                      • Instruction Fuzzy Hash: 5DC1B374E01218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E81CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 84f7f5cbc2b0d78d8643f6c26a1313325842a666c387bb02057719ee61c3a1f6
                                                                      • Instruction ID: a57fe8a263eded0797b502c782346014f66df2065d59f39930c16a9954d65310
                                                                      • Opcode Fuzzy Hash: 84f7f5cbc2b0d78d8643f6c26a1313325842a666c387bb02057719ee61c3a1f6
                                                                      • Instruction Fuzzy Hash: 47C1B274E00218CFDB58DFA5D994B9DBBB2BF88304F2081A9D809AB354DB359E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 433ef991478e5f6c4c5e954fc0fafa9dda5696476d6da23ae492a101b52ead2d
                                                                      • Instruction ID: 273c612faf099733a86007a347421cf7812cc466c7e2b8770445fd9ecbe3cf3f
                                                                      • Opcode Fuzzy Hash: 433ef991478e5f6c4c5e954fc0fafa9dda5696476d6da23ae492a101b52ead2d
                                                                      • Instruction Fuzzy Hash: 6DC1C374E01218CFDB58DFA5D994B9DBBB2BF88304F2081A9D809AB354DB359E81CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a48eed876bac0708fd2b7ad2a8bf5450d894b68fe72afe1a6ae6b9ee6a4127b5
                                                                      • Instruction ID: 9752f1c3bb4101417f0a1c08eee1447066a50686d4b9f1eba28cd835052c7892
                                                                      • Opcode Fuzzy Hash: a48eed876bac0708fd2b7ad2a8bf5450d894b68fe72afe1a6ae6b9ee6a4127b5
                                                                      • Instruction Fuzzy Hash: 52C1C275E00218CFDB58DFA5D994B9DBBB2BF88304F2081A9D809AB355DB359E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ee5773402b47be0d0b2c48fb3f5a7c96c3bdefbb52446f701ede8886027ed0e3
                                                                      • Instruction ID: fe3de7e475182ee31f1eda978c1b50549e391f362f879cfe6a1c5aff23d44532
                                                                      • Opcode Fuzzy Hash: ee5773402b47be0d0b2c48fb3f5a7c96c3bdefbb52446f701ede8886027ed0e3
                                                                      • Instruction Fuzzy Hash: 67C1C374E01218CFDB54DFA5D994B9DBBB2BF88300F2080A9D809AB354DB35AE81CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 346c6d79cf0ce4f364cbefc2b2df6dbad4edc15f307d6794a5a86f83de758587
                                                                      • Instruction ID: e90087a827fc1d2cb9ce8c45985167ac87416d1d0e693e7d2ca512a45bc2a9b4
                                                                      • Opcode Fuzzy Hash: 346c6d79cf0ce4f364cbefc2b2df6dbad4edc15f307d6794a5a86f83de758587
                                                                      • Instruction Fuzzy Hash: 39C1B374E01218CFDB54DFA5D994BADBBB2BF88304F2081A9D809AB354DB359E85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d3972e938734a6455f64ebd9e922e99345e06fc2433fda60f5a7b668b44471e3
                                                                      • Instruction ID: eff9ae2f3be7da1ac9171addd499e28a8a91dce557aac4580a9d8d4731c76b4d
                                                                      • Opcode Fuzzy Hash: d3972e938734a6455f64ebd9e922e99345e06fc2433fda60f5a7b668b44471e3
                                                                      • Instruction Fuzzy Hash: 92C1C274E00219CFDB58DFA5D994B9DBBB2BF88300F2080A9D809AB354DB359E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 99594876394d7bc0b7408a9bcc75977b68718254b62c91e62f6e4271ec4e4094
                                                                      • Instruction ID: e0bafd118832116514c88b677d018d19ea81626b333d3ac0edf464e17a4d539b
                                                                      • Opcode Fuzzy Hash: 99594876394d7bc0b7408a9bcc75977b68718254b62c91e62f6e4271ec4e4094
                                                                      • Instruction Fuzzy Hash: 95C1B275E00218CFDB58DFA5D994B9DBBB2BF89304F2080A9D819AB354DB359E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b0e33077b4ca50285062356dd1634a507d36e0f722807e546f27a80c3eaff142
                                                                      • Instruction ID: 1a248be985c3202a922ed2e6576e4b4d9c5a0e6a13ce3b9c34f8f04a20ab671e
                                                                      • Opcode Fuzzy Hash: b0e33077b4ca50285062356dd1634a507d36e0f722807e546f27a80c3eaff142
                                                                      • Instruction Fuzzy Hash: 38A1AD74E01228DFDB64DF64C994B9ABBB2BF49301F1085EAD809AB350DB319E81CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1600cbf13a358a3c21556838623442469a767b76cd5e6e20a705b24870262b02
                                                                      • Instruction ID: f99ae0f8f8de01aadd3adc3718b8eb4c8df281e343ebea00a68c155b06df3015
                                                                      • Opcode Fuzzy Hash: 1600cbf13a358a3c21556838623442469a767b76cd5e6e20a705b24870262b02
                                                                      • Instruction Fuzzy Hash: C7519374A01228DFDB68DF64D854B99B7B2FF4A301F5089E9D80AA7350CB319E81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4556505338.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_69c0000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5344984c124a4d4d2cb37f46e27183e8a2c40b9d5aa034274f026b97264f74f4
                                                                      • Instruction ID: a392accab6b20a117065b44575c40abcfea3ce269d9c38c77cbad8982d487a49
                                                                      • Opcode Fuzzy Hash: 5344984c124a4d4d2cb37f46e27183e8a2c40b9d5aa034274f026b97264f74f4
                                                                      • Instruction Fuzzy Hash: 9ED06774D0426C9ACB10DF5898413AEB772EB86310F0025E68509BB640D7305E508E16
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.4535776413.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2b50000_rOrders.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \;sq$\;sq$\;sq$\;sq
                                                                      • API String ID: 0-2251010532
                                                                      • Opcode ID: 207a518955a1f616f0a7fc512f3f537f85a5dfc1de14211f9082c10baff82926
                                                                      • Instruction ID: e9f173e738d222e8d3699e8c50f6889f798d3e45457347eb6617f6ae363d291b
                                                                      • Opcode Fuzzy Hash: 207a518955a1f616f0a7fc512f3f537f85a5dfc1de14211f9082c10baff82926
                                                                      • Instruction Fuzzy Hash: E7015A717140748FDB248A2DC484B26B7AAEFC86647A941AAE901CF2A1DF62DC41C790

                                                                      Execution Graph

                                                                      Execution Coverage:9.4%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:81
                                                                      Total number of Limit Nodes:6
                                                                      execution_graph 15904 30fd3d8 15905 30fd3dd GetCurrentProcess 15904->15905 15907 30fd469 15905->15907 15908 30fd470 GetCurrentThread 15905->15908 15907->15908 15909 30fd4ad GetCurrentProcess 15908->15909 15910 30fd4a6 15908->15910 15911 30fd4e3 15909->15911 15910->15909 15912 30fd50b GetCurrentThreadId 15911->15912 15913 30fd53c 15912->15913 15914 30f4668 15915 30f4669 15914->15915 15916 30f4686 15915->15916 15920 30f4779 15915->15920 15925 30f3e10 15916->15925 15918 30f46a5 15921 30f477c 15920->15921 15929 30f4878 15921->15929 15933 30f4888 15921->15933 15926 30f3e1b 15925->15926 15941 30f5c64 15926->15941 15928 30f6fcf 15928->15918 15931 30f487c 15929->15931 15930 30f498c 15930->15930 15931->15930 15937 30f4248 15931->15937 15935 30f4889 15933->15935 15934 30f498c 15934->15934 15935->15934 15936 30f4248 CreateActCtxA 15935->15936 15936->15934 15938 30f5918 CreateActCtxA 15937->15938 15940 30f59db 15938->15940 15940->15940 15942 30f5c6f 15941->15942 15945 30f5c84 15942->15945 15944 30f7085 15944->15928 15946 30f5c8f 15945->15946 15949 30f5cb4 15946->15949 15948 30f7162 15948->15944 15950 30f5cbf 15949->15950 15953 30f5ce4 15950->15953 15952 30f7265 15952->15948 15955 30f5cef 15953->15955 15954 30f85a9 15954->15952 15955->15954 15957 30fcd00 15955->15957 15958 30fcd10 15957->15958 15959 30fcd55 15958->15959 15962 30fceb1 15958->15962 15966 30fcec0 15958->15966 15959->15954 15963 30fcebc 15962->15963 15964 30fcf07 15963->15964 15970 30fb720 15963->15970 15964->15959 15967 30fcec1 15966->15967 15968 30fcf07 15967->15968 15969 30fb720 2 API calls 15967->15969 15968->15959 15969->15968 15971 30fb72b 15970->15971 15973 30fdc18 15971->15973 15974 30fd024 15971->15974 15973->15973 15975 30fd02f 15974->15975 15976 30f5ce4 2 API calls 15975->15976 15977 30fdc87 15976->15977 15978 30fdc96 15977->15978 15981 30fdd00 15977->15981 15985 30fdcf3 15977->15985 15978->15973 15983 30fdd01 15981->15983 15982 30fddff 15983->15982 15984 30fddfa KiUserCallbackDispatcher 15983->15984 15984->15982 15987 30fdcfc 15985->15987 15986 30fddff 15987->15986 15988 30fddfa KiUserCallbackDispatcher 15987->15988 15988->15986 15989 30fd620 15990 30fd625 DuplicateHandle 15989->15990 15991 30fd6b6 15990->15991 15992 30fac50 15996 30fad48 15992->15996 16001 30fad37 15992->16001 15993 30fac5f 15998 30fad49 15996->15998 15997 30fad7c 15997->15993 15998->15997 15999 30faf80 GetModuleHandleW 15998->15999 16000 30fafad 15999->16000 16000->15993 16003 30fad3c 16001->16003 16002 30fad7c 16002->15993 16003->16002 16004 30faf80 GetModuleHandleW 16003->16004 16005 30fafad 16004->16005 16005->15993

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 296 30fd3c9-30fd3d6 297 30fd3dd-30fd467 GetCurrentProcess 296->297 298 30fd3d8-30fd3dc 296->298 302 30fd469-30fd46f 297->302 303 30fd470-30fd4a4 GetCurrentThread 297->303 298->297 302->303 304 30fd4ad-30fd4e1 GetCurrentProcess 303->304 305 30fd4a6-30fd4ac 303->305 306 30fd4ea-30fd505 call 30fd5a8 304->306 307 30fd4e3-30fd4e9 304->307 305->304 311 30fd50b-30fd53a GetCurrentThreadId 306->311 307->306 312 30fd53c-30fd542 311->312 313 30fd543-30fd5a5 311->313 312->313
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 030FD456
                                                                      • GetCurrentThread.KERNEL32 ref: 030FD493
                                                                      • GetCurrentProcess.KERNEL32 ref: 030FD4D0
                                                                      • GetCurrentThreadId.KERNEL32 ref: 030FD529
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: 79a60bd8cc6ff033006b052692dbdc21df6a25cccb77a581b3adfcbd79ec3df6
                                                                      • Instruction ID: 4e60c8ab2de8a8c2e80ee82ee54c5c834e385b7ef3329a77fcb9554b5163d1da
                                                                      • Opcode Fuzzy Hash: 79a60bd8cc6ff033006b052692dbdc21df6a25cccb77a581b3adfcbd79ec3df6
                                                                      • Instruction Fuzzy Hash: 145187B09012498FDB54CFAAD948B9EFFF1EF88314F24C45AE109A7650DB34A944CB66

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 320 30fd3d8-30fd467 GetCurrentProcess 325 30fd469-30fd46f 320->325 326 30fd470-30fd4a4 GetCurrentThread 320->326 325->326 327 30fd4ad-30fd4e1 GetCurrentProcess 326->327 328 30fd4a6-30fd4ac 326->328 329 30fd4ea-30fd505 call 30fd5a8 327->329 330 30fd4e3-30fd4e9 327->330 328->327 334 30fd50b-30fd53a GetCurrentThreadId 329->334 330->329 335 30fd53c-30fd542 334->335 336 30fd543-30fd5a5 334->336 335->336
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 030FD456
                                                                      • GetCurrentThread.KERNEL32 ref: 030FD493
                                                                      • GetCurrentProcess.KERNEL32 ref: 030FD4D0
                                                                      • GetCurrentThreadId.KERNEL32 ref: 030FD529
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: a999fb8974b4849877ab3aaa231d1900314d9baff76cdd23219dac1ab5f6badf
                                                                      • Instruction ID: 7964ea3b99149581b5884beedbf223eb54b8351be653e0a51f6fed9b70b02100
                                                                      • Opcode Fuzzy Hash: a999fb8974b4849877ab3aaa231d1900314d9baff76cdd23219dac1ab5f6badf
                                                                      • Instruction Fuzzy Hash: 4B5165B09016098FDB54CFAAD948B9EFFF1FF88314F24C459E109A7650DB34A944CB66

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 367 30fad48-30fad57 369 30fad59-30fad66 call 30fa0a0 367->369 370 30fad83-30fad87 367->370 377 30fad7c 369->377 378 30fad68 369->378 372 30fad9b-30faddc 370->372 373 30fad89-30fad93 370->373 379 30fadde-30fade6 372->379 380 30fade9-30fadf7 372->380 373->372 377->370 428 30fad6e call 30fafd0 378->428 429 30fad6e call 30fafe0 378->429 379->380 381 30fae1b-30fae1d 380->381 382 30fadf9-30fadfe 380->382 384 30fae20-30fae27 381->384 385 30fae09 382->385 386 30fae00-30fae07 call 30fa0ac 382->386 383 30fad74-30fad76 383->377 387 30faeb8-30faf32 383->387 390 30fae29-30fae31 384->390 391 30fae34-30fae3b 384->391 388 30fae0b-30fae19 385->388 386->388 418 30faf39-30faf3c 387->418 419 30faf34-30faf36 387->419 388->384 390->391 392 30fae3d-30fae45 391->392 393 30fae48-30fae4a call 30fa0bc 391->393 392->393 397 30fae4f-30fae51 393->397 399 30fae5e-30fae63 397->399 400 30fae53-30fae5b 397->400 402 30fae65-30fae6c 399->402 403 30fae81-30fae8e 399->403 400->399 402->403 404 30fae6e-30fae7e call 30fa0cc call 30fa0dc 402->404 409 30faeb1-30faeb7 403->409 410 30fae90-30faeae 403->410 404->403 410->409 420 30faf3d-30faf78 418->420 419->420 422 30faf38 419->422 423 30faf7a-30faf7d 420->423 424 30faf80-30fafab GetModuleHandleW 420->424 422->418 423->424 425 30fafad-30fafb3 424->425 426 30fafb4-30fafc8 424->426 425->426 428->383 429->383
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 030FAF9E
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: d28fc401a2bc4a07a3ba97705bdfbeb47a467ec9f6b3a643cb5b166389aa2bca
                                                                      • Instruction ID: c4784492ff3344f8105a5ccf86cf2308fec9a97560f32ff51f927c4ab8dbbc04
                                                                      • Opcode Fuzzy Hash: d28fc401a2bc4a07a3ba97705bdfbeb47a467ec9f6b3a643cb5b166389aa2bca
                                                                      • Instruction Fuzzy Hash: 558143B0A01B058FDB64DF69D44479ABBF5FF88304F04892DD68A9BA40D734E849CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 430 30f590d-30f590e 431 30f5915 430->431 432 30f5910-30f5912 430->432 433 30f5919-30f59d9 CreateActCtxA 431->433 432->433 434 30f5914 432->434 436 30f59db-30f59e1 433->436 437 30f59e2-30f5a3c 433->437 434->431 436->437 444 30f5a3e-30f5a41 437->444 445 30f5a4b-30f5a4f 437->445 444->445 446 30f5a51-30f5a5d 445->446 447 30f5a60 445->447 446->447 448 30f5a61 447->448 448->448
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 030F59C9
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: 337d1e462933ec4d7464330a4cbc57355412beabfa1d752089c6ba5a95413781
                                                                      • Instruction ID: 60e6e17cd9d619cf9a91edff2d60d721879e5a60a6e242cc1e9169b218d0f209
                                                                      • Opcode Fuzzy Hash: 337d1e462933ec4d7464330a4cbc57355412beabfa1d752089c6ba5a95413781
                                                                      • Instruction Fuzzy Hash: 6B4122B0C00619CEDF24CFA9C884B9DBBF6FF89304F24816AD518AB251DB756945CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 450 30f4248-30f59d9 CreateActCtxA 454 30f59db-30f59e1 450->454 455 30f59e2-30f5a3c 450->455 454->455 462 30f5a3e-30f5a41 455->462 463 30f5a4b-30f5a4f 455->463 462->463 464 30f5a51-30f5a5d 463->464 465 30f5a60 463->465 464->465 466 30f5a61 465->466 466->466
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 030F59C9
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: 8d76bbeb80b0f8c2a79d0014a3d7d5baf9cf92950419f68c7d62948eddea1083
                                                                      • Instruction ID: c612692c2224f9c3eaddb8c2dcb979dfdf197a04d44fe7335ecc3a6562ef21ec
                                                                      • Opcode Fuzzy Hash: 8d76bbeb80b0f8c2a79d0014a3d7d5baf9cf92950419f68c7d62948eddea1083
                                                                      • Instruction Fuzzy Hash: F841DDB1C00619CFDB24CFA9C884B8EBBF6FF89304F64816AD518AB251DB756945CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 468 30fd619-30fd61e 469 30fd625-30fd6b4 DuplicateHandle 468->469 470 30fd620-30fd624 468->470 471 30fd6bd-30fd6da 469->471 472 30fd6b6-30fd6bc 469->472 470->469 472->471
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030FD6A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: b30c32d5aaa6d646908fb3bfc5646512675016ca251e4f521d661cd7158be364
                                                                      • Instruction ID: a65dc0f60ba370aaf143171a3997e56a3371903c667cad997be8fb8125d70c65
                                                                      • Opcode Fuzzy Hash: b30c32d5aaa6d646908fb3bfc5646512675016ca251e4f521d661cd7158be364
                                                                      • Instruction Fuzzy Hash: E021E6B5D012099FDB10CF9AD984ADEFBF5FB48314F14801AE918A7310D378A944CF65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 475 30fd620-30fd6b4 DuplicateHandle 477 30fd6bd-30fd6da 475->477 478 30fd6b6-30fd6bc 475->478 478->477
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030FD6A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: d589272bb4f5ceceb23ea9d83714db3717fc4388f2d37a18c198cacba06f6f55
                                                                      • Instruction ID: 0c773731fc89b8836814fea4da279ba1b6d7cbd25d708ead9382b91d2c0e2b9e
                                                                      • Opcode Fuzzy Hash: d589272bb4f5ceceb23ea9d83714db3717fc4388f2d37a18c198cacba06f6f55
                                                                      • Instruction Fuzzy Hash: 8C21C4B59012499FDB10CF9AD984ADEFBF9EB48320F14841AE918A7350D378A944CF65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 481 30faf38-30faf78 484 30faf7a-30faf7d 481->484 485 30faf80-30fafab GetModuleHandleW 481->485 484->485 486 30fafad-30fafb3 485->486 487 30fafb4-30fafc8 485->487 486->487
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 030FAF9E
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4535693107.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_30f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 554973681a35d5a7ef9de2371211b3a144a1cd145467c48d6b27c08f36e3457e
                                                                      • Instruction ID: 99f98c0800fb259923aec744f08c959504a75fa0360b510acef58188e0b6948d
                                                                      • Opcode Fuzzy Hash: 554973681a35d5a7ef9de2371211b3a144a1cd145467c48d6b27c08f36e3457e
                                                                      • Instruction Fuzzy Hash: CD11E0B6D012498FCB10CF9AD944ADEFBF4EF88324F14841AD929A7610C379A549CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534547836.00000000019FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 019FD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_19fd000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 021a090534e236ab1210df4ba1020c80195785c6fe94c16c0672e08736f723cc
                                                                      • Instruction ID: 2c1f3e0445bff75c2333bf0b04b5e68a20da5931a7931d2abd5fd20a2448a59b
                                                                      • Opcode Fuzzy Hash: 021a090534e236ab1210df4ba1020c80195785c6fe94c16c0672e08736f723cc
                                                                      • Instruction Fuzzy Hash: 8C2106B1504240EFDB15DF58D9C4F26BFA5FB84318F24C56DEA090B25AC336D456CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534799474.0000000001A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_1a0d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 684563b679053774543c179529bb6ecdfc202151081147de8c945d96fc6cf36c
                                                                      • Instruction ID: e38817f5909d458d25a65606114fef4eb4ccce096dc16cfdc72ced99319608c3
                                                                      • Opcode Fuzzy Hash: 684563b679053774543c179529bb6ecdfc202151081147de8c945d96fc6cf36c
                                                                      • Instruction Fuzzy Hash: D52125B2604200EFDB16DF98E9C0B26BF65FB84364F24C56DD90E4B286C336D407CA61
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534799474.0000000001A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_1a0d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cc3733ffb1cfdea58eb6f4a918726a84a02248207bae0f3fbdb4882791f553f9
                                                                      • Instruction ID: dd475bd102833f308ed8d0f0c7cf3fdd223ad41bf9a4709687f23e61f901da48
                                                                      • Opcode Fuzzy Hash: cc3733ffb1cfdea58eb6f4a918726a84a02248207bae0f3fbdb4882791f553f9
                                                                      • Instruction Fuzzy Hash: 84215BB6504304DFDB06DF98E5C0B2ABF75FB88324F24C56DD8494B282C33AD446CAA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534799474.0000000001A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_1a0d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d0e131cb967ffbc555f1bdc11ff171a59018d192c72dd7fcbce19ae597009c7
                                                                      • Instruction ID: 181785ed392cfa23ee94e2c10c6d2a7455d50a49d1b607cde8634bf1148c2d45
                                                                      • Opcode Fuzzy Hash: 8d0e131cb967ffbc555f1bdc11ff171a59018d192c72dd7fcbce19ae597009c7
                                                                      • Instruction Fuzzy Hash: 7121A1765093808FDB13CF64D990B15BF71EB46324F28C5DAD8498B6A7C33AD44ACB62
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534547836.00000000019FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 019FD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_19fd000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                      • Instruction ID: 6395e2678f5a732b8fea3b6b6e578444ca76d1846fd3fe2c4486c24e8e877a81
                                                                      • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                      • Instruction Fuzzy Hash: A711E172404280DFDB12CF54D5C4B16BFB2FB84328F24C6ADD9090B65AC33AD45ACBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.4534799474.0000000001A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_1a0d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6571a979d86382cef3f3a0ee6dcd591210bcaba3c37dfea3d6794a8d99f67603
                                                                      • Instruction ID: 67f44b71b984d5840bdf34fbdd3e70db69b1b3d9032dcf71c4a6dc404dc8534a
                                                                      • Opcode Fuzzy Hash: 6571a979d86382cef3f3a0ee6dcd591210bcaba3c37dfea3d6794a8d99f67603
                                                                      • Instruction Fuzzy Hash: 9411C476504680CFDB12CF54E5C4B19FF71FB84324F24C6AAD8494B696C33AD44ACB92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$4'sq$4'sq
                                                                      • API String ID: 0-1617174353
                                                                      • Opcode ID: 99af675aac99e9000d41e224fb807a3c9604943ccc3327cd1a62644ea71ef8f3
                                                                      • Instruction ID: e6a9a3d4e769a16f45fafb243feca22d008cbe4711733d17c03a19ae5ffaa1d6
                                                                      • Opcode Fuzzy Hash: 99af675aac99e9000d41e224fb807a3c9604943ccc3327cd1a62644ea71ef8f3
                                                                      • Instruction Fuzzy Hash: CD1238F1B0421D9FEB259B7C881176ABFAADFC2215F1480EAD515DB681DE32C8C1C7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 66e4c74921521874d902a8874251def1289de1ccfbdaef809630274f1c317a4f
                                                                      • Instruction ID: 02fed07111eb1612280df4f945c10112c8340a782b4f888a71f57ca31b69ade7
                                                                      • Opcode Fuzzy Hash: 66e4c74921521874d902a8874251def1289de1ccfbdaef809630274f1c317a4f
                                                                      • Instruction Fuzzy Hash: 73917135A04248DFCB05CFA9D4809AEBFF2EF89314F1480AAE444AB361E735ED45DB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0073f9df345b2018644d608af368d47ac54661d7411b36443c66d577252fd748
                                                                      • Instruction ID: 1705b74e2109c0c2c8af6f0c89f530c85f2a61534b55d1656e455c5497d0d4f1
                                                                      • Opcode Fuzzy Hash: 0073f9df345b2018644d608af368d47ac54661d7411b36443c66d577252fd748
                                                                      • Instruction Fuzzy Hash: E9917C74A002458FCB15CF99C4949AEFBF2FF88310B248699D915AB3A5D735FC91CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eb397007a784db36c936cfa758e7d5ad4eb70d0632656ed5211a58c0ae72d5f9
                                                                      • Instruction ID: 8f93bfc6bf2f0c46dd96aca6b82c76e93f753a962a68ca0b2d8adebe7ae336d3
                                                                      • Opcode Fuzzy Hash: eb397007a784db36c936cfa758e7d5ad4eb70d0632656ed5211a58c0ae72d5f9
                                                                      • Instruction Fuzzy Hash: 6D4129F2A0060ECFEB208F2C8805769BFAAEF86354F1441E6D4049F252D731D885C7A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 399046188d32f2077f80ca5eb18e365a0d493ef7b421bd97b3a0c0469062a9b8
                                                                      • Instruction ID: 18d33766555c2f5069d9cefb6ff7f88b72d5029aabb32adf81f373ac7d8aef9d
                                                                      • Opcode Fuzzy Hash: 399046188d32f2077f80ca5eb18e365a0d493ef7b421bd97b3a0c0469062a9b8
                                                                      • Instruction Fuzzy Hash: C9413774A006499FCB09CF59C4989AEFBB1FF48310B258699D915AB364D732FC91CFA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05809a96fa67f3c382f1bcd6625906891d41d79c3910464fee491edeedaa992f
                                                                      • Instruction ID: c9940adbebd0bea16609b23444717ba712c7aa3fc6a1bfc3d0410a49569b8cdd
                                                                      • Opcode Fuzzy Hash: 05809a96fa67f3c382f1bcd6625906891d41d79c3910464fee491edeedaa992f
                                                                      • Instruction Fuzzy Hash: 9331A1B4A092969FC704DF6CC8D0AAAFBB4FF59300B04859AD4599B352D734F816CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d9a874bf4ca073375fcb41d83179f0fd00d737271a04e6878d0e840e4ac6b236
                                                                      • Instruction ID: 981d7317a0daa6c878658542c426bf6195dfa5ef1a13b3f60f673b5affb92331
                                                                      • Opcode Fuzzy Hash: d9a874bf4ca073375fcb41d83179f0fd00d737271a04e6878d0e840e4ac6b236
                                                                      • Instruction Fuzzy Hash: DB212978A00249CFCB00DF98D4909AEBBF1FF89310B15859AD949AB356D331FC41CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7f9c787c1b337775bb1a4d540e775a23ea0c14ea4a622da9162c616eb41852ad
                                                                      • Instruction ID: 04db29f71304c3c818d6d8dd8257096cf42acf6bc1a86dd163097b93dd1f49f9
                                                                      • Opcode Fuzzy Hash: 7f9c787c1b337775bb1a4d540e775a23ea0c14ea4a622da9162c616eb41852ad
                                                                      • Instruction Fuzzy Hash: F401D236A0A3804FCB078B78D8A01D5BFB4DF5A224F0581CBC898DB193E6295C0AC721
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2216492605.000000000343D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0343D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_343d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c3dd10b2dcc42b4fd5cc2c5c0153a476bc4ce4e4fdb09dc1a4e78cd34a7e911
                                                                      • Instruction ID: e4186fc66dc7cea34a53e045a31ddb228b15a250b8b262981a3545e9a7e2aefe
                                                                      • Opcode Fuzzy Hash: 1c3dd10b2dcc42b4fd5cc2c5c0153a476bc4ce4e4fdb09dc1a4e78cd34a7e911
                                                                      • Instruction Fuzzy Hash: 3301407240E3C05ED7138B25C994B52BFB8DF57624F1D81DBD9888F2A3C2695849C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2216492605.000000000343D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0343D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_343d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 25a2dd27ec18a09bc1f6a2857b99d2e7d18e7f49a5245e0234668bb03a019f17
                                                                      • Instruction ID: 4e2ef3ec39b0653342a55d44f43ed9c6ec6ee9cf99edd8529cbba9e9d2f58de9
                                                                      • Opcode Fuzzy Hash: 25a2dd27ec18a09bc1f6a2857b99d2e7d18e7f49a5245e0234668bb03a019f17
                                                                      • Instruction Fuzzy Hash: CF01D4728043009AE7118A25CDC0BA7BFA8DB47728F1CC46BED585F242C6789842C6B5
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b8820518bafaf5b173e54dca7e29ff85442988374bc10f47c1887db84f8d8f6e
                                                                      • Instruction ID: 0f8f26fe29f9868142616492a28b88e2b2c387fb6962b8020d08005d4d4f2187
                                                                      • Opcode Fuzzy Hash: b8820518bafaf5b173e54dca7e29ff85442988374bc10f47c1887db84f8d8f6e
                                                                      • Instruction Fuzzy Hash: 9801A234A042458FCB16CF9CD854AEEFBB1FF48324F148095D554A7261C736AC12CB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2218724240.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_4d70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90ebd3939edd809f57c6f21fcfa79290245dafbae43167de9004aa6620202209
                                                                      • Instruction ID: d0aea5653a9020f695687499301dde95e5e564d3d108169a9ac240c50ae47c41
                                                                      • Opcode Fuzzy Hash: 90ebd3939edd809f57c6f21fcfa79290245dafbae43167de9004aa6620202209
                                                                      • Instruction Fuzzy Hash: 35F0F675A00104DFCB04CF99CC945A9FBB6FFC83207248099CD5A63701CB32AC62CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$tPsq$tPsq$$sq$$sq$$sq$$sq$l$l
                                                                      • API String ID: 0-1491236640
                                                                      • Opcode ID: 3d8d242ff4c350a776c521e2aaa0baff39640101d5707f22b6e23b5c79c0dfc6
                                                                      • Instruction ID: 3a70db2331e4a0da0105ee4cd19b03419b5fd7b488476d964e96109b4d46a7a0
                                                                      • Opcode Fuzzy Hash: 3d8d242ff4c350a776c521e2aaa0baff39640101d5707f22b6e23b5c79c0dfc6
                                                                      • Instruction Fuzzy Hash: B1A149F270425D9FE7258BAD8801766BFE9EFC6214F1980ABD545CB292DE31CC81C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$tPsq$tPsq$$sq$$sq$$sq$l$l
                                                                      • API String ID: 0-3025730457
                                                                      • Opcode ID: 57c28ff246d042f9c1da80db15a1936eeb5594a4fccb9c717f1745a8d0b0ff9a
                                                                      • Instruction ID: b0ba7001c5927cc401bad0c26044710ed8c987034c862b9d38a70433b04045b3
                                                                      • Opcode Fuzzy Hash: 57c28ff246d042f9c1da80db15a1936eeb5594a4fccb9c717f1745a8d0b0ff9a
                                                                      • Instruction Fuzzy Hash: 9EA148F2708255CFE7256B78941067ABFA3EFC6215F1880EBD545CB392DA31C881C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$$sq$$sq$$sq$l$l
                                                                      • API String ID: 0-3503947109
                                                                      • Opcode ID: 41e867b147d72d65acf75d1e23f9f79cd531d27524eceb4d9188415749b953d9
                                                                      • Instruction ID: d68c595a391a61a95774019e95ec26f8624dabec289069cafdf562ca764ecd1c
                                                                      • Opcode Fuzzy Hash: 41e867b147d72d65acf75d1e23f9f79cd531d27524eceb4d9188415749b953d9
                                                                      • Instruction Fuzzy Hash: 47514CF1B0461EDFEB254ABD88017A6BBAAEFC2214F1480BAD505C7641DE35C8C5C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $sq$$sq$$sq$$sq
                                                                      • API String ID: 0-2855845837
                                                                      • Opcode ID: e266d4ca0fbd4d97464d29db814e2747c5f3a3cb168ac6139c9fef99d53c3b0a
                                                                      • Instruction ID: 6fb508a726333e7b73a5d8e7e10000ca4cbf67b63433c23d4a1ca901826831a2
                                                                      • Opcode Fuzzy Hash: e266d4ca0fbd4d97464d29db814e2747c5f3a3cb168ac6139c9fef99d53c3b0a
                                                                      • Instruction Fuzzy Hash: 8B2147F1710312ABFB3456BE9C41B27BBD6DBC0719F24C46AA905CB281CE3AC8C58321
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2228641003.0000000007B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_7b30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$$sq$$sq
                                                                      • API String ID: 0-148891389
                                                                      • Opcode ID: c68c999502293157e95473c67db1038a09ced9a366982ace6a71c796eba155a8
                                                                      • Instruction ID: 40f590a9dcf5846dd324bbc3456af978e93b0577802e52f469bd25c3acc43e7b
                                                                      • Opcode Fuzzy Hash: c68c999502293157e95473c67db1038a09ced9a366982ace6a71c796eba155a8
                                                                      • Instruction Fuzzy Hash: 670149A1B0C2969FD73A12281861365BFB3AFC6518F1D00E7C145CF243CE298C8683A6

                                                                      Execution Graph

                                                                      Execution Coverage:15.1%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:10.8%
                                                                      Total number of Nodes:37
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 23815 14bced8 23816 14bcee4 23815->23816 23823 69f11bf 23816->23823 23829 69f11c0 23816->23829 23817 14bcf98 23835 6a285fb 23817->23835 23841 6a28608 23817->23841 23818 14bd0b7 23824 69f11e2 23823->23824 23825 69f12ae 23824->23825 23847 69f7d8f 23824->23847 23851 69f7d90 23824->23851 23855 69f8174 23824->23855 23825->23817 23830 69f11e2 23829->23830 23831 69f12ae 23830->23831 23832 69f7d8f LdrInitializeThunk 23830->23832 23833 69f8174 LdrInitializeThunk 23830->23833 23834 69f7d90 LdrInitializeThunk 23830->23834 23831->23817 23832->23831 23833->23831 23834->23831 23836 6a2862a 23835->23836 23837 6a2873c 23836->23837 23838 69f7d8f LdrInitializeThunk 23836->23838 23839 69f8174 LdrInitializeThunk 23836->23839 23840 69f7d90 LdrInitializeThunk 23836->23840 23837->23818 23838->23837 23839->23837 23840->23837 23842 6a2862a 23841->23842 23843 6a2873c 23842->23843 23844 69f7d8f LdrInitializeThunk 23842->23844 23845 69f8174 LdrInitializeThunk 23842->23845 23846 69f7d90 LdrInitializeThunk 23842->23846 23843->23818 23844->23843 23845->23843 23846->23843 23850 69f7dc1 23847->23850 23848 69f7f21 23848->23825 23849 69f82b1 LdrInitializeThunk 23849->23848 23850->23848 23850->23849 23854 69f7dc1 23851->23854 23852 69f7f21 23852->23825 23853 69f82b1 LdrInitializeThunk 23853->23852 23854->23852 23854->23853 23856 69f802b 23855->23856 23857 69f82b1 LdrInitializeThunk 23856->23857 23858 69f82c9 23857->23858 23858->23825

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 255 14bb328-14bb33b 256 14bb47a-14bb481 255->256 257 14bb341-14bb34a 255->257 258 14bb350-14bb354 257->258 259 14bb484 257->259 260 14bb36e-14bb375 258->260 261 14bb356 258->261 263 14bb489-14bb4b0 259->263 260->256 262 14bb37b-14bb388 260->262 264 14bb359-14bb364 261->264 262->256 268 14bb38e-14bb3a1 262->268 272 14bb4dc 263->272 273 14bb4b2-14bb4ca 263->273 264->259 265 14bb36a-14bb36c 264->265 265->260 265->264 270 14bb3a3 268->270 271 14bb3a6-14bb3ae 268->271 270->271 275 14bb41b-14bb41d 271->275 276 14bb3b0-14bb3b6 271->276 274 14bb4de-14bb4e2 272->274 284 14bb4cc-14bb4d1 273->284 285 14bb4d3-14bb4d6 273->285 275->256 277 14bb41f-14bb425 275->277 276->275 278 14bb3b8-14bb3be 276->278 277->256 280 14bb427-14bb431 277->280 278->263 281 14bb3c4-14bb3dc 278->281 280->263 282 14bb433-14bb44b 280->282 293 14bb409-14bb40c 281->293 294 14bb3de-14bb3e4 281->294 299 14bb44d-14bb453 282->299 300 14bb470-14bb473 282->300 284->274 287 14bb4d8-14bb4da 285->287 288 14bb4e3-14bb520 285->288 287->272 287->273 297 14bb522 288->297 298 14bb527-14bb604 call 14b3908 call 14b3428 288->298 293->259 296 14bb40e-14bb411 293->296 294->263 295 14bb3ea-14bb3fe 294->295 295->263 307 14bb404 295->307 296->259 303 14bb413-14bb419 296->303 297->298 317 14bb60b-14bb62c call 14b4dc8 298->317 318 14bb606 298->318 299->263 301 14bb455-14bb469 299->301 300->259 302 14bb475-14bb478 300->302 301->263 308 14bb46b 301->308 302->256 302->280 303->275 303->276 307->293 308->300 320 14bb631-14bb63c 317->320 318->317 321 14bb63e 320->321 322 14bb643-14bb647 320->322 321->322 323 14bb649-14bb64a 322->323 324 14bb64c-14bb653 322->324 325 14bb66b-14bb6af 323->325 326 14bb65a-14bb668 324->326 327 14bb655 324->327 331 14bb715-14bb72c 325->331 326->325 327->326 333 14bb72e-14bb753 331->333 334 14bb6b1-14bb6c7 331->334 340 14bb76b 333->340 341 14bb755-14bb76a 333->341 337 14bb6c9-14bb6d5 334->337 338 14bb6f1 334->338 342 14bb6df-14bb6e5 337->342 343 14bb6d7-14bb6dd 337->343 344 14bb6f7-14bb714 338->344 347 14bb76c 340->347 341->340 345 14bb6ef 342->345 343->345 344->331 345->344 347->347
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 4ac5678475ee58be891d5605ab18ad60009e4d5303ec9fac64f61abcc0bed79e
                                                                      • Instruction ID: 6656280be44a2ae004be79fa8994c8fb1d806f6204eca3040dd7f87991dc47f0
                                                                      • Opcode Fuzzy Hash: 4ac5678475ee58be891d5605ab18ad60009e4d5303ec9fac64f61abcc0bed79e
                                                                      • Instruction Fuzzy Hash: 10E10D75E04618CFDB15CFA9C984A9EBBB1FF49310F15846AE849AB361DB34AC41CF60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 350 14bbbd3-14bbbd5 351 14bbb9e-14bbb9f 350->351 352 14bbbd7-14bbbd9 350->352 353 14bbbbd-14bbbc8 351->353 354 14bbbdb-14bbc00 352->354 355 14bbba2-14bbbb2 352->355 356 14bbc02 354->356 357 14bbc07-14bbce4 call 14b3908 call 14b3428 354->357 355->353 356->357 367 14bbceb-14bbd0c call 14b4dc8 357->367 368 14bbce6 357->368 370 14bbd11-14bbd1c 367->370 368->367 371 14bbd1e 370->371 372 14bbd23-14bbd27 370->372 371->372 373 14bbd29-14bbd2a 372->373 374 14bbd2c-14bbd33 372->374 375 14bbd4b-14bbd8f 373->375 376 14bbd3a-14bbd48 374->376 377 14bbd35 374->377 381 14bbdf5-14bbe0c 375->381 376->375 377->376 383 14bbe0e-14bbe33 381->383 384 14bbd91-14bbda7 381->384 390 14bbe4b 383->390 391 14bbe35-14bbe4a 383->391 388 14bbda9-14bbdb5 384->388 389 14bbdd1 384->389 392 14bbdbf-14bbdc5 388->392 393 14bbdb7-14bbdbd 388->393 394 14bbdd7-14bbdf4 389->394 391->390 395 14bbdcf 392->395 393->395 394->381 395->394
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 19c6ea8e41cc05492a7dea07ba48870d5f0fe3c4865c55c734c11eadbd8cf042
                                                                      • Instruction ID: 71333ef5fa324464aa635dadaf2a9f643764e123e18f394acadd43205cc43c50
                                                                      • Opcode Fuzzy Hash: 19c6ea8e41cc05492a7dea07ba48870d5f0fe3c4865c55c734c11eadbd8cf042
                                                                      • Instruction Fuzzy Hash: AF91B474E042588FDB14DFAAC894ADDBBF2FF89310F14906AE449AB365DB349942CF11

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 399 14bbeb0-14bbeb1 400 14bbe7a 399->400 401 14bbeb3-14bbeb5 399->401 402 14bbe7e-14bbe91 400->402 401->402 403 14bbeb7-14bbee0 401->403 404 14bbee2 403->404 405 14bbee7-14bbfc4 call 14b3908 call 14b3428 403->405 404->405 415 14bbfcb-14bbfec call 14b4dc8 405->415 416 14bbfc6 405->416 418 14bbff1-14bbffc 415->418 416->415 419 14bbffe 418->419 420 14bc003-14bc007 418->420 419->420 421 14bc009-14bc00a 420->421 422 14bc00c-14bc013 420->422 423 14bc02b-14bc06f 421->423 424 14bc01a-14bc028 422->424 425 14bc015 422->425 429 14bc0d5-14bc0ec 423->429 424->423 425->424 431 14bc0ee-14bc113 429->431 432 14bc071-14bc087 429->432 438 14bc12b 431->438 439 14bc115-14bc12a 431->439 436 14bc089-14bc095 432->436 437 14bc0b1 432->437 440 14bc09f-14bc0a5 436->440 441 14bc097-14bc09d 436->441 442 14bc0b7-14bc0d4 437->442 439->438 443 14bc0af 440->443 441->443 442->429 443->442
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 6afeca908492d2bc65945ef372914676a734b845049dbfbe6be6b8433907bc9a
                                                                      • Instruction ID: eb791de8a4e10717003697f0595b810882bfe41831529c6eeb71d086ff575208
                                                                      • Opcode Fuzzy Hash: 6afeca908492d2bc65945ef372914676a734b845049dbfbe6be6b8433907bc9a
                                                                      • Instruction Fuzzy Hash: 2391B7B4E00218CFDB14DFA9D994A9DBBF2BF89310F14906AE409AB365DB345982DF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 447 14b4ad9-14b4b08 448 14b4b0a 447->448 449 14b4b0f-14b4bec call 14b3908 call 14b3428 447->449 448->449 459 14b4bee 449->459 460 14b4bf3-14b4c11 449->460 459->460 490 14b4c14 call 14b4dbb 460->490 491 14b4c14 call 14b4dc8 460->491 461 14b4c1a-14b4c25 462 14b4c2c-14b4c30 461->462 463 14b4c27 461->463 464 14b4c32-14b4c33 462->464 465 14b4c35-14b4c3c 462->465 463->462 466 14b4c54-14b4c98 464->466 467 14b4c3e 465->467 468 14b4c43-14b4c51 465->468 472 14b4cfe-14b4d15 466->472 467->468 468->466 474 14b4c9a-14b4cb0 472->474 475 14b4d17-14b4d3c 472->475 479 14b4cda 474->479 480 14b4cb2-14b4cbe 474->480 482 14b4d3e-14b4d53 475->482 483 14b4d54 475->483 481 14b4ce0-14b4cfd 479->481 484 14b4cc8-14b4cce 480->484 485 14b4cc0-14b4cc6 480->485 481->472 482->483 486 14b4cd8 484->486 485->486 486->481 490->461 491->461
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 8ee85c39d267bb1944c3d4357d66083770fa26b79de68c9ff7ea621fc7619e7d
                                                                      • Instruction ID: 645d4a6362a9ad03adc7bca1e6db6d6a608e1d379b3a6dfdd04a5efb59f17550
                                                                      • Opcode Fuzzy Hash: 8ee85c39d267bb1944c3d4357d66083770fa26b79de68c9ff7ea621fc7619e7d
                                                                      • Instruction Fuzzy Hash: 2981A374E00218DFDB14DFA9D984A9DBBF2BF89300F15906AE819AB365DB349985CF10

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 492 14bc751-14bc780 493 14bc782 492->493 494 14bc787-14bc864 call 14b3908 call 14b3428 492->494 493->494 504 14bc86b-14bc88c call 14b4dc8 494->504 505 14bc866 494->505 507 14bc891-14bc89c 504->507 505->504 508 14bc89e 507->508 509 14bc8a3-14bc8a7 507->509 508->509 510 14bc8a9-14bc8aa 509->510 511 14bc8ac-14bc8b3 509->511 512 14bc8cb-14bc90f 510->512 513 14bc8ba-14bc8c8 511->513 514 14bc8b5 511->514 518 14bc975-14bc98c 512->518 513->512 514->513 520 14bc98e-14bc9b3 518->520 521 14bc911-14bc927 518->521 527 14bc9cb 520->527 528 14bc9b5-14bc9ca 520->528 525 14bc929-14bc935 521->525 526 14bc951 521->526 529 14bc93f-14bc945 525->529 530 14bc937-14bc93d 525->530 531 14bc957-14bc974 526->531 528->527 532 14bc94f 529->532 530->532 531->518 532->531
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 6715d8330bfa5163d1c245ed880f0f1a1d0b13c815508449938e4beb8901b23f
                                                                      • Instruction ID: c1f5993deb69fe15499d9c8fc0376951004600c2e07a9926210a6b81ee7bc387
                                                                      • Opcode Fuzzy Hash: 6715d8330bfa5163d1c245ed880f0f1a1d0b13c815508449938e4beb8901b23f
                                                                      • Instruction Fuzzy Hash: CC81A474E00218DFDB14DFAAD994A9DBBF2BF89300F14906AE419AB365DB349981CF10

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 536 14bca31-14bca60 537 14bca62 536->537 538 14bca67-14bcb44 call 14b3908 call 14b3428 536->538 537->538 548 14bcb4b-14bcb6c call 14b4dc8 538->548 549 14bcb46 538->549 551 14bcb71-14bcb7c 548->551 549->548 552 14bcb7e 551->552 553 14bcb83-14bcb87 551->553 552->553 554 14bcb89-14bcb8a 553->554 555 14bcb8c-14bcb93 553->555 556 14bcbab-14bcbef 554->556 557 14bcb9a-14bcba8 555->557 558 14bcb95 555->558 562 14bcc55-14bcc6c 556->562 557->556 558->557 564 14bcc6e-14bcc93 562->564 565 14bcbf1-14bcc07 562->565 571 14bccab 564->571 572 14bcc95-14bccaa 564->572 569 14bcc09-14bcc15 565->569 570 14bcc31 565->570 573 14bcc1f-14bcc25 569->573 574 14bcc17-14bcc1d 569->574 575 14bcc37-14bcc54 570->575 572->571 576 14bcc2f 573->576 574->576 575->562 576->575
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: 070c364b1cb95c5c27d25a65b86cd6fbbe5666065882dc3bea3386f9be04bb89
                                                                      • Instruction ID: 8a75a1caeaa9bf49bed22cbdfb4a7c47fab771085d9a150dc09f194a92f78655
                                                                      • Opcode Fuzzy Hash: 070c364b1cb95c5c27d25a65b86cd6fbbe5666065882dc3bea3386f9be04bb89
                                                                      • Instruction Fuzzy Hash: 85819674E05218CFDB14DFA9D994A9DBBF2BF88300F14D06AE409AB365DB349942DF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 580 14bc470-14bc4a0 581 14bc4a2 580->581 582 14bc4a7-14bc584 call 14b3908 call 14b3428 580->582 581->582 592 14bc58b-14bc5ac call 14b4dc8 582->592 593 14bc586 582->593 595 14bc5b1-14bc5bc 592->595 593->592 596 14bc5be 595->596 597 14bc5c3-14bc5c7 595->597 596->597 598 14bc5c9-14bc5ca 597->598 599 14bc5cc-14bc5d3 597->599 600 14bc5eb-14bc62f 598->600 601 14bc5da-14bc5e8 599->601 602 14bc5d5 599->602 606 14bc695-14bc6ac 600->606 601->600 602->601 608 14bc6ae-14bc6d3 606->608 609 14bc631-14bc647 606->609 615 14bc6eb 608->615 616 14bc6d5-14bc6ea 608->616 613 14bc649-14bc655 609->613 614 14bc671 609->614 617 14bc65f-14bc665 613->617 618 14bc657-14bc65d 613->618 619 14bc677-14bc694 614->619 616->615 620 14bc66f 617->620 618->620 619->606 620->619
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$LjVp$LjVp$PHsq$PHsq
                                                                      • API String ID: 0-1434930255
                                                                      • Opcode ID: c4d3213355e871da1da11b5ada688f70bbf6cc0f70facec507f64ce84769d3a4
                                                                      • Instruction ID: c066526771099b956a066a89ad126fde33723fe5844a8586359a1a8f9aef02d3
                                                                      • Opcode Fuzzy Hash: c4d3213355e871da1da11b5ada688f70bbf6cc0f70facec507f64ce84769d3a4
                                                                      • Instruction Fuzzy Hash: 7D819474E00218CFDB14DFA9D984A9DBBF2BF89300F14916AE409AB365DB345981CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 624 14b6880-14b68a3 625 14b68ae-14b68ce 624->625 626 14b68a5-14b68ab 624->626 629 14b68d0 625->629 630 14b68d5-14b68dc 625->630 626->625 631 14b6c64-14b6c6d 629->631 632 14b68de-14b68e9 630->632 633 14b68ef-14b6902 632->633 634 14b6c75-14b6c9a 632->634 637 14b6918-14b6933 633->637 638 14b6904-14b6912 633->638 642 14b6957-14b695a 637->642 643 14b6935-14b693b 637->643 638->637 641 14b6bec-14b6bf3 638->641 641->631 648 14b6bf5-14b6bf7 641->648 644 14b6960-14b6963 642->644 645 14b6ab4-14b6aba 642->645 646 14b693d 643->646 647 14b6944-14b6947 643->647 644->645 655 14b6969-14b696f 644->655 653 14b6ac0-14b6ac5 645->653 654 14b6ba6-14b6ba9 645->654 646->645 646->647 649 14b697a-14b6980 646->649 646->654 647->649 650 14b6949-14b694c 647->650 651 14b6bf9-14b6bfe 648->651 652 14b6c06-14b6c0c 648->652 660 14b6982-14b6984 649->660 661 14b6986-14b6988 649->661 656 14b6952 650->656 657 14b69e6-14b69ec 650->657 651->652 652->634 658 14b6c0e-14b6c13 652->658 653->654 662 14b6baf-14b6bb5 654->662 663 14b6c70 654->663 655->645 659 14b6975 655->659 656->654 657->654 666 14b69f2-14b69f8 657->666 664 14b6c58-14b6c5b 658->664 665 14b6c15-14b6c1a 658->665 659->654 667 14b6992-14b699b 660->667 661->667 668 14b6bda-14b6bde 662->668 669 14b6bb7-14b6bbf 662->669 663->634 664->663 670 14b6c5d-14b6c62 664->670 665->663 671 14b6c1c 665->671 672 14b69fa-14b69fc 666->672 673 14b69fe-14b6a00 666->673 675 14b69ae-14b69d6 667->675 676 14b699d-14b69a8 667->676 668->641 677 14b6be0-14b6be6 668->677 669->634 674 14b6bc5-14b6bd4 669->674 670->631 670->648 678 14b6c23-14b6c28 671->678 679 14b6a0a-14b6a21 672->679 673->679 674->637 674->668 697 14b6aca-14b6b00 675->697 698 14b69dc-14b69e1 675->698 676->654 676->675 677->632 677->641 681 14b6c4a-14b6c4c 678->681 682 14b6c2a-14b6c2c 678->682 691 14b6a4c-14b6a73 679->691 692 14b6a23-14b6a3c 679->692 681->663 688 14b6c4e-14b6c51 681->688 685 14b6c3b-14b6c41 682->685 686 14b6c2e-14b6c33 682->686 685->634 690 14b6c43-14b6c48 685->690 686->685 688->664 690->681 693 14b6c1e-14b6c21 690->693 691->663 703 14b6a79-14b6a7c 691->703 692->697 701 14b6a42-14b6a47 692->701 693->663 693->678 704 14b6b0d-14b6b15 697->704 705 14b6b02-14b6b06 697->705 698->697 701->697 703->663 706 14b6a82-14b6aab 703->706 704->663 709 14b6b1b-14b6b20 704->709 707 14b6b08-14b6b0b 705->707 708 14b6b25-14b6b29 705->708 706->697 721 14b6aad-14b6ab2 706->721 707->704 707->708 710 14b6b2b-14b6b31 708->710 711 14b6b48-14b6b4c 708->711 709->654 710->711 715 14b6b33-14b6b3b 710->715 713 14b6b4e-14b6b54 711->713 714 14b6b56-14b6b75 call 14b6e67 711->714 713->714 716 14b6b7b-14b6b7f 713->716 714->716 715->663 717 14b6b41-14b6b46 715->717 716->654 719 14b6b81-14b6b9d 716->719 717->654 719->654 721->697
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$(osq$,wq$,wq
                                                                      • API String ID: 0-3303631882
                                                                      • Opcode ID: 6fe0f7a7836ca0742a966a2da54eebeae1c58d625218f4cf6764639593607ed1
                                                                      • Instruction ID: 478b82104603ffc39e527c607c0e93a181c15d364268428bd0182fbfde596b2d
                                                                      • Opcode Fuzzy Hash: 6fe0f7a7836ca0742a966a2da54eebeae1c58d625218f4cf6764639593607ed1
                                                                      • Instruction Fuzzy Hash: 48D10871A001199FDB15CFA9C9C4AEEBBB6FF89300F16856AE505AB371D730E941CB60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1506 14bb4f3-14bb520 1507 14bb522 1506->1507 1508 14bb527-14bb604 call 14b3908 call 14b3428 1506->1508 1507->1508 1518 14bb60b-14bb62c call 14b4dc8 1508->1518 1519 14bb606 1508->1519 1521 14bb631-14bb63c 1518->1521 1519->1518 1522 14bb63e 1521->1522 1523 14bb643-14bb647 1521->1523 1522->1523 1524 14bb649-14bb64a 1523->1524 1525 14bb64c-14bb653 1523->1525 1526 14bb66b-14bb6af 1524->1526 1527 14bb65a-14bb668 1525->1527 1528 14bb655 1525->1528 1532 14bb715-14bb72c 1526->1532 1527->1526 1528->1527 1534 14bb72e-14bb753 1532->1534 1535 14bb6b1-14bb6c7 1532->1535 1541 14bb76b 1534->1541 1542 14bb755-14bb76a 1534->1542 1538 14bb6c9-14bb6d5 1535->1538 1539 14bb6f1 1535->1539 1543 14bb6df-14bb6e5 1538->1543 1544 14bb6d7-14bb6dd 1538->1544 1545 14bb6f7-14bb714 1539->1545 1548 14bb76c 1541->1548 1542->1541 1546 14bb6ef 1543->1546 1544->1546 1545->1532 1546->1545 1548->1548
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0oVp$PHsq$PHsq
                                                                      • API String ID: 0-255689168
                                                                      • Opcode ID: 9986ced608bac26dbb8ee808b8991423d0bd10e4996af16b3143bf2634631095
                                                                      • Instruction ID: 1a7b8aae51abd5a3a772bfef1ce1475dba23c8adba22db0e0302199aa474e8e1
                                                                      • Opcode Fuzzy Hash: 9986ced608bac26dbb8ee808b8991423d0bd10e4996af16b3143bf2634631095
                                                                      • Instruction Fuzzy Hash: FF61A374E006489FDB14DFAAD984A9EBBF2BF89300F14D06AE819AB365DB345941CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2179 14b6108-14b614e 2181 14b6719-14b672e 2179->2181 2182 14b6154-14b6162 2179->2182 2185 14b6190-14b61a1 2182->2185 2186 14b6164-14b6175 2182->2186 2187 14b61a3-14b61a7 2185->2187 2188 14b6212-14b6226 2185->2188 2186->2185 2196 14b6177-14b6183 2186->2196 2189 14b61a9-14b61b5 2187->2189 2190 14b61c2-14b61cb 2187->2190 2296 14b6229 call 14b672f 2188->2296 2297 14b6229 call 14b6730 2188->2297 2192 14b61bb-14b61bd 2189->2192 2193 14b6543-14b658e 2189->2193 2194 14b61d1-14b61d4 2190->2194 2195 14b64d4 2190->2195 2198 14b64ca-14b64d1 2192->2198 2250 14b6595-14b6614 2193->2250 2194->2195 2199 14b61da-14b61f9 2194->2199 2200 14b64d9-14b653c 2195->2200 2196->2200 2201 14b6189-14b618b 2196->2201 2197 14b622f-14b6235 2202 14b623e-14b6245 2197->2202 2203 14b6237-14b6239 2197->2203 2199->2195 2221 14b61ff-14b6205 2199->2221 2200->2193 2201->2198 2204 14b624b-14b6262 2202->2204 2205 14b6333-14b6344 2202->2205 2203->2198 2204->2205 2212 14b6268-14b6274 2204->2212 2215 14b636e-14b6374 2205->2215 2216 14b6346-14b6353 2205->2216 2219 14b627a-14b62e6 2212->2219 2220 14b632c-14b632e 2212->2220 2217 14b638f-14b6395 2215->2217 2218 14b6376-14b6382 2215->2218 2216->2217 2231 14b6355-14b6361 2216->2231 2225 14b639b-14b63b8 2217->2225 2226 14b64c7 2217->2226 2223 14b662b-14b668e 2218->2223 2224 14b6388-14b638a 2218->2224 2255 14b62e8-14b6312 2219->2255 2256 14b6314-14b6329 2219->2256 2220->2198 2221->2181 2228 14b620b-14b620f 2221->2228 2277 14b6695-14b6714 2223->2277 2224->2198 2225->2195 2245 14b63be-14b63c1 2225->2245 2226->2198 2228->2188 2236 14b6619-14b6624 2231->2236 2237 14b6367-14b6369 2231->2237 2236->2223 2237->2198 2245->2181 2248 14b63c7-14b63ed 2245->2248 2248->2226 2259 14b63f3-14b63ff 2248->2259 2255->2256 2256->2220 2263 14b64c3-14b64c5 2259->2263 2264 14b6405-14b647d 2259->2264 2263->2198 2278 14b64ab-14b64c0 2264->2278 2279 14b647f-14b64a9 2264->2279 2278->2263 2279->2278 2296->2197 2297->2197
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$Hwq
                                                                      • API String ID: 0-1668724233
                                                                      • Opcode ID: 88cdb02908c6f027e79e2dc22618cb4dfe97bc594e1b5920adc4de580333610b
                                                                      • Instruction ID: 689d9facf39e35d1944bc4a4a40ce6f317eb0d9afa6ea089e17ad17587e3046d
                                                                      • Opcode Fuzzy Hash: 88cdb02908c6f027e79e2dc22618cb4dfe97bc594e1b5920adc4de580333610b
                                                                      • Instruction Fuzzy Hash: 9E028E70A002189FDB18DFA9C8947AEBBF6BF88304F258569E505DB3A1DF349D42CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xwq$$sq
                                                                      • API String ID: 0-2558833440
                                                                      • Opcode ID: 09ec7479f0e3cbb1b7d4d432bdbbf0a406856b4f717f01281985e7ce5b5e6eea
                                                                      • Instruction ID: cfd26d416494729ebda79f7e081e65c15c11e6dc8e15a27e96c842eea3035c09
                                                                      • Opcode Fuzzy Hash: 09ec7479f0e3cbb1b7d4d432bdbbf0a406856b4f717f01281985e7ce5b5e6eea
                                                                      • Instruction Fuzzy Hash: E8F16F74E012588FCB18DFB9D4946AEBBB2BF89310B14856EE806E7358CF359C06CB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHsq$PHsq
                                                                      • API String ID: 0-3507005907
                                                                      • Opcode ID: 93a70ab956aa46cb4f022df2957a12730da7fd4d43d9291223e855e06c0b6d4f
                                                                      • Instruction ID: 07c758ef7623573e099b7885fc9832cc8c6d7eb1a0dd94d167b8d24242585fd8
                                                                      • Opcode Fuzzy Hash: 93a70ab956aa46cb4f022df2957a12730da7fd4d43d9291223e855e06c0b6d4f
                                                                      • Instruction Fuzzy Hash: 3081A074E01228CFDB58DFA9D9947ADBBF2BF89300F20816AE419AB394DB345945CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4553601503.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_69f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3d1e88096e7427497f02ff2c2362f43dd5ffb5f7a12aaaf4a7df0195b391f4a1
                                                                      • Instruction ID: 0ce794d9b365dd423d3faa3d60553ccacfd5dfa42d82924b97d090806b66a402
                                                                      • Opcode Fuzzy Hash: 3d1e88096e7427497f02ff2c2362f43dd5ffb5f7a12aaaf4a7df0195b391f4a1
                                                                      • Instruction Fuzzy Hash: 8FF11574E11218CFDB54DFA9D984B9DBBB2BF48300F15C1A9E808AB355DB70A986CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f51878368d98fe75e7a8f130fa2142daa8b31439ab946b7b6f879f71e137923
                                                                      • Instruction ID: ff2c8e950c9ea6a87ec343e35d0b1dc8837e3d41addde1aa259493697200e1d3
                                                                      • Opcode Fuzzy Hash: 8f51878368d98fe75e7a8f130fa2142daa8b31439ab946b7b6f879f71e137923
                                                                      • Instruction Fuzzy Hash: 24827E74E012288FDB64DF69CD94BDDBBB2BB89300F1085EAA50DA7265DB315E81DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73c93b11981c8dd97cf05a6fbacb5809cc0e222af2726bedda0f14d21b9673d7
                                                                      • Instruction ID: bc2ff7f90394358c39a1758c03c93f2b044466a1db2156fa9bb3442b70558910
                                                                      • Opcode Fuzzy Hash: 73c93b11981c8dd97cf05a6fbacb5809cc0e222af2726bedda0f14d21b9673d7
                                                                      • Instruction Fuzzy Hash: 3472BE74E052298FDB64DF69C984BDABBB2AB49300F1491EAD40CA7365DB309EC5CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36768c02c8ec3acf0886a08223f3a9e9e9d80651edb8d79dc6b47ac58af01698
                                                                      • Instruction ID: c245a878981a1f8fdd4ed51abbf582fe571fb6895eb6c1ec3e36b6a2569bec2f
                                                                      • Opcode Fuzzy Hash: 36768c02c8ec3acf0886a08223f3a9e9e9d80651edb8d79dc6b47ac58af01698
                                                                      • Instruction Fuzzy Hash: 35E1C474E01218CFEB54DFA5C984B9DBBB2BF89304F2081AAD419AB394DB355D85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d1aa0a7d040311ace6adbe3003dd4536c115b335078e5032b7698d813a43ea3
                                                                      • Instruction ID: 25b639a542c41c6410c80b13a4ff6de6a0094944dd6433eedb9e936fcfaeb4f6
                                                                      • Opcode Fuzzy Hash: 9d1aa0a7d040311ace6adbe3003dd4536c115b335078e5032b7698d813a43ea3
                                                                      • Instruction Fuzzy Hash: 7DC1C374E00218CFDB54DFA9D994B9DBBB2BF89304F1080AAD509AB364DB359E81DF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6cc4f452da3d7310558866e63f8eb5dddcebe00bf74347bef2e655334df1a533
                                                                      • Instruction ID: d776f9c3268eebaf2d1ea63b3e38a016650ccf2400798ee165d615f7346481b2
                                                                      • Opcode Fuzzy Hash: 6cc4f452da3d7310558866e63f8eb5dddcebe00bf74347bef2e655334df1a533
                                                                      • Instruction Fuzzy Hash: 4AA1A474E012298FEB68DF6AC944B9DBBF2BF89304F14C0AAD40DA7250DB745A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 34eb2c90e92d1de39de3c4b9090518fc2e61269874cbd9d590f47ba61520e572
                                                                      • Instruction ID: a0a422b7e1b918d92b0af879dc6f97ed367aafcd5217646d316ceef96d97964b
                                                                      • Opcode Fuzzy Hash: 34eb2c90e92d1de39de3c4b9090518fc2e61269874cbd9d590f47ba61520e572
                                                                      • Instruction Fuzzy Hash: A1A1A370E012298FEB68DF6AC944B9DBBF2BF89300F14D0AAD40DA7255DB745A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7c9a17ed6a9a568cb8df04640a05a99ccfc0d4f6a1324c4c5f3e980409757c99
                                                                      • Instruction ID: a66cc8c76ba057e631c271c4186098ea7d362a29654c4b20a9120d99a18ba866
                                                                      • Opcode Fuzzy Hash: 7c9a17ed6a9a568cb8df04640a05a99ccfc0d4f6a1324c4c5f3e980409757c99
                                                                      • Instruction Fuzzy Hash: A7A1C570E412298FEB68DF6AC944B9DFBF2BF89310F04C0AAD409A7250D7749A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23ced67e4a49b982f0058774d07742b0aecd9d5d84cca1dd5d925d02f2826ceb
                                                                      • Instruction ID: 1f444bb6063dd37df1b89152097ea210b29dda9485099aca097d1606a8912911
                                                                      • Opcode Fuzzy Hash: 23ced67e4a49b982f0058774d07742b0aecd9d5d84cca1dd5d925d02f2826ceb
                                                                      • Instruction Fuzzy Hash: B1A1B275E012298FEB68DF6AC944B9DBBF2BF89300F14C0AAD50DA7254DB345A85CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 49ad885d8c8505ea2fd5e1997c275c4c79152de27f93c27601d265c74e79f0d6
                                                                      • Instruction ID: 120d886146d20e783a2ceba4632ec033f32ddd47f9a796a3358b669de297c262
                                                                      • Opcode Fuzzy Hash: 49ad885d8c8505ea2fd5e1997c275c4c79152de27f93c27601d265c74e79f0d6
                                                                      • Instruction Fuzzy Hash: 44A1B471E012298FEB68DF6AC944B9DBBF2AF89310F14C0AAD40DA7255DB345A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 940020a7079742fb94fdfcfe4c6dcb8d8baa0950574965a789ca6fc63c19bece
                                                                      • Instruction ID: 36f71619900e4aa1897b89e0dd512a46ba59d9655bce6ff212a71eb411407311
                                                                      • Opcode Fuzzy Hash: 940020a7079742fb94fdfcfe4c6dcb8d8baa0950574965a789ca6fc63c19bece
                                                                      • Instruction Fuzzy Hash: 50A1B374E012298FEB68DF6AC944B9DFBF2BF89304F14C0AAD409A7254DB345A85CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c1a64438b8a091cb586a4269bc4c5b5c1ebe1091d33f24934b9509f5e6878d2f
                                                                      • Instruction ID: be750f8c661054e7fad43e0b506eaa2a61c97461b66e8f5b3bda39629b40b8ed
                                                                      • Opcode Fuzzy Hash: c1a64438b8a091cb586a4269bc4c5b5c1ebe1091d33f24934b9509f5e6878d2f
                                                                      • Instruction Fuzzy Hash: 49A1B271E012298FEB68DF6AC944B9DFBF2AF89300F14C0AAD50DA7250DB745A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dc4ef855e730dd8eef2a248324ea1d64eb45000a110b02e644749b673eb2d1a4
                                                                      • Instruction ID: c83b32430c4f338fd8d405e07e35d804960f8b9065f8eb9e7b94f07f0c48b5ce
                                                                      • Opcode Fuzzy Hash: dc4ef855e730dd8eef2a248324ea1d64eb45000a110b02e644749b673eb2d1a4
                                                                      • Instruction Fuzzy Hash: 6AA1A5B5E012288FEB68DF6AC94479DFBF2BF89304F14C0AAD409A7254DB345A85CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d07f61ae33188328ea232d0e1f76141ba18fc24dc889f4869a92fa50768fc6c2
                                                                      • Instruction ID: dc22bda4d78484a73d7d404b4ddd25944683a0f404f4b11e343957e5d4cfb84f
                                                                      • Opcode Fuzzy Hash: d07f61ae33188328ea232d0e1f76141ba18fc24dc889f4869a92fa50768fc6c2
                                                                      • Instruction Fuzzy Hash: 5AA1A4B0E012298FEB68DF6AC944B9DFBF2AF89300F14C0AAD409A7255D7345A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b28bfc01c5e936cd9ee961dfca16cae8898495f5dee46baf482a49311bdb87f
                                                                      • Instruction ID: 8cbf6267d89de7d9e057165160f8bd70ddbde44c6abf22d649a53c59d0967416
                                                                      • Opcode Fuzzy Hash: 0b28bfc01c5e936cd9ee961dfca16cae8898495f5dee46baf482a49311bdb87f
                                                                      • Instruction Fuzzy Hash: 2781B074E412699FDBA5DF29D890BDDBBB2BF89300F1081EAD849A7254DB315E81CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2f65cc300ee69c734235cec5891c32be0e9e9db85f474e667b107c47b9397ffd
                                                                      • Instruction ID: 7b78df4f760bd0f5eeac4205ca61e2ee6bc4c2e4f11e5884a12b9cc14f47ca73
                                                                      • Opcode Fuzzy Hash: 2f65cc300ee69c734235cec5891c32be0e9e9db85f474e667b107c47b9397ffd
                                                                      • Instruction Fuzzy Hash: 5681A571E016288FEB68DF6AC944B9DFBF2AF89300F14C0AAD40DA7255DB344A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ee7880660fd1fc72b6c90cef67a014de5be18c7e0b5d411637091f0baba0f2c
                                                                      • Instruction ID: bb289789baa374b9f4e477985fb6ea0f691ea95f79c2785d23e72b4d722e1e31
                                                                      • Opcode Fuzzy Hash: 3ee7880660fd1fc72b6c90cef67a014de5be18c7e0b5d411637091f0baba0f2c
                                                                      • Instruction Fuzzy Hash: C571A771E006298FEB68DF6AC944B9DFBF2AF89304F14C0AAD50DA7254DB744A85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: da260c3e8b2f6a0feb4f8f725b9fb469ba8b2783ee21edb5fe67dcdb51175774
                                                                      • Instruction ID: 0a1943b2b6cbd9b80c6916f006f5fce857e50e9a176ed36207190209758ecd39
                                                                      • Opcode Fuzzy Hash: da260c3e8b2f6a0feb4f8f725b9fb469ba8b2783ee21edb5fe67dcdb51175774
                                                                      • Instruction Fuzzy Hash: 5A7197B0E006288FEB68DF6AC94479DFBF2AF89304F14C1AAD40DA7254DB344A85CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 593a0e5d9ba8efd2b52b4f21af84c1318fe7442af6448ece0f1fe06f4674e41d
                                                                      • Instruction ID: 12feadf578b31ae2a170dba73179659fc957d7079f8b2c698a45c988fad3c0ff
                                                                      • Opcode Fuzzy Hash: 593a0e5d9ba8efd2b52b4f21af84c1318fe7442af6448ece0f1fe06f4674e41d
                                                                      • Instruction Fuzzy Hash: 0F41D2B0D002198FEB58DFAAD9547DEBBF2AF88300F14D06AD418BB254DB754946CF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c5805e2d5ada27fa9bc48b66deae608df0e2b6110eda928e982d4457f85c63c0
                                                                      • Instruction ID: e90fc8d19d6bedaa8bed823c1c5632b3935983e14481a58a11c20426f826203a
                                                                      • Opcode Fuzzy Hash: c5805e2d5ada27fa9bc48b66deae608df0e2b6110eda928e982d4457f85c63c0
                                                                      • Instruction Fuzzy Hash: 394159B1E016288BEB58DF6BCD457DAFAF3AFC9300F14C1AAD50CA6254DB740A858F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ba9b25017900afec6d9f6f8d79002fd43ae1db63bdb4499fad7d53f9ddff98ef
                                                                      • Instruction ID: 324f561ce6df4430bff00143e7ae169ce4f5b6769a1113ff93617b6ce4e835da
                                                                      • Opcode Fuzzy Hash: ba9b25017900afec6d9f6f8d79002fd43ae1db63bdb4499fad7d53f9ddff98ef
                                                                      • Instruction Fuzzy Hash: C74179B1E016188BEB58CF6BC9457DAFAF3AFC8304F04C1AAD50CA7255DB740A858F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 20b5f0777fa0711ee8bf81c16dc4807595f430260873d46f1648829e342ec7ef
                                                                      • Instruction ID: 086a647d82054c7edbc0fe791543969ff8d545be9606b3c46ea676e95dd6244f
                                                                      • Opcode Fuzzy Hash: 20b5f0777fa0711ee8bf81c16dc4807595f430260873d46f1648829e342ec7ef
                                                                      • Instruction Fuzzy Hash: 514179B1E016188BEB58CF6BC9457D9FAF3AFC9310F14C1AAC50CA6255DB3409858F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 69facd3de220fa60fe65478dd1779cec018875d358712c9ed226410dbbb7dee5
                                                                      • Instruction ID: 0ce53c6b9b665193b92fcdd3eeb8597988977e68c556df92a91b4d5505e7f058
                                                                      • Opcode Fuzzy Hash: 69facd3de220fa60fe65478dd1779cec018875d358712c9ed226410dbbb7dee5
                                                                      • Instruction Fuzzy Hash: 584158B1E016188BEB58CF6BD9457DAFBF3AFC9304F14C1AAD50CA6254DB740A858F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8087d405a31cd2b98dd6e7e5b3fe756c97bc532b100cabc231ad35a8f4bf0ede
                                                                      • Instruction ID: 1e553269d7a61422e7ea7606fd9c1134bcf36732c3c9b925d4fc29ed4eba0886
                                                                      • Opcode Fuzzy Hash: 8087d405a31cd2b98dd6e7e5b3fe756c97bc532b100cabc231ad35a8f4bf0ede
                                                                      • Instruction Fuzzy Hash: 474148B1E016188BEB58CF6BD9457DAFAF3AFC9304F14C1AAC50CA6264DB740A858F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 80acd2ed0c4d74b9537aa3f365db038fadac3dca376958246471a56aeb6aa70e
                                                                      • Instruction ID: de235e98ad35fcc7161bade1256eae04065f1ab6b7cd3ae3f5cfd7e3e627518c
                                                                      • Opcode Fuzzy Hash: 80acd2ed0c4d74b9537aa3f365db038fadac3dca376958246471a56aeb6aa70e
                                                                      • Instruction Fuzzy Hash: BB4158B1E016188BEB58CF6BC9457DAFAF3AFC8300F14C1AAD50CA6264DB740A858F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23615e1e13bc019f32f73d676156e590b9ba5dd7bb4592e55da4c59169dad2a4
                                                                      • Instruction ID: d02f135522cbf441b220f9a894e1baaf22c943327d4fbe9978ab25fc8415db8b
                                                                      • Opcode Fuzzy Hash: 23615e1e13bc019f32f73d676156e590b9ba5dd7bb4592e55da4c59169dad2a4
                                                                      • Instruction Fuzzy Hash: 0A41F4B0E01248CFDB58DFEAD9406EEBBF2AF88300F20D12AD419AB254DB344946CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 14b6e67-14b6e8d 1 14b72bc-14b72c0 0->1 2 14b6e93-14b6eb6 0->2 3 14b72d9-14b72e7 1->3 4 14b72c2-14b72d6 1->4 11 14b6ebc-14b6ec9 2->11 12 14b6f64-14b6f68 2->12 9 14b72e9-14b72fe 3->9 10 14b7358-14b736d 3->10 18 14b7300-14b7303 9->18 19 14b7305-14b7312 9->19 20 14b736f-14b7372 10->20 21 14b7374-14b7381 10->21 24 14b6ecb-14b6ed6 11->24 25 14b6ed8 11->25 15 14b6f6a-14b6f78 12->15 16 14b6fb0-14b6fb9 12->16 15->16 36 14b6f7a-14b6f95 15->36 22 14b73cf 16->22 23 14b6fbf-14b6fc9 16->23 26 14b7314-14b7355 18->26 19->26 27 14b7383-14b73be 20->27 21->27 30 14b73d4-14b7404 22->30 23->1 28 14b6fcf-14b6fd8 23->28 31 14b6eda-14b6edc 24->31 25->31 76 14b73c5-14b73cc 27->76 34 14b6fda-14b6fdf 28->34 35 14b6fe7-14b6ff3 28->35 61 14b741d-14b7424 30->61 62 14b7406-14b741c 30->62 31->12 38 14b6ee2-14b6f44 31->38 34->35 35->30 41 14b6ff9-14b6fff 35->41 57 14b6fa3 36->57 58 14b6f97-14b6fa1 36->58 87 14b6f4a-14b6f61 38->87 88 14b6f46 38->88 42 14b72a6-14b72aa 41->42 43 14b7005-14b7015 41->43 42->22 47 14b72b0-14b72b6 42->47 55 14b7029-14b702b 43->55 56 14b7017-14b7027 43->56 47->1 47->28 63 14b702e-14b7034 55->63 56->63 64 14b6fa5-14b6fa7 57->64 58->64 63->42 69 14b703a-14b7049 63->69 64->16 70 14b6fa9 64->70 73 14b704f 69->73 74 14b70f7-14b7122 call 14b6ca0 * 2 69->74 70->16 78 14b7052-14b7063 73->78 93 14b7128-14b712c 74->93 94 14b720c-14b7226 74->94 78->30 80 14b7069-14b707b 78->80 80->30 83 14b7081-14b7099 80->83 145 14b709b call 14b7428 83->145 146 14b709b call 14b7438 83->146 86 14b70a1-14b70b1 86->42 90 14b70b7-14b70ba 86->90 87->12 88->87 91 14b70bc-14b70c2 90->91 92 14b70c4-14b70c7 90->92 91->92 95 14b70cd-14b70d0 91->95 92->22 92->95 93->42 97 14b7132-14b7136 93->97 94->1 112 14b722c-14b7230 94->112 100 14b70d8-14b70db 95->100 101 14b70d2-14b70d6 95->101 98 14b7138-14b7145 97->98 99 14b715e-14b7164 97->99 115 14b7147-14b7152 98->115 116 14b7154 98->116 104 14b719f-14b71a5 99->104 105 14b7166-14b716a 99->105 100->22 103 14b70e1-14b70e5 100->103 101->100 101->103 103->22 110 14b70eb-14b70f1 103->110 107 14b71b1-14b71b7 104->107 108 14b71a7-14b71ab 104->108 105->104 111 14b716c-14b7175 105->111 113 14b71b9-14b71bd 107->113 114 14b71c3-14b71c5 107->114 108->76 108->107 110->74 110->78 117 14b7177-14b717c 111->117 118 14b7184-14b719a 111->118 119 14b726c-14b7270 112->119 120 14b7232-14b723c call 14b5b50 112->120 113->42 113->114 121 14b71fa-14b71fc 114->121 122 14b71c7-14b71d0 114->122 123 14b7156-14b7158 115->123 116->123 117->118 118->42 119->76 124 14b7276-14b727a 119->124 120->119 133 14b723e-14b7253 120->133 121->42 129 14b7202-14b7209 121->129 127 14b71df-14b71f5 122->127 128 14b71d2-14b71d7 122->128 123->42 123->99 124->76 131 14b7280-14b728d 124->131 127->42 128->127 136 14b728f-14b729a 131->136 137 14b729c 131->137 133->119 142 14b7255-14b726a 133->142 139 14b729e-14b72a0 136->139 137->139 139->42 139->76 142->1 142->119 145->86 146->86
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq$(osq$(osq$(osq$(osq$(osq$,wq$,wq
                                                                      • API String ID: 0-1935560061
                                                                      • Opcode ID: f9c40f540c70a1ff66f6b9f0e008f552927b9ccb1866bc9c094f69f3d889b18a
                                                                      • Instruction ID: 46052dc3565e3c2a7febbb609a048a4d65ddfbe869baeb85e063b170a55f700c
                                                                      • Opcode Fuzzy Hash: f9c40f540c70a1ff66f6b9f0e008f552927b9ccb1866bc9c094f69f3d889b18a
                                                                      • Instruction Fuzzy Hash: 40123871A002099FCB19CF69D9C4A9EBBF2FF88315F15855AE9059B3A1DB30ED41CB60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1357 14b87e9-14b8805 1358 14b8811-14b881d 1357->1358 1359 14b8807-14b880c 1357->1359 1362 14b881f-14b8821 1358->1362 1363 14b882d-14b8832 1358->1363 1360 14b8ba6-14b8bab 1359->1360 1364 14b8829-14b882b 1362->1364 1363->1360 1364->1363 1365 14b8837-14b8843 1364->1365 1367 14b8853-14b8858 1365->1367 1368 14b8845-14b8851 1365->1368 1367->1360 1368->1367 1370 14b885d-14b8868 1368->1370 1372 14b886e-14b8879 1370->1372 1373 14b8912-14b891d 1370->1373 1378 14b887b-14b888d 1372->1378 1379 14b888f 1372->1379 1376 14b8923-14b8932 1373->1376 1377 14b89c0-14b89cc 1373->1377 1388 14b8943-14b8952 1376->1388 1389 14b8934-14b893e 1376->1389 1386 14b89ce-14b89da 1377->1386 1387 14b89dc-14b89ee 1377->1387 1380 14b8894-14b8896 1378->1380 1379->1380 1384 14b8898-14b88a7 1380->1384 1385 14b88b6-14b88bb 1380->1385 1384->1385 1391 14b88a9-14b88b4 1384->1391 1385->1360 1386->1387 1396 14b8a1c-14b8a27 1386->1396 1404 14b8a12-14b8a17 1387->1404 1405 14b89f0-14b89fc 1387->1405 1397 14b8976-14b897f 1388->1397 1398 14b8954-14b8960 1388->1398 1389->1360 1391->1385 1402 14b88c0-14b88c9 1391->1402 1409 14b8b09-14b8b14 1396->1409 1410 14b8a2d-14b8a36 1396->1410 1411 14b8981-14b8993 1397->1411 1412 14b8995 1397->1412 1407 14b896c-14b8971 1398->1407 1408 14b8962-14b8967 1398->1408 1417 14b88cb-14b88d0 1402->1417 1418 14b88d5-14b88e4 1402->1418 1404->1360 1422 14b8a08-14b8a0d 1405->1422 1423 14b89fe-14b8a03 1405->1423 1407->1360 1408->1360 1426 14b8b3e-14b8b4d 1409->1426 1427 14b8b16-14b8b20 1409->1427 1424 14b8a38-14b8a4a 1410->1424 1425 14b8a4c 1410->1425 1414 14b899a-14b899c 1411->1414 1412->1414 1414->1377 1420 14b899e-14b89aa 1414->1420 1417->1360 1435 14b8908-14b890d 1418->1435 1436 14b88e6-14b88f2 1418->1436 1437 14b89ac-14b89b1 1420->1437 1438 14b89b6-14b89bb 1420->1438 1422->1360 1423->1360 1428 14b8a51-14b8a53 1424->1428 1425->1428 1442 14b8b4f-14b8b5e 1426->1442 1443 14b8ba1 1426->1443 1440 14b8b22-14b8b2e 1427->1440 1441 14b8b37-14b8b3c 1427->1441 1433 14b8a63 1428->1433 1434 14b8a55-14b8a61 1428->1434 1444 14b8a68-14b8a6a 1433->1444 1434->1444 1435->1360 1451 14b88fe-14b8903 1436->1451 1452 14b88f4-14b88f9 1436->1452 1437->1360 1438->1360 1440->1441 1454 14b8b30-14b8b35 1440->1454 1441->1360 1442->1443 1455 14b8b60-14b8b78 1442->1455 1443->1360 1445 14b8a6c-14b8a71 1444->1445 1446 14b8a76-14b8a89 1444->1446 1445->1360 1456 14b8a8b 1446->1456 1457 14b8ac1-14b8acb 1446->1457 1451->1360 1452->1360 1454->1360 1467 14b8b9a-14b8b9f 1455->1467 1468 14b8b7a-14b8b98 1455->1468 1458 14b8a8e-14b8a9f call 14b8258 1456->1458 1463 14b8aea-14b8af6 1457->1463 1464 14b8acd-14b8ad9 call 14b8258 1457->1464 1469 14b8aa1-14b8aa4 1458->1469 1470 14b8aa6-14b8aab 1458->1470 1477 14b8af8-14b8afd 1463->1477 1478 14b8aff 1463->1478 1474 14b8adb-14b8ade 1464->1474 1475 14b8ae0-14b8ae5 1464->1475 1467->1360 1468->1360 1469->1470 1473 14b8ab0-14b8ab3 1469->1473 1470->1360 1479 14b8ab9-14b8abf 1473->1479 1480 14b8bac-14b8bc0 1473->1480 1474->1463 1474->1475 1475->1360 1481 14b8b04 1477->1481 1478->1481 1479->1457 1479->1458 1484 14b8c12-14b8c19 1480->1484 1485 14b8bc2 1480->1485 1481->1360 1488 14b8c1b-14b8c2a 1484->1488 1489 14b8c4e-14b8c60 1484->1489 1485->1484 1488->1489 1492 14b8c2c-14b8c42 1488->1492 1493 14b8d5f 1489->1493 1494 14b8c66-14b8c74 1489->1494 1492->1489 1503 14b8c44-14b8c49 1492->1503 1495 14b8d61-14b8d65 1493->1495 1498 14b8c80-14b8c83 1494->1498 1499 14b8c76-14b8c7b 1494->1499 1501 14b8c89-14b8c8c 1498->1501 1502 14b8d66-14b8d7e 1498->1502 1499->1495 1501->1494 1504 14b8c8e 1501->1504 1503->1495 1504->1493
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq$4'sq$;sq
                                                                      • API String ID: 0-111817264
                                                                      • Opcode ID: 17f60e0b2fc5a3ac756cfa4b0d6d3f54ace6d8f9c733d8e586633b1a3f4bf272
                                                                      • Instruction ID: f4359d9eeb2622b4d1c3f5a231b5434e003d4de5058f43bf796f01b37bda52b0
                                                                      • Opcode Fuzzy Hash: 17f60e0b2fc5a3ac756cfa4b0d6d3f54ace6d8f9c733d8e586633b1a3f4bf272
                                                                      • Instruction Fuzzy Hash: D6B12FB07141028FEB159B3DC9D8BBA7A9EAF85600F14446BE602DB3B1EE75CC428761

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1987 14b77f0-14b7cde 2062 14b8230-14b8265 1987->2062 2063 14b7ce4-14b7cf4 1987->2063 2068 14b8271-14b828f 2062->2068 2069 14b8267-14b826c 2062->2069 2063->2062 2064 14b7cfa-14b7d0a 2063->2064 2064->2062 2066 14b7d10-14b7d20 2064->2066 2066->2062 2067 14b7d26-14b7d36 2066->2067 2067->2062 2070 14b7d3c-14b7d4c 2067->2070 2080 14b8291-14b829b 2068->2080 2081 14b8306-14b8312 2068->2081 2071 14b8356-14b835b 2069->2071 2070->2062 2072 14b7d52-14b7d62 2070->2072 2072->2062 2074 14b7d68-14b7d78 2072->2074 2074->2062 2076 14b7d7e-14b7d8e 2074->2076 2076->2062 2077 14b7d94-14b7da4 2076->2077 2077->2062 2079 14b7daa-14b7dba 2077->2079 2079->2062 2082 14b7dc0-14b822f 2079->2082 2080->2081 2086 14b829d-14b82a9 2080->2086 2087 14b8329-14b8335 2081->2087 2088 14b8314-14b8320 2081->2088 2095 14b82ab-14b82b6 2086->2095 2096 14b82ce-14b82d1 2086->2096 2093 14b834c-14b834e 2087->2093 2094 14b8337-14b8343 2087->2094 2088->2087 2098 14b8322-14b8327 2088->2098 2093->2071 2178 14b8350 call 14b87e9 2093->2178 2094->2093 2107 14b8345-14b834a 2094->2107 2095->2096 2109 14b82b8-14b82c2 2095->2109 2099 14b82e8-14b82f4 2096->2099 2100 14b82d3-14b82df 2096->2100 2098->2071 2102 14b835c-14b837e 2099->2102 2103 14b82f6-14b82fd 2099->2103 2100->2099 2111 14b82e1-14b82e6 2100->2111 2113 14b838e 2102->2113 2114 14b8380 2102->2114 2103->2102 2108 14b82ff-14b8304 2103->2108 2107->2071 2108->2071 2109->2096 2116 14b82c4-14b82c9 2109->2116 2111->2071 2119 14b8390-14b8391 2113->2119 2114->2113 2117 14b8387-14b838c 2114->2117 2116->2071 2117->2119 2178->2071
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $sq$$sq
                                                                      • API String ID: 0-1184984226
                                                                      • Opcode ID: 22641a186120c1ef594143a01cf77f32d764c1c8372294193ee5d3144723e8cb
                                                                      • Instruction ID: ec7221c1ac3cf95f0c327ac38ee3e20c5a5b59d0451d870c5fe1fe3eb1651738
                                                                      • Opcode Fuzzy Hash: 22641a186120c1ef594143a01cf77f32d764c1c8372294193ee5d3144723e8cb
                                                                      • Instruction Fuzzy Hash: BC5203B4A006198FEB159BE4CC50B9EBB76FF84300F1081AAD10A673A5DF359E85EF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hwq$Hwq
                                                                      • API String ID: 0-741242263
                                                                      • Opcode ID: 8899a0bd48375509d01a0db0abe680d8414102a5e605fdd92851a182ff33d88c
                                                                      • Instruction ID: d9a009025167e31db48732c50477162364cececee864e8bc68778533fbb84c9b
                                                                      • Opcode Fuzzy Hash: 8899a0bd48375509d01a0db0abe680d8414102a5e605fdd92851a182ff33d88c
                                                                      • Instruction Fuzzy Hash: A191B4307042548FDB169F78D8947AFBBE6BF89300F14896AE5468B3A1DF358C11DBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq$LRsq
                                                                      • API String ID: 0-2113534932
                                                                      • Opcode ID: 7093ca81c8662e07d7204321fec3cb51206ae1f90d4903dd9e1b42ca283cb20e
                                                                      • Instruction ID: 1480a10798fc3b74a104666754b6c5c2e00f34f6cb6e52578160a0da2bec984d
                                                                      • Opcode Fuzzy Hash: 7093ca81c8662e07d7204321fec3cb51206ae1f90d4903dd9e1b42ca283cb20e
                                                                      • Instruction Fuzzy Hash: FC81C175B501268FCB48EF7CD994A6E7BB2AF88600B1585A9E405DB3B5DB30ED01CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,wq$,wq
                                                                      • API String ID: 0-1895925779
                                                                      • Opcode ID: 3486e48dd4d9136e6b19e31d09105a02aeb29d4d9cb36bf12deb7a5504cbae55
                                                                      • Instruction ID: 42fc541229bd42a4f4235b779d019ada8dcbcc236cd5710fc81597b9b62f283f
                                                                      • Opcode Fuzzy Hash: 3486e48dd4d9136e6b19e31d09105a02aeb29d4d9cb36bf12deb7a5504cbae55
                                                                      • Instruction Fuzzy Hash: F6817C31A045058FDB15DFADC8C8AAAFBB6BF89210B14C66AD505DF371DB31E842CB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (&sq$(wq
                                                                      • API String ID: 0-153982265
                                                                      • Opcode ID: dd9ae91b1f42517bb8eddfeef7672179816c0801c381d6f253d91c80da052aa1
                                                                      • Instruction ID: 6ead1f1f261d29d221b11bfa482f103bc2ab544295315ad242300c44f2fa8b34
                                                                      • Opcode Fuzzy Hash: dd9ae91b1f42517bb8eddfeef7672179816c0801c381d6f253d91c80da052aa1
                                                                      • Instruction Fuzzy Hash: 51719431F002195BDF59EBA9C8506AEBBF6AFC8700F144429E405AB380DF749D46C7D5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xwq$Xwq
                                                                      • API String ID: 0-2617233878
                                                                      • Opcode ID: 4f9e3dcb1956ee8e6e3c5d922e89bc365c7b77dd7861d2cc4a40d9b4f9eb1067
                                                                      • Instruction ID: 6e43b02bcaa3f881d2fd0546a784b5521d2b4683cb4318514980001b8463a8b5
                                                                      • Opcode Fuzzy Hash: 4f9e3dcb1956ee8e6e3c5d922e89bc365c7b77dd7861d2cc4a40d9b4f9eb1067
                                                                      • Instruction Fuzzy Hash: ED31C675B042258BDF194E6F49D42BFA9AABBC4250F14453BD906C33A4DF78CC464671
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (osq
                                                                      • API String ID: 0-609861455
                                                                      • Opcode ID: 2b3762e72a9cc25fb765d14128378af53742fbbd9acc428645ce769412e0c9c8
                                                                      • Instruction ID: 593a5483adeeb8b14906da9f589c6e9a39e83b49ea6b6ca803b60fe2b7063369
                                                                      • Opcode Fuzzy Hash: 2b3762e72a9cc25fb765d14128378af53742fbbd9acc428645ce769412e0c9c8
                                                                      • Instruction Fuzzy Hash: 46126B71A00109DFCB15CF68C9C4AAEBBF2BF88354F258956E9459B3A1D730E881DB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq
                                                                      • API String ID: 0-3165563352
                                                                      • Opcode ID: eba247dd471747aee5421a16992106a86f7a9f64a95ddc7c6c2e06cc3192b5ab
                                                                      • Instruction ID: c1d63928d1394ae841bfd060b5b3b33418cd00965b74349bb215febb26b0d162
                                                                      • Opcode Fuzzy Hash: eba247dd471747aee5421a16992106a86f7a9f64a95ddc7c6c2e06cc3192b5ab
                                                                      • Instruction Fuzzy Hash: A722B474901619CFCB54EF68E894B9DBBB2FF89315F108AAAE809A7354DB305D85CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRsq
                                                                      • API String ID: 0-3165563352
                                                                      • Opcode ID: 5a17fa40afc7ff5c1eb8de6d6e20d88e704bc1c4362440cd462e99e7e1737cb7
                                                                      • Instruction ID: 35b4a41c7052ef8ecf4795a9cdc4fb65770ecbfaaafc15acb979933ca8d3ad80
                                                                      • Opcode Fuzzy Hash: 5a17fa40afc7ff5c1eb8de6d6e20d88e704bc1c4362440cd462e99e7e1737cb7
                                                                      • Instruction Fuzzy Hash: 9622B574901619CFCB54EF68E894B9DBBB2FF89315F108AAAE809A7354DB305D85CF40
                                                                      APIs
                                                                      • LdrInitializeThunk.NTDLL(00000000), ref: 069F82B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4553601503.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_69f0000_00.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: e10f982a650963a9801fe7e630901f4d49c4548391a2902056370f72e50eb463
                                                                      • Instruction ID: ad4e93467ad85055d17a9857ab886f5194d2fabb951bcfa1d4e1de07873259dc
                                                                      • Opcode Fuzzy Hash: e10f982a650963a9801fe7e630901f4d49c4548391a2902056370f72e50eb463
                                                                      • Instruction Fuzzy Hash: B7119A74E111098FDB84DBE8D684AEDBBF5FB88314F159524E904A7641D771E882CB60
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'sq
                                                                      • API String ID: 0-1075809040
                                                                      • Opcode ID: 0c8fb099110941063ca40a8ac208dc40f98f5432ce712f99ff4bb699488c1e00
                                                                      • Instruction ID: b9f8b5996904ea9fb9237b1675e0a94c6dae3bb99e1653a85530f9f0230bb383
                                                                      • Opcode Fuzzy Hash: 0c8fb099110941063ca40a8ac208dc40f98f5432ce712f99ff4bb699488c1e00
                                                                      • Instruction Fuzzy Hash: 5A4139756002159FCB19DF69D888BAE7BB5BF88710F20046AE905CB3B1CB71DD51CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ddc4fcaf6f00f6894770f745bfa28119b1351191f8f2da56fc8d033d5b6d3855
                                                                      • Instruction ID: a448b6c56c4810f8c19e61255beb4c8a890e35c953b24206c6093e31e4374ade
                                                                      • Opcode Fuzzy Hash: ddc4fcaf6f00f6894770f745bfa28119b1351191f8f2da56fc8d033d5b6d3855
                                                                      • Instruction Fuzzy Hash: C7D1FB75A041149FCB05CFACC9C499DBBF6BF88310B2A885AE655AB371C735EC91CB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a87ebbbdb983474acb13dfebd9d3ac4a78929d99458212f4d2da4a6ea4af1519
                                                                      • Instruction ID: 1cf01e9a817409e82298ce51f67154c23ef5b991f0b9e51fde4de8b27ab81aca
                                                                      • Opcode Fuzzy Hash: a87ebbbdb983474acb13dfebd9d3ac4a78929d99458212f4d2da4a6ea4af1519
                                                                      • Instruction Fuzzy Hash: 7D711B347002458FDB15DF2CC8D8AEA7BE5AF89212F1544AAE506DB3B1DB74DC52CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0c526acfcfce95aa2551a0079dad07a7477940b95c1ba5866bef2468b8327f9
                                                                      • Instruction ID: 62850be5909a09c2e0c26075574827251f2268962ad7c04f254b69d0e06b679f
                                                                      • Opcode Fuzzy Hash: f0c526acfcfce95aa2551a0079dad07a7477940b95c1ba5866bef2468b8327f9
                                                                      • Instruction Fuzzy Hash: 2851AF708A574BCFC3442F34E5AC2AA7BB5FB8F723746AE40B01F86021CB315869DA51
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e2008248aa3d4dda648f4115203471a787e18457f33459a8100c14d63d0b2f72
                                                                      • Instruction ID: 0f64957794e4f96775b0521c49348c32c004b42017bf76b92a9ba61d481a776c
                                                                      • Opcode Fuzzy Hash: e2008248aa3d4dda648f4115203471a787e18457f33459a8100c14d63d0b2f72
                                                                      • Instruction Fuzzy Hash: 6D5190708A174BCFC3443F34E5AC2AABBB5FB8F727742AE04B01F85025CB3158659A51
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 400f01d5f77d95b5899620c03072c2c8bbb23a19835c381c9a17f3dc6bd0e99c
                                                                      • Instruction ID: 140e0efbb07f9336e53260b35875627d7daf37d8e0c227f8c71a96c79b9c885d
                                                                      • Opcode Fuzzy Hash: 400f01d5f77d95b5899620c03072c2c8bbb23a19835c381c9a17f3dc6bd0e99c
                                                                      • Instruction Fuzzy Hash: 6A514AB4E002599FCF05CFA8C884ADEBFB2BF8C304F148556EA05AB361D7749955CB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 58bc3f3b205a3faf9e7fa5e7211e8093764c154828302ff5c6dae03b291a031d
                                                                      • Instruction ID: 51963c596302db8f0c9260e5b49297a7246069899f8ffddb3a8a483186ee9bf3
                                                                      • Opcode Fuzzy Hash: 58bc3f3b205a3faf9e7fa5e7211e8093764c154828302ff5c6dae03b291a031d
                                                                      • Instruction Fuzzy Hash: 2D51FFB4D01218CBDB15DFE4D894AEEBBB2FF88300F208529D805AB395DB355985DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ae35ac9823b21b97ca7925e5caea662fe41fc8974514a8448d2c4a54547a00f
                                                                      • Instruction ID: 2dc12c0862f908298487ea9e20386ae5a8641d31bc802e79149a754f24a01d17
                                                                      • Opcode Fuzzy Hash: 3ae35ac9823b21b97ca7925e5caea662fe41fc8974514a8448d2c4a54547a00f
                                                                      • Instruction Fuzzy Hash: 3F519474E01208DFDB58DFA9D9849DDBBF2BF89310F24816AE419AB365DB30A941CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c472c304121e131fde9a146f3a8e20ceb3c2dfedc820c41926105b6f44a85ffa
                                                                      • Instruction ID: 2068e190b7b92dc98bdd43dd999368bb7143ea0be76f6126f7ccbd54c0d0fb37
                                                                      • Opcode Fuzzy Hash: c472c304121e131fde9a146f3a8e20ceb3c2dfedc820c41926105b6f44a85ffa
                                                                      • Instruction Fuzzy Hash: 2C415A7590132ACFDB04BFA4D56C7EEBBB1EB8A716F408829D101672E4CB780A44CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0f1895ac7d2cda9a7cd9863c18da94f26e3a2fa3cbb83bc4428afb31de753c2
                                                                      • Instruction ID: 49102a371f7ca8b5779eecf368a81f26050e46000951c5a21fec8538f1117f31
                                                                      • Opcode Fuzzy Hash: f0f1895ac7d2cda9a7cd9863c18da94f26e3a2fa3cbb83bc4428afb31de753c2
                                                                      • Instruction Fuzzy Hash: C751A474E01218CFCB48DFA9D49099DBBF2FF89315B20946AE805AB324DB31AC41CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 03000a137a0d4e6c6295caccf6ae865a28008fc569a7ebd9af443f559e0ec584
                                                                      • Instruction ID: 061028272e0cdc4676a5ee6ae46fb1e71ce83fd29251132433da19969fc1ba35
                                                                      • Opcode Fuzzy Hash: 03000a137a0d4e6c6295caccf6ae865a28008fc569a7ebd9af443f559e0ec584
                                                                      • Instruction Fuzzy Hash: D6415471E4021A9BDF54DFAAC880ADFBBF5AF88700F148129E415BB240EB70A945CBD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3b17e1c667a55d3c3c92eea81acd147b6121e54113f02b9808ea072d8bbaf0f6
                                                                      • Instruction ID: 869bbf7576a2cb7c4c6961e67d2f246d40aaa469e38d423687cd8c91ad1cd921
                                                                      • Opcode Fuzzy Hash: 3b17e1c667a55d3c3c92eea81acd147b6121e54113f02b9808ea072d8bbaf0f6
                                                                      • Instruction Fuzzy Hash: B841EFB5E00219CFCB14EFA9D584BEEBBB1BF49304F20852AD415AB394DB745946CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7bd683b05bd9b0b8e1884022d953ff5dcc3ff02e776146132015cf4f430d7013
                                                                      • Instruction ID: df03a16139c61d26a37a3850064eed564c4f05c4b66998210e3f730fe9b8cb51
                                                                      • Opcode Fuzzy Hash: 7bd683b05bd9b0b8e1884022d953ff5dcc3ff02e776146132015cf4f430d7013
                                                                      • Instruction Fuzzy Hash: 37415674D04248CFCB04DFE8D4C46EDBBB2FB49309F2095AAD41AA7264D7749882CF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 55cd3e52bba65d029e3f754f3fde9782280dd2e503ba8089712589165f1d4551
                                                                      • Instruction ID: c5d3e4858f86d2ae84694371d35faaa073755dd7f86bc388a4fed3af8cbb6887
                                                                      • Opcode Fuzzy Hash: 55cd3e52bba65d029e3f754f3fde9782280dd2e503ba8089712589165f1d4551
                                                                      • Instruction Fuzzy Hash: 8841EEB4E002188FCB04EFA9D584BEEBBF2BF88304F10842AD415A7394EB745A46CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5de47bc5e4aa8fdff8bf236fc6075db321ab5f89c038e0d61e0d1d51b06d7eb8
                                                                      • Instruction ID: 04bd47457b5a223345ab2cb7a39164e53506d7f786cd79411bd23fb5ab41603f
                                                                      • Opcode Fuzzy Hash: 5de47bc5e4aa8fdff8bf236fc6075db321ab5f89c038e0d61e0d1d51b06d7eb8
                                                                      • Instruction Fuzzy Hash: DC41EF71A00208DFCB118F68C884BABBBF6EF44304F05882AE8559B361DB74DD55CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36d39b0aba984c4abc520b00b4998197e05f29b23dae7382027e4c18ecac6285
                                                                      • Instruction ID: c0a08f7f36efe15881c34ad5e8579d44ed90f0d49b2354e87d2fbfb2e706c002
                                                                      • Opcode Fuzzy Hash: 36d39b0aba984c4abc520b00b4998197e05f29b23dae7382027e4c18ecac6285
                                                                      • Instruction Fuzzy Hash: 09414474D01208CFCB00DFE8D4D46EDBBB2FB49319F2095AAE419A72A4D7359882CF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dcacee8c814219860a13e0bb2d6a75550ae4e281ed5d373967985400502e8cad
                                                                      • Instruction ID: 854a1dc2a91c3dcf841689aadc2ecd8c741e108194abbd74f741d57dad1ac2a4
                                                                      • Opcode Fuzzy Hash: dcacee8c814219860a13e0bb2d6a75550ae4e281ed5d373967985400502e8cad
                                                                      • Instruction Fuzzy Hash: E2411770D01208CBDB04DFEAD584AEEFBB2BB89304F14D56AD418A7264DB759882CF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dfaf61e03f31988a9b33e8653480b17b00c5f8f53bb4e1065f905c12ea8d49c8
                                                                      • Instruction ID: 1dd63f219ddb1a3462bbf8bbd39100cb33fc27378789b97fe6244877922dc794
                                                                      • Opcode Fuzzy Hash: dfaf61e03f31988a9b33e8653480b17b00c5f8f53bb4e1065f905c12ea8d49c8
                                                                      • Instruction Fuzzy Hash: 9531C3717041099FCF029FA8D884AAF7BA6FF48310F044815F9468B392CB35CD21DBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b632ba5243b539b8570f2a002cda65e2b42a9e9debcfb1d14c1341889620c49b
                                                                      • Instruction ID: 4d3feb35ad5edfddbfdf1e59402e3a1e2f583b6d7ea5da00ec623ca4690a696b
                                                                      • Opcode Fuzzy Hash: b632ba5243b539b8570f2a002cda65e2b42a9e9debcfb1d14c1341889620c49b
                                                                      • Instruction Fuzzy Hash: FB319235B042449FCB159B78D894BEE7BB6BF8C310F244969E506E7391CE359C12CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11a1ccf983a6ce6baa6b8c77a217ae3d7b37ef11f35d3b1a5b99f2042e6b1958
                                                                      • Instruction ID: adeec1dca40b6306eb000f738f8a2349f0d1ad5521bc75366bea370461ce7973
                                                                      • Opcode Fuzzy Hash: 11a1ccf983a6ce6baa6b8c77a217ae3d7b37ef11f35d3b1a5b99f2042e6b1958
                                                                      • Instruction Fuzzy Hash: 5E318E7190135ACFDB04AFA4D46C7EEBBB1EF8A315F008969D1116B2E5CB780A44CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9dc17ed1e18bc029c79f171ec40cf2e67dafa865670a69da5c1585dfe3ddb13f
                                                                      • Instruction ID: 2c95eabc2b007971b836443a932257b4eb16376e82c654da1805b02eb3317b12
                                                                      • Opcode Fuzzy Hash: 9dc17ed1e18bc029c79f171ec40cf2e67dafa865670a69da5c1585dfe3ddb13f
                                                                      • Instruction Fuzzy Hash: 2421D3343042014BEB26163D89D8ABE7697AFC861AB14447BD506CB7F6EE35DC42A7A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5581e4dae458d27c0386895ab2c203e88e5d3fb6ce568cfff6dcc46c28e27e1c
                                                                      • Instruction ID: a5b9121fa8380eacf05c1a063e4628d148f8d3688fa6482c6c91c10f6e1b0320
                                                                      • Opcode Fuzzy Hash: 5581e4dae458d27c0386895ab2c203e88e5d3fb6ce568cfff6dcc46c28e27e1c
                                                                      • Instruction Fuzzy Hash: F831B0716042458FCB15CF69C984B9ABFF2EF89314F04859AE6549B3B2D330E850CB71
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 81bc56425815cff686a0d4ee7b5e288e3421491296a4c942d944bd464bc2ac1a
                                                                      • Instruction ID: 8024b4a516110ae7615adf55834df068390c1c000bdd7c416a9d88b615de53ac
                                                                      • Opcode Fuzzy Hash: 81bc56425815cff686a0d4ee7b5e288e3421491296a4c942d944bd464bc2ac1a
                                                                      • Instruction Fuzzy Hash: ED21D3383042054BEB25163989D4BBF3697AFC471AF14847AD502CB7E9EE35DC42A3A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5283943f580b1ad9d8a66fea0c3f981fb1ae708a1f3ba8a0c6b95298311de57f
                                                                      • Instruction ID: 2bc5c3634599f6a8eeb5163490be3c3dab4501fa3591bd1c5d754098c7da3a06
                                                                      • Opcode Fuzzy Hash: 5283943f580b1ad9d8a66fea0c3f981fb1ae708a1f3ba8a0c6b95298311de57f
                                                                      • Instruction Fuzzy Hash: 6D315074A005058FCB04DF69C8889AEBBB7BF88350B258555E555973B1CB359C52CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 41ef2db22845605a0b2fb7c1e2908e79809d1f0253cb75952fc9a590ea61cbe8
                                                                      • Instruction ID: 4005a107c5824da0eb2c48bbc7b1b0bf0196abc4f7d4fe60bbe0a03b1cc622e8
                                                                      • Opcode Fuzzy Hash: 41ef2db22845605a0b2fb7c1e2908e79809d1f0253cb75952fc9a590ea61cbe8
                                                                      • Instruction Fuzzy Hash: 7E217AB0E042098BDB08DFAAD9446EEBBB6EFC9300F04E066D514B72A4DB7195468B60
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9a8934018ed7a36b7957d41da9b38390889e968eab21b0736744977052cf3c06
                                                                      • Instruction ID: 4998185e60495d2d1639f93ec7ea52009215953d27acdbf09b23433db66a1b7f
                                                                      • Opcode Fuzzy Hash: 9a8934018ed7a36b7957d41da9b38390889e968eab21b0736744977052cf3c06
                                                                      • Instruction Fuzzy Hash: 4821E5B5A00215AFCF18DB24C4809EF77B6EB9D250B10C859DA09CB354DA31EE46CBE1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 251ae30c41a0278e43e9bb5266000150d3314bd2fdcbe579ba6e9c8fd107a8c3
                                                                      • Instruction ID: fbeb98dc2cccd1abd293820a60262f05419ffc246dd46e35d2a98e380d403559
                                                                      • Opcode Fuzzy Hash: 251ae30c41a0278e43e9bb5266000150d3314bd2fdcbe579ba6e9c8fd107a8c3
                                                                      • Instruction Fuzzy Hash: E721C335700A118FD7299A29D4D466FF7A6FB88751B144A6AE906DF364CE31DC02CBD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4532357758.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_f1d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 978a035c0f894df723f157a34d5f1acbc8404e6afe70c677d78bb368113bb5d3
                                                                      • Instruction ID: e4143b70526b2fb0ab1e8852b55b85f7975bf4ccc0b0e91fd61968001c9ab028
                                                                      • Opcode Fuzzy Hash: 978a035c0f894df723f157a34d5f1acbc8404e6afe70c677d78bb368113bb5d3
                                                                      • Instruction Fuzzy Hash: 362137B1504204EFDB14CF24C9C0B66BB75FB88324F20C96DE8494B245C736D886EA61
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 728943beba099c2df8f0a38bee4c12b6373b8d2d4c25be3de1e1c7a2141a2b5b
                                                                      • Instruction ID: 55baa45ec05540482c4183a83d4d94a66244c05844c7023cd40bcff7734b5fdf
                                                                      • Opcode Fuzzy Hash: 728943beba099c2df8f0a38bee4c12b6373b8d2d4c25be3de1e1c7a2141a2b5b
                                                                      • Instruction Fuzzy Hash: 28112B327082541FCF866B789C146AF3E97EFC9350F04442AE906DB382DE794D1197E6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 85d2d74e0abdcfa71f83604e52c2d04cec5774b3f98267889e0d29ead10bdc4e
                                                                      • Instruction ID: 2eb1bc1e896cc8e8a47d82cc669b01dc86c59c3c371d3106418eb4e0b9bde4c1
                                                                      • Opcode Fuzzy Hash: 85d2d74e0abdcfa71f83604e52c2d04cec5774b3f98267889e0d29ead10bdc4e
                                                                      • Instruction Fuzzy Hash: 2121F9717081499FDB129F68D4947AB7FA6EF44314F04486AF4468B392CB38CC26D7E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 74c3c27c9deed53225e8f92a2a6740e9b93f01fae756ce6e026f8643a810201a
                                                                      • Instruction ID: 7d212f51aba4bade02dac41c6dcd48cb38ffe835eeeb466d0dc6efeca871c934
                                                                      • Opcode Fuzzy Hash: 74c3c27c9deed53225e8f92a2a6740e9b93f01fae756ce6e026f8643a810201a
                                                                      • Instruction Fuzzy Hash: A7110130704A118FD71A9A28D8E456FBBA6AF8925030849AAE942DF361CE31DC128B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bd8a20272bb2c5a0af75e1874a120f639d790dc51bf92045ca98f7ff78dbe089
                                                                      • Instruction ID: bd22bc2a1832202a270db346d88efe699302013205d888f1de2f5a2e3ec9aba5
                                                                      • Opcode Fuzzy Hash: bd8a20272bb2c5a0af75e1874a120f639d790dc51bf92045ca98f7ff78dbe089
                                                                      • Instruction Fuzzy Hash: A01158B0E006088BDB08DFAAC8446DEFBF2AFCD305F08D466D418A7265DB7054468F64
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 86b153b7cf859cf4d2ef65c7a6c0bc5bcdc6318685b509c6890be88ff3c4a683
                                                                      • Instruction ID: e7ad4f5af19b4ef3e166f8922c86edfa9e0042392e044c144e31dbf2a72ad719
                                                                      • Opcode Fuzzy Hash: 86b153b7cf859cf4d2ef65c7a6c0bc5bcdc6318685b509c6890be88ff3c4a683
                                                                      • Instruction Fuzzy Hash: 1511E530B042548FD7052B795C646BBBFABAFDA210B144976E646C3286CE388C478771
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 94ed68770107381a2368ff9c4bdeb3beb40ec68b49a1e3b59098de2f6a2394cc
                                                                      • Instruction ID: 8e0ffc987b8f8e6826944a47c86c79844a51dc91b57e31c441cf160fcdf82537
                                                                      • Opcode Fuzzy Hash: 94ed68770107381a2368ff9c4bdeb3beb40ec68b49a1e3b59098de2f6a2394cc
                                                                      • Instruction Fuzzy Hash: 9E11D2B1A002459FDF14CF69C8C0BDABFB2AF84318F04865AD6549B2A2D331A850CBB4
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e20aaf7b623ccb15877737b897ddfedd06c85700039f2a0ae916858deb162fbc
                                                                      • Instruction ID: 32f67f8236801557784fa627c560667ecd1c87006a61b89fab0a28e5402244d6
                                                                      • Opcode Fuzzy Hash: e20aaf7b623ccb15877737b897ddfedd06c85700039f2a0ae916858deb162fbc
                                                                      • Instruction Fuzzy Hash: D0214DB09002499FDB45EFB8D99479EBFF1FF85304F01D5AAD004AB265EB305A46DB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 55ea8431e313a9a2cbfacc1bc1953739e98427fa8139fb8d5b0e9dbfc0aacb27
                                                                      • Instruction ID: 20d8bbe1324465a51f327a4733ecaac95c1ce096c79d688dedf7e0b834b4c68d
                                                                      • Opcode Fuzzy Hash: 55ea8431e313a9a2cbfacc1bc1953739e98427fa8139fb8d5b0e9dbfc0aacb27
                                                                      • Instruction Fuzzy Hash: 45117C31900208DFCB24CF58C988FEABBF5EB48310F05856EE4599B261E375D955CFA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b8ea117826048b25a4ef9b2c7711ba40f23f91c377278ce5e851deda2b5ed6ee
                                                                      • Instruction ID: 8dca5f5e9c4f6952f199e9abede6ca5746996817ecf2f8c8db5c0bc518306866
                                                                      • Opcode Fuzzy Hash: b8ea117826048b25a4ef9b2c7711ba40f23f91c377278ce5e851deda2b5ed6ee
                                                                      • Instruction Fuzzy Hash: B521C4B4C0561A8FCB40EFA8D8955EDBFF1FF49300F10466AD915B7220EB305A99CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d832ff942ed301dbe81907de36caca61954a39885b2dede37662dc55e90b045e
                                                                      • Instruction ID: f684ad6e9da0e26c0e098370615fea89a1217391cf46a860be6ed9cc5eafd845
                                                                      • Opcode Fuzzy Hash: d832ff942ed301dbe81907de36caca61954a39885b2dede37662dc55e90b045e
                                                                      • Instruction Fuzzy Hash: 451144B2800349DFCB10DF9AC944BDEBBF4EB48320F148419E514A7210C339A950DFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d5adfa71c43383e868ff933a5f55ea6a921074b124fcaa169c6e6f1002b77dfd
                                                                      • Instruction ID: f2a3fd9857b8b6b17f012d3b1fd426ba42bd3d42a871815c7c4c6fb61ba2da74
                                                                      • Opcode Fuzzy Hash: d5adfa71c43383e868ff933a5f55ea6a921074b124fcaa169c6e6f1002b77dfd
                                                                      • Instruction Fuzzy Hash: A51126B6800249DFCB10CF9AC945BDEBFF4EF48320F148419E518A7250C379A554DFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5aa4a2140df16e98cf4c1612fc7f95e414e14f0036821cda632829cba2935509
                                                                      • Instruction ID: 153ce45952baf4adf094d4143fec9e984749b0213cb3c2b914f287457a8ddac7
                                                                      • Opcode Fuzzy Hash: 5aa4a2140df16e98cf4c1612fc7f95e414e14f0036821cda632829cba2935509
                                                                      • Instruction Fuzzy Hash: AB110C78F4015A8FDB00DBECD950BAEBBB6AF49315F019065F908AB349E734D9868B50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3f809f0b15b424aa32a4e278216a824e2b8b4e51fafb6daa3442dee830c6685f
                                                                      • Instruction ID: fa35b07a379e41874058495a3b278387b9a96f8abe8c72f9a7fbb976f4c1cab1
                                                                      • Opcode Fuzzy Hash: 3f809f0b15b424aa32a4e278216a824e2b8b4e51fafb6daa3442dee830c6685f
                                                                      • Instruction Fuzzy Hash: AA114CB0D001099FDB44EFB8D98479EBBF1FB84304F00D5AAD014AB365EB305A459B81
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4532357758.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_f1d000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                      • Instruction ID: 2c378156e3ea02873ae4bb0bf7791294037841cc92d727c3d329135800a7c9c4
                                                                      • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                      • Instruction Fuzzy Hash: 20110075904240DFDB15CF10C5C0B15BB72FB48324F24C6A9D8494B256C33AD88ADF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4af5fe99f3d542235ae19c81b36477100b7250f3b5137521e8c98ccd29ec7e67
                                                                      • Instruction ID: fc0c8a06d02f78ad4b8dc47c148951efc5c1bc9b6c07e36e08f3abe7c74a6c03
                                                                      • Opcode Fuzzy Hash: 4af5fe99f3d542235ae19c81b36477100b7250f3b5137521e8c98ccd29ec7e67
                                                                      • Instruction Fuzzy Hash: 542117B4D056098FCB01DFA8D4945EEBFB0FF49304F10466AE805B7260EB305A55CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ec999cd9365ea21c148338f1f73ae3d2d1ef9d4b5700b6fc4128e722ab65c09e
                                                                      • Instruction ID: adad806d7e49f02388266f261dc7a71183a00834ee8ce8ce76a6ddb61399e98b
                                                                      • Opcode Fuzzy Hash: ec999cd9365ea21c148338f1f73ae3d2d1ef9d4b5700b6fc4128e722ab65c09e
                                                                      • Instruction Fuzzy Hash: F4012D72B040445FDB028E68AC106EF7FD7DFC9351B18846AF508CB290CD758C2297A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 67151f99d2b56b5a96995b405191759b019fdb642616912b2aa8f9c8f38aaaef
                                                                      • Instruction ID: 8ccd838245037aeecef143785289451887fe47f6071fb3bbb8c53b16f1691779
                                                                      • Opcode Fuzzy Hash: 67151f99d2b56b5a96995b405191759b019fdb642616912b2aa8f9c8f38aaaef
                                                                      • Instruction Fuzzy Hash: 9D017175E401218FC790EF7CE5486AE7BF4EF886117110669E405DB314DB31CD05CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4db067c67f1a375d15430f11943a81f98c42530d464e4d0cd7446035f58f10cc
                                                                      • Instruction ID: d98d3df8291c957be432cc05c260f2acc0d584059ba6b410edce50e3ed8ae54b
                                                                      • Opcode Fuzzy Hash: 4db067c67f1a375d15430f11943a81f98c42530d464e4d0cd7446035f58f10cc
                                                                      • Instruction Fuzzy Hash: 20011D71E4022A8FCF44EFB9C8446EEB7F5BF48200F10856AD415E7264E7345901CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8ee3bfe2bbc3060c25095deb0f413f25b3648c67387c77f570b15d2bcd4aedef
                                                                      • Instruction ID: 99a4ee70967edb6556f67bf6e24ca658608088f9e8b272489d5f522e51d7b1cf
                                                                      • Opcode Fuzzy Hash: 8ee3bfe2bbc3060c25095deb0f413f25b3648c67387c77f570b15d2bcd4aedef
                                                                      • Instruction Fuzzy Hash: 07E0D8B0D04209DBC7059F9DED086EAF7B9EBCA314F009075E108E72A1DB7461559AA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e948de3ca9c92c1679c05a24962d6c2b13bacd8c8d911426d8100bf7bd34f3b2
                                                                      • Instruction ID: 7cac280a3777512f103b79a3c32b14ff47495a87ef33857d9cdcbb78d1bae28b
                                                                      • Opcode Fuzzy Hash: e948de3ca9c92c1679c05a24962d6c2b13bacd8c8d911426d8100bf7bd34f3b2
                                                                      • Instruction Fuzzy Hash: 9EE02230D08248CECB048FA9A8586EEBBB1FBCA300F0095B9D10163160D7B04109CE50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b201af8f626f3964d5e3673d1d0c0e5bef1184bedbd866e9ff0a6a1ccc194ff2
                                                                      • Instruction ID: d3052411cd35cba92357a607e517a0fcd3b685127f68856805cddcffd07d70e4
                                                                      • Opcode Fuzzy Hash: b201af8f626f3964d5e3673d1d0c0e5bef1184bedbd866e9ff0a6a1ccc194ff2
                                                                      • Instruction Fuzzy Hash: 02E0DFD2C08140CBE3118BEAA8960F9BF30C9E3215784A4D7D08A8B131D628E207AB21
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e704fbbdbfc67e0f9680467023741056a99153e1eb2a05f9ef0fa51f328fc3a9
                                                                      • Instruction ID: b3951e6865d7b5b8716d45dd5642e0959885e589fc69552bdf47ab0b96f14270
                                                                      • Opcode Fuzzy Hash: e704fbbdbfc67e0f9680467023741056a99153e1eb2a05f9ef0fa51f328fc3a9
                                                                      • Instruction Fuzzy Hash: 4FE02B31D2022B86CF14D7B4EC404FEFB35EED2260B614666D41033000EB30165EC7A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 82a8cc9ece53f2876eebb2e116eb360fff686114f98541ab894a313125bbf72d
                                                                      • Instruction ID: 2be7e9a532f9ddf656837a3c96b66edeb62f39ef54a242ce2bd4e50450fd548f
                                                                      • Opcode Fuzzy Hash: 82a8cc9ece53f2876eebb2e116eb360fff686114f98541ab894a313125bbf72d
                                                                      • Instruction Fuzzy Hash: 10D02B31D2022F83CF04E7A5DC004DFF738EEC2260B514622D41033000FB302658C2E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction ID: 9bafaace35aa34fda337adb96f9acd01efbdf80da04e4bf24a5a9622ce3a55c6
                                                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction Fuzzy Hash: 82C0123720D1282AA629108EBC80AE3BB8CC2C12B4A250137F91CA3220A8529C8101B8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1d3fa30db23162d4656de9977f3c397d67a75b05dbde66129eff234be4f44868
                                                                      • Instruction ID: a2806af0a0bd62cfc420ed56dfcdfcee871c0fcc09820dd4c7bb05c451d9f236
                                                                      • Opcode Fuzzy Hash: 1d3fa30db23162d4656de9977f3c397d67a75b05dbde66129eff234be4f44868
                                                                      • Instruction Fuzzy Hash: 95D0677BB410189FCB049F98E8809DDB7B6FB9C221B048516EA15E3261C6319921DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 68df1bfec5820aafa0b256514c5addddd8a3810c8af9497756c34ed43ff9e8f8
                                                                      • Instruction ID: e56214c309308babef51eb74bf4dd2f4ae34c4f438862a83dfe81b62dfe76d5f
                                                                      • Opcode Fuzzy Hash: 68df1bfec5820aafa0b256514c5addddd8a3810c8af9497756c34ed43ff9e8f8
                                                                      • Instruction Fuzzy Hash: 7AC01270500B0987C505FBB5FA85655371AB7C0308F406F14B0094611ADE7C2D996692
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f100052b9ed556d86f67680c517630bd10f6c9d0715940fd3654abe252524e34
                                                                      • Instruction ID: a801336ae6b9aded69b335cd1bbef29f9c0ccbbb898262fd33cd7395f554f113
                                                                      • Opcode Fuzzy Hash: f100052b9ed556d86f67680c517630bd10f6c9d0715940fd3654abe252524e34
                                                                      • Instruction Fuzzy Hash: 85D02230900B0986CA15FBB0FAC26D83B23FBC0308F006F14F0064610BCE791C8AAB42
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$0oVp$LjVp$LjVp$LjVp$LjVp$LjVp$LjVp$LjVp$LjVp$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq
                                                                      • API String ID: 0-1005420056
                                                                      • Opcode ID: eebd30889428d4ffc7614ffe4a145c669ec9c9c351f52c1f9b2ecd7d302d2fb2
                                                                      • Instruction ID: 6e289b40dfcd5901a18cedc4dc6b54ba40a64d222c9958ce850c51414a6d440d
                                                                      • Opcode Fuzzy Hash: eebd30889428d4ffc7614ffe4a145c669ec9c9c351f52c1f9b2ecd7d302d2fb2
                                                                      • Instruction Fuzzy Hash: E032C5B4E00229CFDB68DFA9C984B9DBBB2BF89304F1081A9D409A7355DB755E84CF10
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$0oVp$Hwq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq
                                                                      • API String ID: 0-3469494655
                                                                      • Opcode ID: 7444a78c054283fb761a5dc8182c4697d354266465697ae78cc5b92f61b564d9
                                                                      • Instruction ID: 42e1b9244e39d46d5bb8b37c5e56b38e6c7ba48915c745776be70a9c83a26e43
                                                                      • Opcode Fuzzy Hash: 7444a78c054283fb761a5dc8182c4697d354266465697ae78cc5b92f61b564d9
                                                                      • Instruction Fuzzy Hash: A512F5B4E002188FDB68DFA9D994BDDBBB2BF89300F1080A9D449AB355DB355E81DF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4554652700.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_6a20000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$0oVp$Hwq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq$PHsq
                                                                      • API String ID: 0-3469494655
                                                                      • Opcode ID: 87133bdf79dedaf08977bfe045eb0e99dcee7210f31dca3abe6b464a9e819b63
                                                                      • Instruction ID: a80ef01d8cf2ffa77fba9c1e60d6f61ffada3b841c1396cf14ccf1f18086c213
                                                                      • Opcode Fuzzy Hash: 87133bdf79dedaf08977bfe045eb0e99dcee7210f31dca3abe6b464a9e819b63
                                                                      • Instruction Fuzzy Hash: 0412E4B4E002188FDB68DFA9C984BDDBBB2BF89304F1080A9D449A7355DB355E85DF10
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xwq$Xwq$Xwq$Xwq
                                                                      • API String ID: 0-1964751375
                                                                      • Opcode ID: 5e972b91765c93ad291df01c4cb58b67a7c495c1dd05864b7d18c8c17e3c6e22
                                                                      • Instruction ID: a21bef4e0191b7b306a20ba93e1b3ca9188b9793985764abfbe90b6782e22566
                                                                      • Opcode Fuzzy Hash: 5e972b91765c93ad291df01c4cb58b67a7c495c1dd05864b7d18c8c17e3c6e22
                                                                      • Instruction Fuzzy Hash: FA71D570E042198FDF299BB8C890BEFBBB5BF88300F10456AD515A7361DB709D85CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.4535176790.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_14b0000_00.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \;sq$\;sq$\;sq$\;sq
                                                                      • API String ID: 0-2251010532
                                                                      • Opcode ID: cfd772751aeb6c015f9251546f4c5bc61fdc177de1fbbb6c57914f56e40e5637
                                                                      • Instruction ID: e808027fca43615fa8f771cf327dc85dd775ebed40ee76b121ab7e978d24674d
                                                                      • Opcode Fuzzy Hash: cfd772751aeb6c015f9251546f4c5bc61fdc177de1fbbb6c57914f56e40e5637
                                                                      • Instruction Fuzzy Hash: 21017CB17140149FDB24CA2EC4C49A6B7F6BFD8660726817BE601CB3B1DA72DC4297A0