Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
order6566546663.exe

Overview

General Information

Sample name:order6566546663.exe
Analysis ID:1592378
MD5:71bd2f038e92ae0e3b95a7567511458e
SHA1:816293b2472e394288fc9c91bdff206ab8ef52e2
SHA256:13ba4ee3d7accddd8dbce8e4bc4a623e0b7bf30350fe9d58f1c269cd744bb835
Tags:exeSnakeKeyloggeruser-threatcat_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • order6566546663.exe (PID: 4512 cmdline: "C:\Users\user\Desktop\order6566546663.exe" MD5: 71BD2F038E92AE0E3B95A7567511458E)
    • order6566546663.exe (PID: 6976 cmdline: "C:\Users\user\Desktop\order6566546663.exe" MD5: 71BD2F038E92AE0E3B95A7567511458E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1494c:$a1: get_encryptedPassword
      • 0x14c38:$a2: get_encryptedUsername
      • 0x14758:$a3: get_timePasswordChanged
      • 0x14853:$a4: get_passwordField
      • 0x14962:$a5: set_encryptedPassword
      • 0x15fc5:$a7: get_logins
      • 0x15f28:$a10: KeyLoggerEventArgs
      • 0x15b93:$a11: KeyLoggerEventArgsEventHandler
      00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x182e0:$x1: $%SMTPDV$
      • 0x18346:$x2: $#TheHashHere%&
      • 0x199af:$x3: %FTPDV$
      • 0x19aa3:$x4: $%TelegramDv$
      • 0x15b93:$x5: KeyLoggerEventArgs
      • 0x15f28:$x5: KeyLoggerEventArgs
      • 0x199d3:$m2: Clipboard Logs ID
      • 0x19bf3:$m2: Screenshot Logs ID
      • 0x19d03:$m2: keystroke Logs ID
      • 0x19fdd:$m3: SnakePW
      • 0x19bcb:$m4: \SnakeKeylogger\
      00000000.00000002.2027290884.0000000004E50000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      Click to see the 15 entries
      SourceRuleDescriptionAuthorStrings
      0.2.order6566546663.exe.4e50000.5.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      0.2.order6566546663.exe.3853f90.2.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      0.2.order6566546663.exe.3853f90.2.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4906b:$x1: In$J$ct0r
      0.2.order6566546663.exe.4e50000.5.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4906b:$x1: In$J$ct0r
      0.2.order6566546663.exe.3908e20.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 34 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-16T02:24:59.421667+010028033053Unknown Traffic192.168.2.549706104.21.48.1443TCP
        2025-01-16T02:25:09.880761+010028033053Unknown Traffic192.168.2.549710104.21.48.1443TCP
        2025-01-16T02:25:24.186998+010028033053Unknown Traffic192.168.2.549764104.21.16.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-16T02:24:57.246624+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
        2025-01-16T02:24:58.653281+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
        2025-01-16T02:25:00.152941+010028032742Potentially Bad Traffic192.168.2.549707132.226.247.7380TCP
        2025-01-16T02:25:09.309392+010028032742Potentially Bad Traffic192.168.2.549709132.226.247.7380TCP
        2025-01-16T02:25:23.559296+010028032742Potentially Bad Traffic192.168.2.549711132.226.247.7380TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: order6566546663.exeAvira: detected
        Source: 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
        Source: order6566546663.exeVirustotal: Detection: 51%Perma Link
        Source: order6566546663.exeReversingLabs: Detection: 39%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: order6566546663.exeJoe Sandbox ML: detected

        Location Tracking

        barindex
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: order6566546663.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49705 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49706 version: TLS 1.0
        Source: order6566546663.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: order6566546663.exe, 00000000.00000002.2027706449.0000000004F60000.00000004.08000000.00040000.00000000.sdmp, order6566546663.exe, 00000000.00000002.2026923988.0000000002801000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 02C8F1F6h1_2_02C8F007
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 02C8FB80h1_2_02C8F007
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_02C8E528
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE1A38h1_2_06AE1620
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE02F1h1_2_06AE0040
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEE301h1_2_06AEE058
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE1471h1_2_06AE11C0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AECD49h1_2_06AECAA0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AED1A1h1_2_06AECEF8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE1A38h1_2_06AE1617
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEF8B9h1_2_06AEF610
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEFD11h1_2_06AEFA68
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEC8F1h1_2_06AEC648
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEDA51h1_2_06AED7A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AED5F9h1_2_06AED350
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE0751h1_2_06AE04A0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEE759h1_2_06AEE4B0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEB791h1_2_06AEB4E8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEDEA9h1_2_06AEDC00
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEF461h1_2_06AEF1B8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEC041h1_2_06AEBD98
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEC499h1_2_06AEC1F0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEEBB1h1_2_06AEE908
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE0BB1h1_2_06AE0900
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE1A38h1_2_06AE1966
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AE1011h1_2_06AE0D60
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEF009h1_2_06AEED60
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06AEBBE9h1_2_06AEB940
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B18945h1_2_06B18608
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B16171h1_2_06B15EC8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06B136CE
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B158C1h1_2_06B15618
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B15D19h1_2_06B15A70
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06B133B8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06B133A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B16E79h1_2_06B16BD0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B165C9h1_2_06B16320
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B16A21h1_2_06B16778
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B17751h1_2_06B174A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B10741h1_2_06B10498
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B10B99h1_2_06B108F0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B172FAh1_2_06B17050
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B102E9h1_2_06B10040
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B18459h1_2_06B181B0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B15441h1_2_06B15198
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B17BA9h1_2_06B17900
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B18001h1_2_06B17D58
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 4x nop then jmp 06B10FF1h1_2_06B10D48

        Networking

        barindex
        Source: Yara matchFile source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPE
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
        Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
        Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
        Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 132.226.247.73:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49709 -> 132.226.247.73:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.247.73:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 132.226.247.73:80
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49764 -> 104.21.16.1:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49705 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49706 version: TLS 1.0
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002EF4000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: order6566546663.exe, 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
        Source: order6566546663.exe, 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
        Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443

        System Summary

        barindex
        Source: 0.2.order6566546663.exe.4e50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.order6566546663.exe.3853f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.order6566546663.exe.3853f90.2.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.order6566546663.exe.4e50000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.order6566546663.exe.280f744.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.order6566546663.exe.2811f84.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 00000000.00000002.2027290884.0000000004E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
        Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: initial sampleStatic PE information: Filename: order6566546663.exe
        Source: C:\Users\user\Desktop\order6566546663.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 0_2_00E0AE480_2_00E0AE48
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8B3281_2_02C8B328
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8F0071_2_02C8F007
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8C1931_2_02C8C193
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C861481_2_02C86148
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8C7511_2_02C8C751
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C867301_2_02C86730
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8C4701_2_02C8C470
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C84AD91_2_02C84AD9
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8CA311_2_02C8CA31
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8BBD31_2_02C8BBD3
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8BEB71_2_02C8BEB7
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8CD101_2_02C8CD10
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8B4F31_2_02C8B4F3
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C835701_2_02C83570
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8E5281_2_02C8E528
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_02C8E5231_2_02C8E523
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE84601_2_06AE8460
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE38701_2_06AE3870
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE00401_2_06AE0040
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE0581_2_06AEE058
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE7D901_2_06AE7D90
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE11C01_2_06AE11C0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AECAA01_2_06AECAA0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AECA9D1_2_06AECA9D
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AECEF81_2_06AECEF8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AECEF51_2_06AECEF5
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEC6381_2_06AEC638
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEF6001_2_06AEF600
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEF6101_2_06AEF610
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEFA681_2_06AEFA68
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEC6481_2_06AEC648
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEFA591_2_06AEFA59
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AED7A81_2_06AED7A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AED7981_2_06AED798
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE73E81_2_06AE73E8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE73E71_2_06AE73E7
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEDBF11_2_06AEDBF1
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AED3491_2_06AED349
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AED3501_2_06AED350
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE04A01_2_06AE04A0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE4A01_2_06AEE4A0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE4B01_2_06AEE4B0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE04901_2_06AE0490
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEB4E81_2_06AEB4E8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEB4E51_2_06AEB4E5
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE08FC1_2_06AE08FC
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE00331_2_06AE0033
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEDC001_2_06AEDC00
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE386F1_2_06AE386F
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE0491_2_06AEE049
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE11BB1_2_06AE11BB
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEF1B81_2_06AEF1B8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEF1B51_2_06AEF1B5
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEBD881_2_06AEBD88
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEBD981_2_06AEBD98
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEC1E01_2_06AEC1E0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEC1F01_2_06AEC1F0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEB9301_2_06AEB930
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE9081_2_06AEE908
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE09001_2_06AE0900
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEE9011_2_06AEE901
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE0D601_2_06AE0D60
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEED601_2_06AEED60
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEB9401_2_06AEB940
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AEED5D1_2_06AEED5D
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE0D5B1_2_06AE0D5B
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1B6E81_2_06B1B6E8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B186081_2_06B18608
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1D6701_2_06B1D670
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1AA581_2_06B1AA58
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1C3881_2_06B1C388
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B18BF21_2_06B18BF2
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1B0A01_2_06B1B0A0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1D0281_2_06B1D028
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1A4081_2_06B1A408
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B111A01_2_06B111A0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1C9D81_2_06B1C9D8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1BD381_2_06B1BD38
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B15EB81_2_06B15EB8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1B6E71_2_06B1B6E7
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B15EC81_2_06B15EC8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B156151_2_06B15615
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B156181_2_06B15618
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B186021_2_06B18602
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B15A701_2_06B15A70
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B15A601_2_06B15A60
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1D6621_2_06B1D662
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1AA4E1_2_06B1AA4E
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B133B81_2_06B133B8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B133A81_2_06B133A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1C3871_2_06B1C387
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1A3FE1_2_06B1A3FE
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B16BD01_2_06B16BD0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B16BC91_2_06B16BC9
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B137301_2_06B13730
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B163201_2_06B16320
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B163191_2_06B16319
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B167781_2_06B16778
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1676A1_2_06B1676A
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B128B01_2_06B128B0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B174A51_2_06B174A5
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B174A81_2_06B174A8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B104951_2_06B10495
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B104981_2_06B10498
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1B09F1_2_06B1B09F
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B178F01_2_06B178F0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B108F01_2_06B108F0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B108ED1_2_06B108ED
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1B6E81_2_06B1B6E8
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B144301_2_06B14430
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1003D1_2_06B1003D
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1D0271_2_06B1D027
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B128071_2_06B12807
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B128091_2_06B12809
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B170501_2_06B17050
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B100401_2_06B10040
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B170491_2_06B17049
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B181B01_2_06B181B0
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B181AD1_2_06B181AD
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B111911_2_06B11191
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B151981_2_06B15198
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1518E1_2_06B1518E
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1C9D71_2_06B1C9D7
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B1BD371_2_06B1BD37
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B10D391_2_06B10D39
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B179001_2_06B17900
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B17D511_2_06B17D51
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B17D581_2_06B17D58
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06B10D481_2_06B10D48
        Source: order6566546663.exe, 00000000.00000002.2027706449.0000000004F60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2027017019.0000000003805000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2027290884.0000000004E50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000000.2021846884.0000000000422000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBladeNoPa.exe4 vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2024514112.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2026923988.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs order6566546663.exe
        Source: order6566546663.exe, 00000000.00000002.2026923988.0000000002801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs order6566546663.exe
        Source: order6566546663.exe, 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs order6566546663.exe
        Source: order6566546663.exe, 00000001.00000002.4499926157.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs order6566546663.exe
        Source: order6566546663.exeBinary or memory string: OriginalFilenameBladeNoPa.exe4 vs order6566546663.exe
        Source: order6566546663.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.2.order6566546663.exe.4e50000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.order6566546663.exe.3853f90.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.order6566546663.exe.3853f90.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.order6566546663.exe.4e50000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.order6566546663.exe.280f744.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.order6566546663.exe.2811f84.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 00000000.00000002.2027290884.0000000004E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
        Source: C:\Users\user\Desktop\order6566546663.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\order6566546663.exe.logJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMutant created: NULL
        Source: order6566546663.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: order6566546663.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\order6566546663.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: order6566546663.exe, 00000001.00000002.4500830132.0000000003083000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4501829243.0000000003ECB000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000003091000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000003073000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: order6566546663.exeVirustotal: Detection: 51%
        Source: order6566546663.exeReversingLabs: Detection: 39%
        Source: unknownProcess created: C:\Users\user\Desktop\order6566546663.exe "C:\Users\user\Desktop\order6566546663.exe"
        Source: C:\Users\user\Desktop\order6566546663.exeProcess created: C:\Users\user\Desktop\order6566546663.exe "C:\Users\user\Desktop\order6566546663.exe"
        Source: C:\Users\user\Desktop\order6566546663.exeProcess created: C:\Users\user\Desktop\order6566546663.exe "C:\Users\user\Desktop\order6566546663.exe"Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: order6566546663.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: order6566546663.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: order6566546663.exe, 00000000.00000002.2027706449.0000000004F60000.00000004.08000000.00040000.00000000.sdmp, order6566546663.exe, 00000000.00000002.2026923988.0000000002801000.00000004.00000800.00020000.00000000.sdmp
        Source: order6566546663.exeStatic PE information: 0xDA00EF84 [Sun Nov 25 02:40:04 2085 UTC]
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE2E78 push esp; iretd 1_2_06AE2E79
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE6F8B push es; ret 1_2_06AE6FE4
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE6F13 push es; ret 1_2_06AE6FE4
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE7059 push es; iretd 1_2_06AE705C
        Source: order6566546663.exeStatic PE information: section name: .text entropy: 7.212572916537044
        Source: C:\Users\user\Desktop\order6566546663.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTR
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: E00000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: 4800000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: 4E40000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599890Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599781Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599672Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599562Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599453Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599344Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599234Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599125Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599015Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598906Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598797Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598687Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598578Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598464Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598359Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598250Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598140Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598031Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597919Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597749Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597638Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597530Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597347Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597214Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597093Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596983Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596875Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596765Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596656Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596547Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596435Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596328Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596219Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596109Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596000Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595890Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595781Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595672Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595561Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595453Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595337Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595234Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595124Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595015Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594892Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594766Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594625Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594513Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594406Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594288Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeWindow / User API: threadDelayed 8220Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeWindow / User API: threadDelayed 1632Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 1968Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep count: 36 > 30Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -33204139332677172s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -600000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599890s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 5168Thread sleep count: 8220 > 30Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 5168Thread sleep count: 1632 > 30Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599781s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599672s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599562s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599453s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599344s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599234s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599125s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -599015s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598906s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598797s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598687s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598578s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598464s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598359s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598250s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598140s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -598031s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597919s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597749s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597638s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597530s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597347s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597214s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -597093s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596983s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596875s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596765s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596656s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596547s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596435s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596328s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596219s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596109s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -596000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595890s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595781s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595672s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595561s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595453s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595337s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595234s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595124s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -595015s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594892s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594766s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594625s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594513s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594406s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exe TID: 4196Thread sleep time: -594288s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599890Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599781Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599672Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599562Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599453Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599344Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599234Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599125Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 599015Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598906Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598797Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598687Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598578Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598464Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598359Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598250Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598140Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 598031Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597919Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597749Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597638Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597530Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597347Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597214Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 597093Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596983Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596875Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596765Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596656Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596547Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596435Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596328Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596219Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596109Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 596000Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595890Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595781Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595672Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595561Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595453Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595337Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595234Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595124Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 595015Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594892Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594766Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594625Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594513Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594406Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeThread delayed: delay time: 594288Jump to behavior
        Source: order6566546663.exe, 00000001.00000002.4500046974.000000000113A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
        Source: C:\Users\user\Desktop\order6566546663.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeCode function: 1_2_06AE7D90 LdrInitializeThunk,1_2_06AE7D90
        Source: C:\Users\user\Desktop\order6566546663.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\order6566546663.exeMemory written: C:\Users\user\Desktop\order6566546663.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeProcess created: C:\Users\user\Desktop\order6566546663.exe "C:\Users\user\Desktop\order6566546663.exe"Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Users\user\Desktop\order6566546663.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Users\user\Desktop\order6566546663.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTR
        Source: C:\Users\user\Desktop\order6566546663.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
        Source: C:\Users\user\Desktop\order6566546663.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.order6566546663.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.3908e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.order6566546663.exe.38e81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 4512, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: order6566546663.exe PID: 6976, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        111
        Process Injection
        1
        Masquerading
        1
        OS Credential Dumping
        1
        Query Registry
        Remote Services1
        Email Collection
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory1
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin Shares1
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
        Process Injection
        NTDS31
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
        Obfuscated Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Timestomp
        DCSync13
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        order6566546663.exe51%VirustotalBrowse
        order6566546663.exe39%ReversingLabsByteCode-MSIL.Trojan.Zilla
        order6566546663.exe100%AviraHEUR/AGEN.1311171
        order6566546663.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        reallyfreegeoip.org
        104.21.48.1
        truefalse
          high
          checkip.dyndns.com
          132.226.247.73
          truefalse
            high
            checkip.dyndns.org
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
                high
                https://reallyfreegeoip.org/xml/8.46.123.189false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.orgorder6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://checkip.dyndns.orgorder6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002EF4000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.comorder6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameorder6566546663.exe, 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.org/qorder6566546663.exe, 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189$order6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F46000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgorder6566546663.exe, 00000001.00000002.4500830132.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F96000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FBE000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/order6566546663.exe, 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4500830132.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, order6566546663.exe, 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.21.48.1
                                  reallyfreegeoip.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  104.21.16.1
                                  unknownUnited States
                                  13335CLOUDFLARENETUSfalse
                                  132.226.247.73
                                  checkip.dyndns.comUnited States
                                  16989UTMEMUSfalse
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1592378
                                  Start date and time:2025-01-16 02:24:05 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 15s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:order6566546663.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 128
                                  • Number of non-executed functions: 43
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  20:24:58API Interceptor12740190x Sleep call for process: order6566546663.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  104.21.48.1ydJaT4b5N8.exeGet hashmaliciousFormBookBrowse
                                  • www.vilakodsiy.sbs/vq3j/
                                  NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                  • www.axis138ae.shop/j2vs/
                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                  • twirpx.org/administrator/index.php
                                  SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                  • www.antipromil.site/7ykh/
                                  104.21.16.1MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
                                  • www.mzkd6gp5.top/3u0p/
                                  1001-13.exeGet hashmaliciousFormBookBrowse
                                  • www.mzkd6gp5.top/utww/
                                  trow.exeGet hashmaliciousUnknownBrowse
                                  • www.wifi4all.nl/
                                  8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                  • www.rafconstrutora.online/0xli/
                                  NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                  • www.kkpmoneysocial.top/86am/
                                  JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                  • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                                  132.226.247.73BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  RENH3RE2025QUOTE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • checkip.dyndns.org/
                                  rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • checkip.dyndns.org/
                                  Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  checkip.dyndns.comOrder Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 193.122.6.168
                                  BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 158.101.44.242
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 193.122.130.0
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 193.122.6.168
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  reallyfreegeoip.orgOrder Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 104.21.32.1
                                  BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.16.1
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.96.1
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.112.1
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.96.1
                                  PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.80.1
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 104.21.112.1
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.96.1
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.48.1
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.96.1
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSOrder Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 104.21.32.1
                                  Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  https://yogalisbon.gitcz.pw/sign-inGet hashmaliciousUnknownBrowse
                                  • 104.21.112.1
                                  http://com-evaluate-fanpage30127.pages.dev/help/contact/671203900952887Get hashmaliciousHTMLPhisherBrowse
                                  • 188.114.97.3
                                  http://docs-wltconnect.gitbook.io/us-enGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  https://inhospitality.shop/Get hashmaliciousUnknownBrowse
                                  • 104.17.25.14
                                  http://shorten.so/fVj82Get hashmaliciousPorn ScamBrowse
                                  • 104.21.54.29
                                  https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTMLGet hashmaliciousHTMLPhisherBrowse
                                  • 188.114.96.3
                                  http://hrpibzdeam.xyz/Get hashmaliciousUnknownBrowse
                                  • 172.67.196.118
                                  http://logincrypto-crypto.gitbook.io/usGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  CLOUDFLARENETUSOrder Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 104.21.32.1
                                  Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  https://yogalisbon.gitcz.pw/sign-inGet hashmaliciousUnknownBrowse
                                  • 104.21.112.1
                                  http://com-evaluate-fanpage30127.pages.dev/help/contact/671203900952887Get hashmaliciousHTMLPhisherBrowse
                                  • 188.114.97.3
                                  http://docs-wltconnect.gitbook.io/us-enGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  https://inhospitality.shop/Get hashmaliciousUnknownBrowse
                                  • 104.17.25.14
                                  http://shorten.so/fVj82Get hashmaliciousPorn ScamBrowse
                                  • 104.21.54.29
                                  https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTMLGet hashmaliciousHTMLPhisherBrowse
                                  • 188.114.96.3
                                  http://hrpibzdeam.xyz/Get hashmaliciousUnknownBrowse
                                  • 172.67.196.118
                                  http://logincrypto-crypto.gitbook.io/usGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  UTMEMUSBNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                  • 132.224.47.164
                                  QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 132.226.247.73
                                  Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 132.226.8.169
                                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 132.226.247.73
                                  RENH3RE2025QUOTE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 132.226.247.73
                                  PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 132.226.8.169
                                  tN8GsMV1le.exeGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.8.169
                                  rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 132.226.247.73
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  54328bd36c14bd82ddaa0c04b25ed9adOrder Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 104.21.48.1
                                  BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.48.1
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.48.1
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.48.1
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.48.1
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 104.21.48.1
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.48.1
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.48.1
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.48.1
                                  RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.48.1
                                  No context
                                  Process:C:\Users\user\Desktop\order6566546663.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):706
                                  Entropy (8bit):5.349842958726647
                                  Encrypted:false
                                  SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhat92n4M6:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84j
                                  MD5:9BA266AD16952A9A57C3693E0BCFED48
                                  SHA1:5DB70A3A7F1DB4E3879265AB336B2FA1AFBCECD5
                                  SHA-256:A6DFD14E82D7D47195A1EC7F31E64C2820AB8721EF4B5825E21E742093B55C0E
                                  SHA-512:678E1F639379FC24919B7CF562FA19CE53363CBD4B0EAB66486F6F8D5DD5958DE3AAE8D7842EE868EFCC39D907FDC1A3ACF464E29D37B0DAEE9874C39730FE8E
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.202178662583017
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:order6566546663.exe
                                  File size:591'360 bytes
                                  MD5:71bd2f038e92ae0e3b95a7567511458e
                                  SHA1:816293b2472e394288fc9c91bdff206ab8ef52e2
                                  SHA256:13ba4ee3d7accddd8dbce8e4bc4a623e0b7bf30350fe9d58f1c269cd744bb835
                                  SHA512:6504c277444190aff4ec14dfc0a9a47c84a61eaaa772088cd003cb93589334e8bd8e79928578b4f5fd61783f97c6317c22d75777db5bba53058c21ab797b40b6
                                  SSDEEP:12288:ZbRKjP7ne23gAcdtfD1IWPUK/IBW+hb9LiMPXPgm:DKjP7e23gAcvfD1IhW+VR
                                  TLSH:A9C4BE9C2B9489F5D87A45F29CF2545E7B78A90221F0E46420CB0EDDADDAF43099837F
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. .......................`............@................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x491bce
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xDA00EF84 [Sun Nov 25 02:40:04 2085 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x91b800x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5a6.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x8fbd40x8fc006d537b26dfad2925f7236c3d04c2812fFalse0.5194667119565217data7.212572916537044IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x920000x5a60x600c474081526abd64245cfd3ae4521545eFalse0.4173177083333333data4.084105898819439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x940000xc0x20048598e14c8fb96c5183ccca32e3b49d0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x920a00x31cdata0.4296482412060301
                                  RT_MANIFEST0x923bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-16T02:24:57.246624+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                  2025-01-16T02:24:58.653281+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                  2025-01-16T02:24:59.421667+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706104.21.48.1443TCP
                                  2025-01-16T02:25:00.152941+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707132.226.247.7380TCP
                                  2025-01-16T02:25:09.309392+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549709132.226.247.7380TCP
                                  2025-01-16T02:25:09.880761+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549710104.21.48.1443TCP
                                  2025-01-16T02:25:23.559296+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711132.226.247.7380TCP
                                  2025-01-16T02:25:24.186998+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549764104.21.16.1443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 16, 2025 02:24:56.252290964 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:56.257337093 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:56.257422924 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:56.257647038 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:56.262491941 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:56.971379995 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:56.986675024 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:56.991909981 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:57.198585033 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:57.240565062 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:57.240605116 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:57.240708113 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:57.246623993 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:57.247029066 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:57.247047901 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:57.762828112 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:57.762912989 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:57.797163010 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:57.797182083 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:57.797616005 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:57.843446970 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.148874998 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.195333004 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:58.271003008 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:58.271167040 CET44349705104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:58.271224976 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.287076950 CET49705443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.290359020 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:58.295397043 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:58.611833096 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:58.613658905 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.613692999 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:58.613765955 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.614113092 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:58.614123106 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:58.653280973 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.110253096 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:59.112519979 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:59.112559080 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:59.421744108 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:59.421906948 CET44349706104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:24:59.421967983 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:59.422205925 CET49706443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:24:59.424841881 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.425643921 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.429965973 CET8049704132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:59.430046082 CET4970480192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.430556059 CET8049707132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:24:59.430654049 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.430731058 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:24:59.435497999 CET8049707132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:00.104075909 CET8049707132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:00.105897903 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.105990887 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.106097937 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.106453896 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.106492043 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.152940989 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.578672886 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.582032919 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.582103968 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.711308956 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.711503029 CET44349708104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:00.711574078 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.712116003 CET49708443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:00.718039989 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.719485998 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.723136902 CET8049707132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:00.723269939 CET4970780192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.724406004 CET8049709132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:00.724502087 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.724668980 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:00.729445934 CET8049709132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:09.260112047 CET8049709132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:09.261517048 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.261562109 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.261641026 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.261883974 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.261902094 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.309391975 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.731015921 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.732515097 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.732551098 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.880850077 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.881000996 CET44349710104.21.48.1192.168.2.5
                                  Jan 16, 2025 02:25:09.881139994 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.881463051 CET49710443192.168.2.5104.21.48.1
                                  Jan 16, 2025 02:25:09.884381056 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.885504961 CET4971180192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.889393091 CET8049709132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:09.889481068 CET4970980192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.890333891 CET8049711132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:09.890414000 CET4971180192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.890480995 CET4971180192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:09.895231962 CET8049711132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:23.515515089 CET8049711132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:23.524065971 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:23.524115086 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:23.524220943 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:23.524504900 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:23.524533987 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:23.559295893 CET4971180192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:23.995119095 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:24.008605003 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:24.008658886 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:24.187093019 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:24.187251091 CET44349764104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:24.187355042 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:24.187544107 CET49764443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:24.191694975 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:24.196758032 CET8049770132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:24.196852922 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:24.196924925 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:24.201715946 CET8049770132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:25.774389029 CET8049770132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:25.775748014 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:25.775778055 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:25.775882959 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:25.776150942 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:25.776160955 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:25.825016022 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.235248089 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:26.236892939 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:26.236922979 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:26.382638931 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:26.382783890 CET44349780104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:26.382865906 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:26.383301020 CET49780443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:26.386306047 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.387229919 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.391433001 CET8049770132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:26.391506910 CET4977080192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.392052889 CET8049786132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:26.392189980 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.392298937 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:26.397113085 CET8049786132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:27.164477110 CET8049786132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:27.166393042 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.166449070 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.166555882 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.166841030 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.166872978 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.215534925 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.640358925 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.642497063 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.642544031 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.769555092 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.769629955 CET44349792104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:27.769835949 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.770329952 CET49792443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:27.774684906 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.776216030 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.780000925 CET8049786132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:27.780075073 CET4978680192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.781361103 CET8049798132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:27.781630993 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.781753063 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:27.786694050 CET8049798132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:28.575320005 CET8049798132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:25:28.578675985 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:28.578708887 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:28.578795910 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:28.579085112 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:28.579097033 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:28.621865988 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:25:29.065023899 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:29.074122906 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:29.074162006 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:29.220793962 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:29.220943928 CET44349804104.21.16.1192.168.2.5
                                  Jan 16, 2025 02:25:29.221033096 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:25:29.221489906 CET49804443192.168.2.5104.21.16.1
                                  Jan 16, 2025 02:26:28.515470028 CET8049711132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:26:28.515674114 CET4971180192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:26:33.574318886 CET8049798132.226.247.73192.168.2.5
                                  Jan 16, 2025 02:26:33.574398041 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:27:08.591672897 CET4979880192.168.2.5132.226.247.73
                                  Jan 16, 2025 02:27:08.596610069 CET8049798132.226.247.73192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 16, 2025 02:24:56.238338947 CET5626453192.168.2.51.1.1.1
                                  Jan 16, 2025 02:24:56.245770931 CET53562641.1.1.1192.168.2.5
                                  Jan 16, 2025 02:24:57.233042002 CET5601753192.168.2.51.1.1.1
                                  Jan 16, 2025 02:24:57.240053892 CET53560171.1.1.1192.168.2.5
                                  Jan 16, 2025 02:25:23.516813993 CET4971453192.168.2.51.1.1.1
                                  Jan 16, 2025 02:25:23.523329020 CET53497141.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 16, 2025 02:24:56.238338947 CET192.168.2.51.1.1.10x704Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.233042002 CET192.168.2.51.1.1.10xf535Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.516813993 CET192.168.2.51.1.1.10xdb56Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:56.245770931 CET1.1.1.1192.168.2.50x704No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:57.240053892 CET1.1.1.1192.168.2.50xf535No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:25:23.523329020 CET1.1.1.1192.168.2.50xdb56No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                  • reallyfreegeoip.org
                                  • checkip.dyndns.org
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549704132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:56.257647038 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:56.971379995 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:56 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                  Jan 16, 2025 02:24:56.986675024 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:24:57.198585033 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:57 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                  Jan 16, 2025 02:24:58.290359020 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:24:58.611833096 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:58 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549707132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:59.430731058 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:25:00.104075909 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:00 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.549709132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:25:00.724668980 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:25:09.260112047 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:09 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.549711132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:25:09.890480995 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:25:23.515515089 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:23 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.549770132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:25:24.196924925 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:25:25.774389029 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:25 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.549786132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:25:26.392298937 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:25:27.164477110 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:27 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.549798132.226.247.73806976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:25:27.781753063 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:25:28.575320005 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:28 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549705104.21.48.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:58 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:24:58 UTC857INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:58 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305487
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=18Xwuilo7Xz%2BrYj1t4tqGnm1SOFHgwwUtYmG6y7%2FOoQFjJyKeY2l6YH8HNKk7R40YzcWq7Nc%2F3jbLxjCp6UnAZ4un7M7Iw4YiZskNNQceEEe1%2FEY3xpKisgSJuVZdw8dNqs9QNEc"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4f17ceaf8cda-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1938&min_rtt=1936&rtt_var=730&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1495901&cwnd=244&unsent_bytes=0&cid=a590337336c3c2c4&ts=528&x=0"
                                  2025-01-16 01:24:58 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549706104.21.48.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:59 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:24:59 UTC858INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:59 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305488
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2NpcwcJis41%2F3B0YdYSmrNvQZIPWA1r7CiLwW92mbzvnPAa1W%2BRSKFwQSZ%2BOz6AxyHGOi1rd1b6jW8pui0eimvhRYwvzBppOHQQcfSoByPVBVAxNc0SQ4HopGpm0Vy%2BhMus%2FzRTO"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4f1dfbef8c15-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1845&min_rtt=1845&rtt_var=922&sent=5&recv=7&lost=0&retrans=1&sent_bytes=4238&recv_bytes=699&delivery_rate=224235&cwnd=238&unsent_bytes=0&cid=8581e4475b0cd1bb&ts=166&x=0"
                                  2025-01-16 01:24:59 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.549708104.21.48.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:00 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:25:00 UTC861INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:00 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305489
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7FFDJaLtlhRrOzRvat4%2Fl%2Fcg21Ab2ZGPsmS1m6nfVYv2V8mjdSQfXGFrkW0M%2F0lekzQt6CVeoXIx0%2FrdNhRulTHiCFTnVy69z0EiUy6AXA4%2FLkRul4LLgWVhgXjKeoq2hY%2BmRYal"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4f26fb37c323-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1474&min_rtt=1463&rtt_var=571&sent=3&recv=5&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1879021&cwnd=214&unsent_bytes=0&cid=8410f429953068ba&ts=142&x=0"
                                  2025-01-16 01:25:00 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.549710104.21.48.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:09 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:25:09 UTC851INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:09 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305498
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=65hAl7NZk5FYCWvABsXuf4E9QdLTuzB5qT69iMM1RyhPzKAORaXdNJJfF5iqg5ai7V5CiugasmBeYCgPiXpvh08g7BQy9ReEgxRABJAo9baz2M2PkY%2FPJSf9KrTiE1ocv2lHGtto"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4f6049c443be-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1600&min_rtt=1594&rtt_var=610&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1776155&cwnd=229&unsent_bytes=0&cid=bd2c1cb288e3d1fb&ts=142&x=0"
                                  2025-01-16 01:25:09 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.549764104.21.16.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:25:24 UTC857INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:24 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305513
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FQ9LH%2BHZsYcyysba4n%2FyEXkMiAr6rPDFZBrGTfyFKZri94g75i1TNXfPwg2YXz%2FDGXAZ2h8OGRDzVuyWVsKroydDr0dAHz32MNkCr6rPS5R0Cs96LKAJ5qQ3aBBkzzf6W0d3MoS3"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4fb98d5c7293-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1882&min_rtt=1874&rtt_var=718&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1506707&cwnd=158&unsent_bytes=0&cid=a13d433b803be8f9&ts=164&x=0"
                                  2025-01-16 01:25:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.549780104.21.16.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:26 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:25:26 UTC855INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:26 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305515
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SUNDZdx4zCQ4A2ZOH7atxb%2FHcc8v8HtUnZqj3vJcXPSczvlGtjGe4RsE%2FbGHRGb6ZCDTAQ9Ldd5TJ6mtYSakgtscLGQceKF6Itpu14qwn8muTa3Eu31YG%2BEEluKZfqU4SD8fdtBp"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4fc78f990fa8-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1910&min_rtt=1521&rtt_var=848&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1919789&cwnd=252&unsent_bytes=0&cid=a95f0a2cf5d81654&ts=156&x=0"
                                  2025-01-16 01:25:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.549792104.21.16.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:27 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:25:27 UTC861INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:27 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305516
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N3iXFvTuqPeJAwIvxuk9ij%2BCj%2BbFEbTBBy14AJUIO1zs25AGnCusOYloEXtl%2FXzq9RMkLRpalaU%2FNJS%2BwocmjBk%2BT81IoLfCUj3s3xW99hZPGmjuUHjGqkQSWv6XVE5EEjiUIGZC"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4fd0396f0fa8-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1450&min_rtt=1446&rtt_var=551&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1970310&cwnd=252&unsent_bytes=0&cid=2da5218872416a1c&ts=142&x=0"
                                  2025-01-16 01:25:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.549804104.21.16.14436976C:\Users\user\Desktop\order6566546663.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:25:29 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:25:29 UTC861INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:25:29 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305518
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xRda%2Fu7YD3K4K%2Bn1v1li993%2FXn9ZWPlf0L3SQIapc%2FTcRWJ1tcPtmjTNwqPtK56ls%2Fr2Ndh0990mYmhDpK0DjAWAnTzz%2FdB6XFJckHy1a7Eqty9INKHsPAD3pIV2rQDgaqbMV6T6"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4fd93c7d41ba-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1650&min_rtt=1641&rtt_var=633&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1704611&cwnd=192&unsent_bytes=0&cid=03d4839e9d907c82&ts=166&x=0"
                                  2025-01-16 01:25:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:20:24:55
                                  Start date:15/01/2025
                                  Path:C:\Users\user\Desktop\order6566546663.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\order6566546663.exe"
                                  Imagebase:0x420000
                                  File size:591'360 bytes
                                  MD5 hash:71BD2F038E92AE0E3B95A7567511458E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000000.00000002.2027290884.0000000004E50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2027017019.00000000038A6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:20:24:55
                                  Start date:15/01/2025
                                  Path:C:\Users\user\Desktop\order6566546663.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\order6566546663.exe"
                                  Imagebase:0xab0000
                                  File size:591'360 bytes
                                  MD5 hash:71BD2F038E92AE0E3B95A7567511458E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000002.4499847715.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4500830132.0000000002FFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4500830132.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:5.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:76%
                                    Total number of Nodes:25
                                    Total number of Limit Nodes:1
                                    execution_graph 12307 e0ad88 12309 e0ada2 12307->12309 12308 e0adf2 12309->12308 12311 e0ae48 12309->12311 12312 e0ae7b 12311->12312 12331 e09f3c 12312->12331 12314 e0b052 12315 e09f48 Wow64GetThreadContext 12314->12315 12316 e0b14c 12314->12316 12315->12316 12317 e09f60 ReadProcessMemory 12316->12317 12318 e0b22c 12317->12318 12329 e0ab78 VirtualAllocEx 12318->12329 12319 e0b349 12328 e0aa20 WriteProcessMemory 12319->12328 12320 e0b42d 12321 e0b628 12320->12321 12330 e0aa20 WriteProcessMemory 12320->12330 12327 e0aa20 WriteProcessMemory 12321->12327 12322 e0b666 12323 e0b74e 12322->12323 12325 e0a8f8 Wow64SetThreadContext 12322->12325 12326 e0ac98 ResumeThread 12323->12326 12324 e0b80b 12324->12309 12325->12323 12326->12324 12327->12322 12328->12320 12329->12319 12330->12320 12332 e0b978 CreateProcessW 12331->12332 12334 e0bb5e 12332->12334

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 30 e0ae48-e0ae79 31 e0ae80-e0b006 30->31 32 e0ae7b 30->32 39 e0b008-e0b02c 31->39 40 e0b02d-e0b072 call e09f3c 31->40 32->31 39->40 44 e0b074-e0b090 40->44 45 e0b09b-e0b105 40->45 44->45 51 e0b107 45->51 52 e0b10c-e0b138 45->52 51->52 54 e0b199-e0b1cb call e09f54 52->54 55 e0b13a-e0b147 call e09f48 52->55 60 e0b1f4 54->60 61 e0b1cd-e0b1e9 54->61 58 e0b14c-e0b16c 55->58 62 e0b195-e0b197 58->62 63 e0b16e-e0b18a 58->63 64 e0b1f5-e0b1ff 60->64 61->60 62->64 63->62 66 e0b201 64->66 67 e0b206-e0b24c call e09f60 64->67 66->67 73 e0b275-e0b28e 67->73 74 e0b24e-e0b26a 67->74 75 e0b290-e0b2bc call e09f6c 73->75 76 e0b2e6-e0b35e call e0ab78 73->76 74->73 82 e0b2e5 75->82 83 e0b2be-e0b2da 75->83 87 e0b360-e0b371 76->87 88 e0b373-e0b375 76->88 82->76 83->82 90 e0b37b-e0b38f 87->90 88->90 91 e0b391-e0b3cb 90->91 92 e0b3cc-e0b3e3 90->92 91->92 93 e0b3e5-e0b401 92->93 94 e0b40c-e0b44d call e0aa20 92->94 93->94 98 e0b476-e0b4ab 94->98 99 e0b44f-e0b46b 94->99 103 e0b603-e0b622 98->103 99->98 104 e0b4b0-e0b534 103->104 105 e0b628-e0b686 call e0aa20 103->105 115 e0b5f8-e0b5fd 104->115 116 e0b53a-e0b5ac call e0aa20 104->116 111 e0b688-e0b6a4 105->111 112 e0b6af-e0b6e2 105->112 111->112 118 e0b6e4-e0b6eb 112->118 119 e0b6ec-e0b6ff 112->119 115->103 129 e0b5ae-e0b5ce 116->129 118->119 120 e0b701 119->120 121 e0b706-e0b731 119->121 120->121 126 e0b733-e0b74c call e0a8f8 121->126 127 e0b79b-e0b7cd call e09f78 121->127 131 e0b74e-e0b76e 126->131 134 e0b7f6 127->134 135 e0b7cf-e0b7eb 127->135 132 e0b5d0-e0b5ec 129->132 133 e0b5f7 129->133 136 e0b770-e0b78c 131->136 137 e0b797-e0b799 131->137 132->133 133->115 138 e0b7f7-e0b809 call e0ac98 134->138 135->134 136->137 137->138 142 e0b80b-e0b82b 138->142 144 e0b854-e0b95d 142->144 145 e0b82d-e0b849 142->145 145->144
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (
                                    • API String ID: 0-3887548279
                                    • Opcode ID: 3f9f2743f526ec2f4af24ed8c532df2403802b6fbf080c42b6198263ca19d7e0
                                    • Instruction ID: cc5df36572621c5b76de1ad873f0a4eb52fbaee03b4727c2b518da13545992b6
                                    • Opcode Fuzzy Hash: 3f9f2743f526ec2f4af24ed8c532df2403802b6fbf080c42b6198263ca19d7e0
                                    • Instruction Fuzzy Hash: DB52BE70E012288FDB68DF65C994BDDBBF2BB89304F1495EA9409AB291DB345EC5CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 158 e09f3c-e0ba03 160 e0ba05-e0ba17 158->160 161 e0ba1a-e0ba28 158->161 160->161 162 e0ba2a-e0ba3c 161->162 163 e0ba3f-e0ba7b 161->163 162->163 164 e0ba7d-e0ba8c 163->164 165 e0ba8f-e0bb5c CreateProcessW 163->165 164->165 169 e0bb65-e0bc24 165->169 170 e0bb5e-e0bb64 165->170 180 e0bc26-e0bc4f 169->180 181 e0bc5a-e0bc65 169->181 170->169 180->181
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00E0BB49
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: b784395b67c61cf404094743073931a64f9c3bfa12faecfb77eb26dc32255aa0
                                    • Instruction ID: 2799c39acf3fa88ccded37ac8e9510806c3a6c3a0a234b21cda7e02b97b73b76
                                    • Opcode Fuzzy Hash: b784395b67c61cf404094743073931a64f9c3bfa12faecfb77eb26dc32255aa0
                                    • Instruction Fuzzy Hash: 4381CF74D40269CFDB21CFA9C980BEDBBF5BB49304F1091AAE508B7260DB749A85CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 185 e0aa20-e0aa8b 187 e0aaa2-e0ab03 WriteProcessMemory 185->187 188 e0aa8d-e0aa9f 185->188 190 e0ab05-e0ab0b 187->190 191 e0ab0c-e0ab5e 187->191 188->187 190->191
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00E0AAF3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: d361dd5ad00cd429d57b47846ddf31be1f661097ffada793b442ab29992ba340
                                    • Instruction ID: a65db5ce386ef6c401af36035345cb35bc031051819fe14085b35de6e806c254
                                    • Opcode Fuzzy Hash: d361dd5ad00cd429d57b47846ddf31be1f661097ffada793b442ab29992ba340
                                    • Instruction Fuzzy Hash: 47419BB4D012589FCF00CFA9D984ADEFBF1BB49310F14902AE419B7250D774AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 196 e09f60-e0be65 ReadProcessMemory 198 e0be67-e0be6d 196->198 199 e0be6e-e0beac 196->199 198->199
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00E0BE55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 248a0e0cc47cdefffa19124a7c81ebfcc049c42fdb5d93154ac763d7f2c98ebd
                                    • Instruction ID: d238a78f84d739c6aed0c3cd6325726a7baf7ad63ea1d0b84be2c17b7207c844
                                    • Opcode Fuzzy Hash: 248a0e0cc47cdefffa19124a7c81ebfcc049c42fdb5d93154ac763d7f2c98ebd
                                    • Instruction Fuzzy Hash: 4F4196B9D04258DFCF10CFAAD984ADEFBB5BB09310F10A02AE918B7250D375A945CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 202 e0ab78-e0ac32 VirtualAllocEx 205 e0ac34-e0ac3a 202->205 206 e0ac3b-e0ac85 202->206 205->206
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00E0AC22
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 83c49a24c466965d2e8b6a94110be85e5f1c93303904533263b379efa7a23d48
                                    • Instruction ID: c3e3a3b9554effa6692d8f2080b2303a848c57e00e23af6b42ea0ff9fc9000a1
                                    • Opcode Fuzzy Hash: 83c49a24c466965d2e8b6a94110be85e5f1c93303904533263b379efa7a23d48
                                    • Instruction Fuzzy Hash: F531A9B8D002589FCF10CFA9D980ADEFBB5FB49310F10A42AE815B7250D735A941CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 211 e0a8f8-e0a958 213 e0a95a-e0a96c 211->213 214 e0a96f-e0a9b7 Wow64SetThreadContext 211->214 213->214 216 e0a9c0-e0aa0c 214->216 217 e0a9b9-e0a9bf 214->217 217->216
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E0A9A7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 00d1093249f92a50dfbde3ae34933548840f3407bd7c3122181a1931ef442500
                                    • Instruction ID: 610c994e83b33b1a97c2c0ae15a490ddde0986d6d2b24e62ad05776d15a5d897
                                    • Opcode Fuzzy Hash: 00d1093249f92a50dfbde3ae34933548840f3407bd7c3122181a1931ef442500
                                    • Instruction Fuzzy Hash: 9631BEB4D002589FCB10DFA9D485AEEFBF1BF49310F14902AE419B7240D778A985CF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 222 e09f48-e0bcf4 224 e0bcf6-e0bd08 222->224 225 e0bd0b-e0bd52 Wow64GetThreadContext 222->225 224->225 226 e0bd54-e0bd5a 225->226 227 e0bd5b-e0bd93 225->227 226->227
                                    APIs
                                    • Wow64GetThreadContext.KERNEL32(?,?), ref: 00E0BD42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: a846091d4708092bfe2c300eac000eaa71d55d11af5e6b3dc8f62b94f9a75be3
                                    • Instruction ID: 1257a954f5a786bfe9a793a21528654a21be6840442e136f3cecd61fc57d870e
                                    • Opcode Fuzzy Hash: a846091d4708092bfe2c300eac000eaa71d55d11af5e6b3dc8f62b94f9a75be3
                                    • Instruction Fuzzy Hash: B5319AB4D012589FDB10CFA9D584ADEFBF1BB49314F24902AE418B7250D378A985CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 230 e0ac98-e0ad26 ResumeThread 233 e0ad28-e0ad2e 230->233 234 e0ad2f-e0ad71 230->234 233->234
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 00E0AD16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2026629867.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e00000_order6566546663.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 568cb535b16fa570ed701c0c4d3c25a7a47bc0e8a67042a008ac4d65c972b3a6
                                    • Instruction ID: e1fad5de9cba7ce014b5398a7c5293b4bf67aafc9bbe40800e322389ed392649
                                    • Opcode Fuzzy Hash: 568cb535b16fa570ed701c0c4d3c25a7a47bc0e8a67042a008ac4d65c972b3a6
                                    • Instruction Fuzzy Hash: 9D31CBB4D002189FCB14DFA9D481A9EFBB5FF49314F14942AE819B7240C735A941CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 313 b9d4fc-b9d50e 314 b9d5a2-b9d5a9 313->314 315 b9d514 313->315 316 b9d516-b9d522 314->316 315->316 317 b9d528-b9d54a 316->317 318 b9d5ae-b9d5b3 316->318 320 b9d5b8-b9d5cd 317->320 321 b9d54c-b9d56a 317->321 318->317 326 b9d584-b9d58c 320->326 323 b9d572-b9d582 321->323 325 b9d5da 323->325 323->326 327 b9d5cf-b9d5d8 326->327 328 b9d58e-b9d59f 326->328 327->328
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2025662060.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b9d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 910010bfdc84e03dde6673379d0183dbb11622d616efca31573dbe234d6eac90
                                    • Instruction ID: 97044891534692ead1b3bd42b93be16800817ed28655071353d2af031feb28a3
                                    • Opcode Fuzzy Hash: 910010bfdc84e03dde6673379d0183dbb11622d616efca31573dbe234d6eac90
                                    • Instruction Fuzzy Hash: 0B210371600204DFCF05DF14D9C0B26BFA5FBA8318F21C5B9E9090B256C33AD816DBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2025662060.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b9d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb840833f3fe8e273b4045fc37d93c4e9a68501b81546d7ba06367d3e32fcb08
                                    • Instruction ID: 1bafce9c96f61ed973a1d2353142bd7aadab4afd633a19568695e9f819ece5b3
                                    • Opcode Fuzzy Hash: bb840833f3fe8e273b4045fc37d93c4e9a68501b81546d7ba06367d3e32fcb08
                                    • Instruction Fuzzy Hash: A321D372504204DFDF05DF15D9C0B26BFA5FBA8314F2485B9E90D0B26AC33AD856DAA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2025662060.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b9d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 47e1dc025ef0bde45afcf4c5f77fd2af652cd44fd5cf5535cc02fc162278a8f8
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 3611D376504244CFCF06DF10D5C4B16BFB2FBA4314F25C6A9D9490B256C33AD85ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2025662060.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b9d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 33b3818d8a4365df1fb81fb790674acca0d3b778e5cc485062dc002142fce03e
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 2D11D376504240CFCF16CF14D9C4B16BFB1FB94314F24C6A9D9490B256C33AD85ACBA2

                                    Execution Graph

                                    Execution Coverage:16.4%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:46.2%
                                    Total number of Nodes:39
                                    Total number of Limit Nodes:2
                                    execution_graph 24885 2c8ced8 24886 2c8cee4 24885->24886 24896 6ae11bb 24886->24896 24901 6ae11c0 24886->24901 24887 2c8cf98 24906 6aee058 24887->24906 24910 6aee049 24887->24910 24888 2c8cfe5 24914 6b18608 24888->24914 24919 6b18602 24888->24919 24889 2c8d0b7 24897 6ae11e2 24896->24897 24898 6ae12ae 24897->24898 24924 6ae8174 24897->24924 24928 6ae7d90 24897->24928 24898->24887 24902 6ae11e2 24901->24902 24903 6ae12ae 24902->24903 24904 6ae8174 LdrInitializeThunk 24902->24904 24905 6ae7d90 LdrInitializeThunk 24902->24905 24903->24887 24904->24903 24905->24903 24907 6aee07a 24906->24907 24908 6ae7d90 LdrInitializeThunk 24907->24908 24909 6aee144 24907->24909 24908->24909 24909->24888 24911 6aee07a 24910->24911 24912 6ae7d90 LdrInitializeThunk 24911->24912 24913 6aee144 24911->24913 24912->24913 24913->24888 24916 6b1862a 24914->24916 24915 6b1873c 24915->24889 24916->24915 24917 6ae8174 LdrInitializeThunk 24916->24917 24918 6ae7d90 LdrInitializeThunk 24916->24918 24917->24915 24918->24915 24921 6b1862a 24919->24921 24920 6b1873c 24920->24889 24921->24920 24922 6ae8174 LdrInitializeThunk 24921->24922 24923 6ae7d90 LdrInitializeThunk 24921->24923 24922->24920 24923->24920 24927 6ae802b 24924->24927 24925 6ae82b1 LdrInitializeThunk 24926 6ae82c9 24925->24926 24926->24898 24927->24925 24931 6ae7dc1 24928->24931 24929 6ae7f21 24929->24898 24930 6ae82b1 LdrInitializeThunk 24930->24929 24931->24929 24931->24930

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 146 2c8b328-2c8b33b 147 2c8b47a-2c8b481 146->147 148 2c8b341-2c8b34a 146->148 149 2c8b350-2c8b354 148->149 150 2c8b484 148->150 151 2c8b36e-2c8b375 149->151 152 2c8b356 149->152 153 2c8b489-2c8b491 150->153 151->147 155 2c8b37b-2c8b388 151->155 154 2c8b359-2c8b364 152->154 159 2c8b493-2c8b4b0 153->159 160 2c8b465-2c8b467 153->160 154->150 156 2c8b36a-2c8b36c 154->156 155->147 161 2c8b38e-2c8b3a1 155->161 156->151 156->154 162 2c8b4dc 159->162 163 2c8b4b2-2c8b4ca 159->163 164 2c8b469 160->164 165 2c8b46d-2c8b46f 160->165 166 2c8b3a3 161->166 167 2c8b3a6-2c8b3ae 161->167 168 2c8b4de-2c8b4e2 162->168 182 2c8b4cc 163->182 183 2c8b4d3-2c8b4d6 163->183 164->153 169 2c8b46b 164->169 170 2c8b470-2c8b473 165->170 166->167 171 2c8b41b-2c8b41d 167->171 172 2c8b3b0-2c8b3b6 167->172 169->165 170->150 175 2c8b475-2c8b478 170->175 171->147 176 2c8b41f-2c8b425 171->176 172->171 173 2c8b3b8-2c8b3be 172->173 173->153 178 2c8b3c4-2c8b3dc 173->178 175->147 177 2c8b427-2c8b431 175->177 176->147 176->177 177->153 179 2c8b433-2c8b44b 177->179 191 2c8b409-2c8b40c 178->191 192 2c8b3de-2c8b3e4 178->192 179->170 194 2c8b44d-2c8b453 179->194 185 2c8b4cd-2c8b4d1 182->185 186 2c8b4d8-2c8b4da 183->186 187 2c8b4e3-2c8b4f9 183->187 185->168 186->162 186->163 187->185 193 2c8b4fb-2c8b520 187->193 191->150 196 2c8b40e-2c8b411 191->196 192->153 195 2c8b3ea-2c8b3fe 192->195 197 2c8b522 193->197 198 2c8b527-2c8b604 call 2c83908 call 2c83428 193->198 194->153 199 2c8b455-2c8b463 194->199 195->153 204 2c8b404 195->204 196->150 200 2c8b413-2c8b419 196->200 197->198 213 2c8b60b-2c8b62c call 2c84dc8 198->213 214 2c8b606 198->214 199->160 200->171 200->172 204->191 216 2c8b631-2c8b63c 213->216 214->213 217 2c8b63e 216->217 218 2c8b643-2c8b647 216->218 217->218 219 2c8b649-2c8b64a 218->219 220 2c8b64c-2c8b653 218->220 221 2c8b66b-2c8b6af 219->221 222 2c8b65a-2c8b668 220->222 223 2c8b655 220->223 227 2c8b715-2c8b72c 221->227 222->221 223->222 229 2c8b72e-2c8b753 227->229 230 2c8b6b1-2c8b6c7 227->230 237 2c8b76b 229->237 238 2c8b755-2c8b76a 229->238 234 2c8b6c9-2c8b6d5 230->234 235 2c8b6f1 230->235 239 2c8b6df-2c8b6e5 234->239 240 2c8b6d7-2c8b6dd 234->240 236 2c8b6f7-2c8b714 235->236 236->227 243 2c8b76c 237->243 238->237 241 2c8b6ef 239->241 240->241 241->236 243->243
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: 680d54bb433776af9ff64869c1c4705b0f90dcb9898dce47390132ba6bad0293
                                    • Instruction ID: e35564abe363a5834480aea5d06cf1e5d6fdc1c87645b271bdce134b6ac3b20e
                                    • Opcode Fuzzy Hash: 680d54bb433776af9ff64869c1c4705b0f90dcb9898dce47390132ba6bad0293
                                    • Instruction Fuzzy Hash: 6EE10A74A00659CFDB14DFA9C984A9DBBB1BF89318F15C0A9E819EB361DB30AD41CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 246 2c8c470 247 2c8c471-2c8c474 246->247 248 2c8c3f6-2c8c400 247->248 249 2c8c476-2c8c4a0 247->249 248->247 250 2c8c402-2c8c40c 248->250 251 2c8c4a2 249->251 252 2c8c4a7-2c8c4ef 249->252 250->246 251->252 256 2c8c4f7-2c8c506 call 2c83908 252->256 259 2c8c50b-2c8c584 call 2c83428 256->259 265 2c8c58b-2c8c5ac call 2c84dc8 259->265 266 2c8c586 259->266 268 2c8c5b1-2c8c5bc 265->268 266->265 269 2c8c5be 268->269 270 2c8c5c3-2c8c5c7 268->270 269->270 271 2c8c5c9-2c8c5ca 270->271 272 2c8c5cc-2c8c5d3 270->272 273 2c8c5eb-2c8c62f 271->273 274 2c8c5da-2c8c5e8 272->274 275 2c8c5d5 272->275 279 2c8c695-2c8c6ac 273->279 274->273 275->274 281 2c8c6ae-2c8c6d3 279->281 282 2c8c631-2c8c647 279->282 291 2c8c6eb-2c8c758 281->291 292 2c8c6d5-2c8c6d8 281->292 286 2c8c649-2c8c655 282->286 287 2c8c671 282->287 288 2c8c65f-2c8c665 286->288 289 2c8c657-2c8c65d 286->289 290 2c8c677-2c8c694 287->290 294 2c8c66f 288->294 289->294 290->279 293 2c8c6dd-2c8c6ea 291->293 298 2c8c75a-2c8c780 291->298 292->293 293->291 294->290 299 2c8c782 298->299 300 2c8c787-2c8c7cf 298->300 299->300 303 2c8c7d7-2c8c7e6 call 2c83908 300->303 305 2c8c7eb-2c8c864 call 2c83428 303->305 311 2c8c86b-2c8c88c call 2c84dc8 305->311 312 2c8c866 305->312 314 2c8c891-2c8c89c 311->314 312->311 315 2c8c89e 314->315 316 2c8c8a3-2c8c8a7 314->316 315->316 317 2c8c8a9-2c8c8aa 316->317 318 2c8c8ac-2c8c8b3 316->318 319 2c8c8cb-2c8c90f 317->319 320 2c8c8ba-2c8c8c8 318->320 321 2c8c8b5 318->321 325 2c8c975-2c8c98c 319->325 320->319 321->320 327 2c8c98e-2c8c9b3 325->327 328 2c8c911-2c8c927 325->328 337 2c8c9cb 327->337 338 2c8c9b5-2c8c9ca 327->338 332 2c8c929-2c8c935 328->332 333 2c8c951 328->333 334 2c8c93f-2c8c945 332->334 335 2c8c937-2c8c93d 332->335 336 2c8c957-2c8c974 333->336 339 2c8c94f 334->339 335->339 336->325 338->337 339->336
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: e279ff82a995f64ffa787c6358e0ac902008283f5797bb066a41386ce01d07a7
                                    • Instruction ID: 1a5c9af617976f155a735dab1035f962a09907bfc0d9b1ce9ae9f6e2df3dcb38
                                    • Opcode Fuzzy Hash: e279ff82a995f64ffa787c6358e0ac902008283f5797bb066a41386ce01d07a7
                                    • Instruction Fuzzy Hash: 0A91EA74E00218CFDB18DFAAD884A9DBBF2BF89314F14C56AE419AB365DB349941CF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 343 2c8bbd3-2c8bbd5 344 2c8bba9-2c8bbab 343->344 345 2c8bbd7-2c8bbd9 343->345 346 2c8bbbd-2c8bbc8 344->346 347 2c8bbdb-2c8bc00 345->347 348 2c8bbad-2c8bbaf 345->348 346->343 349 2c8bc02 347->349 350 2c8bc07-2c8bc4f 347->350 348->346 349->350 352 2c8bc57-2c8bc66 call 2c83908 350->352 354 2c8bc6b-2c8bce4 call 2c83428 352->354 360 2c8bceb-2c8bd0c call 2c84dc8 354->360 361 2c8bce6 354->361 363 2c8bd11-2c8bd1c 360->363 361->360 364 2c8bd1e 363->364 365 2c8bd23-2c8bd27 363->365 364->365 366 2c8bd29-2c8bd2a 365->366 367 2c8bd2c-2c8bd33 365->367 368 2c8bd4b-2c8bd8f 366->368 369 2c8bd3a-2c8bd48 367->369 370 2c8bd35 367->370 374 2c8bdf5-2c8be0c 368->374 369->368 370->369 376 2c8be0e-2c8be33 374->376 377 2c8bd91-2c8bda7 374->377 383 2c8be4b 376->383 384 2c8be35-2c8be4a 376->384 381 2c8bda9-2c8bdb5 377->381 382 2c8bdd1 377->382 385 2c8bdbf-2c8bdc5 381->385 386 2c8bdb7-2c8bdbd 381->386 387 2c8bdd7-2c8bdf4 382->387 384->383 388 2c8bdcf 385->388 386->388 387->374 388->387
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: d62c91ef398d41c95004fe0641d392c0dfee6ac66ccf0c806fd2be2252e0b360
                                    • Instruction ID: 09defbf0ca7c3be07cb9dac0c554ec759d9913b9ac7385705479cdf83240042a
                                    • Opcode Fuzzy Hash: d62c91ef398d41c95004fe0641d392c0dfee6ac66ccf0c806fd2be2252e0b360
                                    • Instruction Fuzzy Hash: 7F91B474E002589FDB14DFAAD894A9DBBF2BF89318F14C069E419AB365EB349941CF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 392 2c8c751-2c8c758 393 2c8c75a-2c8c780 392->393 394 2c8c6dd-2c8c6eb 392->394 395 2c8c782 393->395 396 2c8c787-2c8c7cf 393->396 394->392 395->396 401 2c8c7d7-2c8c7e6 call 2c83908 396->401 403 2c8c7eb-2c8c864 call 2c83428 401->403 409 2c8c86b-2c8c88c call 2c84dc8 403->409 410 2c8c866 403->410 412 2c8c891-2c8c89c 409->412 410->409 413 2c8c89e 412->413 414 2c8c8a3-2c8c8a7 412->414 413->414 415 2c8c8a9-2c8c8aa 414->415 416 2c8c8ac-2c8c8b3 414->416 417 2c8c8cb-2c8c90f 415->417 418 2c8c8ba-2c8c8c8 416->418 419 2c8c8b5 416->419 423 2c8c975-2c8c98c 417->423 418->417 419->418 425 2c8c98e-2c8c9b3 423->425 426 2c8c911-2c8c927 423->426 435 2c8c9cb 425->435 436 2c8c9b5-2c8c9ca 425->436 430 2c8c929-2c8c935 426->430 431 2c8c951 426->431 432 2c8c93f-2c8c945 430->432 433 2c8c937-2c8c93d 430->433 434 2c8c957-2c8c974 431->434 437 2c8c94f 432->437 433->437 434->423 436->435 437->434
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: 5239fd31c95962733f9ecf20c7a38fe96b222576856b0dd3f25011f351fe0dac
                                    • Instruction ID: f5dfb15ac746c25b0b22119c07bf50794a3bb97420f0888b89e5f02bd4570333
                                    • Opcode Fuzzy Hash: 5239fd31c95962733f9ecf20c7a38fe96b222576856b0dd3f25011f351fe0dac
                                    • Instruction Fuzzy Hash: DE81D874E00219DFDB18DFAAD884A9DBBF2BF89304F14C46AE419AB365DB349945CF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 441 2c84ad9-2c84b08 442 2c84b0a 441->442 443 2c84b0f-2c84bec call 2c83908 call 2c83428 441->443 442->443 453 2c84bee 443->453 454 2c84bf3-2c84c11 443->454 453->454 484 2c84c14 call 2c84dc8 454->484 485 2c84c14 call 2c84dbb 454->485 455 2c84c1a-2c84c25 456 2c84c2c-2c84c30 455->456 457 2c84c27 455->457 458 2c84c32-2c84c33 456->458 459 2c84c35-2c84c3c 456->459 457->456 460 2c84c54-2c84c98 458->460 461 2c84c3e 459->461 462 2c84c43-2c84c51 459->462 466 2c84cfe-2c84d15 460->466 461->462 462->460 468 2c84c9a-2c84cb0 466->468 469 2c84d17-2c84d3c 466->469 473 2c84cda 468->473 474 2c84cb2-2c84cbe 468->474 475 2c84d3e-2c84d53 469->475 476 2c84d54 469->476 479 2c84ce0-2c84cfd 473->479 477 2c84cc8-2c84cce 474->477 478 2c84cc0-2c84cc6 474->478 475->476 480 2c84cd8 477->480 478->480 479->466 480->479 484->455 485->455
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: c3ddddca71197655f6535818aab218fe6e8c15892b193964faf51371a6368f44
                                    • Instruction ID: 230b330faf15089d5ddfc4d0b80de73ad7797a8a8b2081451f0397867b5647f3
                                    • Opcode Fuzzy Hash: c3ddddca71197655f6535818aab218fe6e8c15892b193964faf51371a6368f44
                                    • Instruction Fuzzy Hash: 4D81D574E00619DFDB18DFAAD984A9DBBF2BF89304F14C069E819AB365DB349941CF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 486 2c8c193-2c8c1c0 487 2c8c1c2 486->487 488 2c8c1c7-2c8c2a4 call 2c83908 call 2c83428 486->488 487->488 498 2c8c2ab-2c8c2dc call 2c84dc8 488->498 499 2c8c2a6 488->499 502 2c8c2de 498->502 503 2c8c2e3-2c8c2e7 498->503 499->498 502->503 504 2c8c2e9-2c8c2ea 503->504 505 2c8c2ec-2c8c2f3 503->505 506 2c8c30b-2c8c34f 504->506 507 2c8c2fa-2c8c308 505->507 508 2c8c2f5 505->508 512 2c8c3b5-2c8c3cc 506->512 507->506 508->507 514 2c8c3ce-2c8c3f3 512->514 515 2c8c351-2c8c367 512->515 521 2c8c40b-2c8c470 514->521 522 2c8c3f5-2c8c3f8 514->522 519 2c8c369-2c8c375 515->519 520 2c8c391 515->520 523 2c8c37f-2c8c385 519->523 524 2c8c377-2c8c37d 519->524 525 2c8c397-2c8c3b4 520->525 532 2c8c471-2c8c474 521->532 527 2c8c402-2c8c40a 522->527 526 2c8c38f 523->526 524->526 525->512 526->525 527->521 533 2c8c3f6-2c8c400 532->533 534 2c8c476-2c8c4a0 532->534 533->527 533->532 535 2c8c4a2 534->535 536 2c8c4a7-2c8c584 call 2c83908 call 2c83428 534->536 535->536 546 2c8c58b-2c8c5bc call 2c84dc8 536->546 547 2c8c586 536->547 550 2c8c5be 546->550 551 2c8c5c3-2c8c5c7 546->551 547->546 550->551 552 2c8c5c9-2c8c5ca 551->552 553 2c8c5cc-2c8c5d3 551->553 554 2c8c5eb-2c8c62f 552->554 555 2c8c5da-2c8c5e8 553->555 556 2c8c5d5 553->556 560 2c8c695-2c8c6ac 554->560 555->554 556->555 562 2c8c6ae-2c8c6d3 560->562 563 2c8c631-2c8c647 560->563 572 2c8c6eb-2c8c758 562->572 573 2c8c6d5-2c8c6d8 562->573 567 2c8c649-2c8c655 563->567 568 2c8c671 563->568 569 2c8c65f-2c8c665 567->569 570 2c8c657-2c8c65d 567->570 571 2c8c677-2c8c694 568->571 575 2c8c66f 569->575 570->575 571->560 574 2c8c6dd-2c8c6ea 572->574 579 2c8c75a-2c8c780 572->579 573->574 574->572 575->571 580 2c8c782 579->580 581 2c8c787-2c8c864 call 2c83908 call 2c83428 579->581 580->581 592 2c8c86b-2c8c88c call 2c84dc8 581->592 593 2c8c866 581->593 595 2c8c891-2c8c89c 592->595 593->592 596 2c8c89e 595->596 597 2c8c8a3-2c8c8a7 595->597 596->597 598 2c8c8a9-2c8c8aa 597->598 599 2c8c8ac-2c8c8b3 597->599 600 2c8c8cb-2c8c90f 598->600 601 2c8c8ba-2c8c8c8 599->601 602 2c8c8b5 599->602 606 2c8c975-2c8c98c 600->606 601->600 602->601 608 2c8c98e-2c8c9b3 606->608 609 2c8c911-2c8c927 606->609 618 2c8c9cb 608->618 619 2c8c9b5-2c8c9ca 608->619 613 2c8c929-2c8c935 609->613 614 2c8c951 609->614 615 2c8c93f-2c8c945 613->615 616 2c8c937-2c8c93d 613->616 617 2c8c957-2c8c974 614->617 620 2c8c94f 615->620 616->620 617->606 619->618 620->617
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: d32fe276ff105cb785d1ad2f519385badfa002a8cdb0c249b650e3cc800249ba
                                    • Instruction ID: 2b2c6e1cb5aa34f78e784da86742b48363aa6872a6defc46a2a6f51b2c8ffae3
                                    • Opcode Fuzzy Hash: d32fe276ff105cb785d1ad2f519385badfa002a8cdb0c249b650e3cc800249ba
                                    • Instruction Fuzzy Hash: DE81C774E00218DFDB18DFAAD884A9DBBF2BF89304F14C06AE419AB365DB349945CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 624 2c8ca31-2c8ca60 625 2c8ca62 624->625 626 2c8ca67-2c8cb44 call 2c83908 call 2c83428 624->626 625->626 636 2c8cb4b-2c8cb6c call 2c84dc8 626->636 637 2c8cb46 626->637 639 2c8cb71-2c8cb7c 636->639 637->636 640 2c8cb7e 639->640 641 2c8cb83-2c8cb87 639->641 640->641 642 2c8cb89-2c8cb8a 641->642 643 2c8cb8c-2c8cb93 641->643 644 2c8cbab-2c8cbef 642->644 645 2c8cb9a-2c8cba8 643->645 646 2c8cb95 643->646 650 2c8cc55-2c8cc6c 644->650 645->644 646->645 652 2c8cc6e-2c8cc93 650->652 653 2c8cbf1-2c8cc07 650->653 660 2c8ccab 652->660 661 2c8cc95-2c8ccaa 652->661 657 2c8cc09-2c8cc15 653->657 658 2c8cc31 653->658 662 2c8cc1f-2c8cc25 657->662 663 2c8cc17-2c8cc1d 657->663 659 2c8cc37-2c8cc54 658->659 659->650 661->660 664 2c8cc2f 662->664 663->664 664->659
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: 3717bf3ffc674e1a940f77e1e4eea49c8f269990a7208787e9189f4efd814b01
                                    • Instruction ID: 670e28a319e4e53d4378e34b7698985512a4550952c792175b55e39e21c7cc9e
                                    • Opcode Fuzzy Hash: 3717bf3ffc674e1a940f77e1e4eea49c8f269990a7208787e9189f4efd814b01
                                    • Instruction Fuzzy Hash: 0281B874E00618DFDB18DFAAD994A9DBBF2BF88304F14C06AE419AB365DB349941CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 668 2c8beb7-2c8bee0 669 2c8bee2 668->669 670 2c8bee7-2c8bfc4 call 2c83908 call 2c83428 668->670 669->670 680 2c8bfcb-2c8bfec call 2c84dc8 670->680 681 2c8bfc6 670->681 683 2c8bff1-2c8bffc 680->683 681->680 684 2c8bffe 683->684 685 2c8c003-2c8c007 683->685 684->685 686 2c8c009-2c8c00a 685->686 687 2c8c00c-2c8c013 685->687 688 2c8c02b-2c8c06f 686->688 689 2c8c01a-2c8c028 687->689 690 2c8c015 687->690 694 2c8c0d5-2c8c0ec 688->694 689->688 690->689 696 2c8c0ee-2c8c113 694->696 697 2c8c071-2c8c087 694->697 703 2c8c12b 696->703 704 2c8c115-2c8c12a 696->704 700 2c8c089-2c8c095 697->700 701 2c8c0b1 697->701 705 2c8c09f-2c8c0a5 700->705 706 2c8c097-2c8c09d 700->706 707 2c8c0b7-2c8c0d4 701->707 704->703 708 2c8c0af 705->708 706->708 707->694 708->707
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                    • API String ID: 0-1229222154
                                    • Opcode ID: f09dbcf6d31b153a430c4e4234532cbfeca7cecf5ab45dbef69db59b16d9b1d1
                                    • Instruction ID: a53024fd1187e2fb5048273ea7c0ac09d2e7e0b7cc56a54dc6b64bff9c75f888
                                    • Opcode Fuzzy Hash: f09dbcf6d31b153a430c4e4234532cbfeca7cecf5ab45dbef69db59b16d9b1d1
                                    • Instruction Fuzzy Hash: DB81B674E00218DFDB18DFAAD994A9DBBF2BF89304F14C06AE419AB365DB349941CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 712 2c86730-2c86766 838 2c86768 call 2c86730 712->838 839 2c86768 call 2c86880 712->839 713 2c8676e-2c86774 714 2c867c4-2c867c8 713->714 715 2c86776-2c8677a 713->715 718 2c867ca-2c867d9 714->718 719 2c867df-2c867f5 call 2c8990d 714->719 716 2c86789-2c86790 715->716 717 2c8677c-2c86781 715->717 720 2c86866-2c868a3 716->720 721 2c86796-2c8679d 716->721 717->716 722 2c867db-2c867dd 718->722 723 2c86805-2c8680f 718->723 727 2c867fb-2c86802 719->727 733 2c868ae-2c868ce 720->733 734 2c868a5-2c868ab 720->734 721->714 726 2c8679f-2c867a3 721->726 722->727 724 2c86819-2c8681d 723->724 725 2c86811-2c86817 723->725 729 2c86825-2c8685f 724->729 730 2c8681f 724->730 725->729 731 2c867b2-2c867b9 726->731 732 2c867a5-2c867aa 726->732 729->720 730->729 731->720 735 2c867bf-2c867c2 731->735 732->731 740 2c868d0 733->740 741 2c868d5-2c868dc 733->741 734->733 735->727 743 2c86c64-2c86c6d 740->743 744 2c868de-2c868e9 741->744 745 2c868ef-2c86902 744->745 746 2c86c75-2c86c9d 744->746 751 2c86918-2c86933 745->751 752 2c86904-2c86912 745->752 756 2c86935-2c8693b 751->756 757 2c86957-2c8695a 751->757 752->751 755 2c86bec-2c86bf3 752->755 755->743 760 2c86bf5-2c86bf7 755->760 758 2c8693d 756->758 759 2c86944-2c86947 756->759 761 2c86960-2c86963 757->761 762 2c86ab4-2c86aba 757->762 758->759 758->762 763 2c8697a-2c86980 758->763 764 2c86ba6-2c86ba9 758->764 759->763 765 2c86949-2c8694c 759->765 766 2c86bf9-2c86bfe 760->766 767 2c86c06-2c86c0c 760->767 761->762 769 2c86969-2c8696f 761->769 762->764 768 2c86ac0-2c86ac5 762->768 774 2c86982-2c86984 763->774 775 2c86986-2c86988 763->775 776 2c86baf-2c86bb5 764->776 777 2c86c70 764->777 770 2c86952 765->770 771 2c869e6-2c869ec 765->771 766->767 767->746 772 2c86c0e-2c86c13 767->772 768->764 769->762 773 2c86975 769->773 770->764 771->764 783 2c869f2-2c869f8 771->783 781 2c86c58-2c86c5b 772->781 782 2c86c15-2c86c1a 772->782 773->764 778 2c86992-2c8699b 774->778 775->778 779 2c86bda-2c86bde 776->779 780 2c86bb7-2c86bbf 776->780 777->746 787 2c8699d-2c869a8 778->787 788 2c869ae-2c869d6 778->788 779->755 789 2c86be0-2c86be6 779->789 780->746 786 2c86bc5-2c86bd4 780->786 781->777 790 2c86c5d-2c86c62 781->790 782->777 791 2c86c1c 782->791 784 2c869fa-2c869fc 783->784 785 2c869fe-2c86a00 783->785 792 2c86a0a-2c86a21 784->792 785->792 786->751 786->779 787->764 787->788 811 2c86aca-2c86b00 788->811 812 2c869dc-2c869e1 788->812 789->744 789->755 790->743 790->760 793 2c86c23-2c86c28 791->793 804 2c86a4c-2c86a73 792->804 805 2c86a23-2c86a3c 792->805 794 2c86c4a-2c86c4c 793->794 795 2c86c2a-2c86c2c 793->795 794->777 802 2c86c4e-2c86c51 794->802 799 2c86c3b-2c86c41 795->799 800 2c86c2e-2c86c33 795->800 799->746 803 2c86c43-2c86c48 799->803 800->799 802->781 803->794 807 2c86c1e-2c86c21 803->807 804->777 815 2c86a79-2c86a7c 804->815 805->811 816 2c86a42-2c86a47 805->816 807->777 807->793 819 2c86b0d-2c86b15 811->819 820 2c86b02-2c86b06 811->820 812->811 815->777 818 2c86a82-2c86aab 815->818 816->811 818->811 835 2c86aad-2c86ab2 818->835 819->777 823 2c86b1b-2c86b20 819->823 821 2c86b08-2c86b0b 820->821 822 2c86b25-2c86b29 820->822 821->819 821->822 824 2c86b48-2c86b4c 822->824 825 2c86b2b-2c86b31 822->825 823->764 828 2c86b4e-2c86b54 824->828 829 2c86b56-2c86b75 call 2c86e67 824->829 825->824 827 2c86b33-2c86b3b 825->827 827->777 830 2c86b41-2c86b46 827->830 828->829 832 2c86b7b-2c86b7f 828->832 829->832 830->764 832->764 833 2c86b81-2c86b9d 832->833 833->764 835->811 838->713 839->713
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o]q$(o]q$,aq$,aq
                                    • API String ID: 0-1947289240
                                    • Opcode ID: 4aebaec9ad370b2712c8fb052ff60ef4c6ffdfb8a8f85664cb67488303166376
                                    • Instruction ID: 28627e1289b6310285edc6cfaf7807aaf805cf6c147cc3146491937d976d8607
                                    • Opcode Fuzzy Hash: 4aebaec9ad370b2712c8fb052ff60ef4c6ffdfb8a8f85664cb67488303166376
                                    • Instruction Fuzzy Hash: C2026E70A00219DFCB15EF69C984AAEBBFAFF89308F25C469E515AB261D730DD41CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1696 2c8b4f3-2c8b4f9 1697 2c8b4fb-2c8b520 1696->1697 1698 2c8b4cd-2c8b4e2 1696->1698 1699 2c8b522 1697->1699 1700 2c8b527-2c8b604 call 2c83908 call 2c83428 1697->1700 1699->1700 1711 2c8b60b-2c8b62c call 2c84dc8 1700->1711 1712 2c8b606 1700->1712 1714 2c8b631-2c8b63c 1711->1714 1712->1711 1715 2c8b63e 1714->1715 1716 2c8b643-2c8b647 1714->1716 1715->1716 1717 2c8b649-2c8b64a 1716->1717 1718 2c8b64c-2c8b653 1716->1718 1719 2c8b66b-2c8b6af 1717->1719 1720 2c8b65a-2c8b668 1718->1720 1721 2c8b655 1718->1721 1725 2c8b715-2c8b72c 1719->1725 1720->1719 1721->1720 1727 2c8b72e-2c8b753 1725->1727 1728 2c8b6b1-2c8b6c7 1725->1728 1735 2c8b76b 1727->1735 1736 2c8b755-2c8b76a 1727->1736 1732 2c8b6c9-2c8b6d5 1728->1732 1733 2c8b6f1 1728->1733 1737 2c8b6df-2c8b6e5 1732->1737 1738 2c8b6d7-2c8b6dd 1732->1738 1734 2c8b6f7-2c8b714 1733->1734 1734->1725 1741 2c8b76c 1735->1741 1736->1735 1739 2c8b6ef 1737->1739 1738->1739 1739->1734 1741->1741
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p$PH]q$PH]q
                                    • API String ID: 0-2023588385
                                    • Opcode ID: 30b3e3e942bc1a1246a0395bcc45db5df98ed68bf7de757000e3e04d4424fbc3
                                    • Instruction ID: 634ed4e9d806aa1818540d9c3d0a11ffcfcbe8207f1bf904748f3b96913c8b93
                                    • Opcode Fuzzy Hash: 30b3e3e942bc1a1246a0395bcc45db5df98ed68bf7de757000e3e04d4424fbc3
                                    • Instruction Fuzzy Hash: 9F61C474E006599FDB18EFAAD984A9DFBF2BF89304F14C069E418AB365DB349941CF10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o]q$Haq
                                    • API String ID: 0-903699183
                                    • Opcode ID: 5d6340f960e1cfd70d846521b946f6654cdc5f2ff2b82e23542accee9941cf71
                                    • Instruction ID: 4f763e8be465fe8ef0b96b4ed0b1620a06816472bb90b284111b1b22ec791094
                                    • Opcode Fuzzy Hash: 5d6340f960e1cfd70d846521b946f6654cdc5f2ff2b82e23542accee9941cf71
                                    • Instruction Fuzzy Hash: 34F17E71A002198FDB14EF69C8547AEBBBABFC8308F24C559E446DB395DF349942CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Xaq$$]q
                                    • API String ID: 0-1280934391
                                    • Opcode ID: d36b98c294573a322acf23862778aadbcf27f0875861e1964cc5d9bfce806604
                                    • Instruction ID: e146f5cefc537085a90f4f6a02306b7586833d15af1c8eb012abfaa2062048a9
                                    • Opcode Fuzzy Hash: d36b98c294573a322acf23862778aadbcf27f0875861e1964cc5d9bfce806604
                                    • Instruction Fuzzy Hash: A8F15D74F002589FDB18EFB9D8545AEBBB2BF88714B14856AE406EB358DF359C02CB41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH]q$PH]q
                                    • API String ID: 0-1166926398
                                    • Opcode ID: b0c56aa5e11593ce194f6c2a45ef3ee0e380930c47b4aab71a65dba69a7f2ab8
                                    • Instruction ID: af7611f627f8090dd0e09d764fe4317ed78848c60263d1fb0a661b9f614f2f36
                                    • Opcode Fuzzy Hash: b0c56aa5e11593ce194f6c2a45ef3ee0e380930c47b4aab71a65dba69a7f2ab8
                                    • Instruction Fuzzy Hash: 989137B4E00268DFDB58DFA9D854ADDBBF2BF89304F2081AAD419AB354DB345941CF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c5beeae83a3441e14ed8e47f928ba492895810e2f01aec93e6320d8db9f36faa
                                    • Instruction ID: 13a61be8e4b7be6f3766dfbc7a6bcb0173fa188f9ce18bea4f9654d605d09588
                                    • Opcode Fuzzy Hash: c5beeae83a3441e14ed8e47f928ba492895810e2f01aec93e6320d8db9f36faa
                                    • Instruction Fuzzy Hash: CEF1D174E01218CFDB54DFA9D884B9DBBB2BF88304F5481A9E818AB355DB34A985CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b48e67ed522cf10be826b2fca6fd8eb4bda06f5493becabceab05543d9c67872
                                    • Instruction ID: 673f9b3c272049d7ea0b86c57b9290f2c83c89754eb93d2169df96b938136deb
                                    • Opcode Fuzzy Hash: b48e67ed522cf10be826b2fca6fd8eb4bda06f5493becabceab05543d9c67872
                                    • Instruction Fuzzy Hash: 93827B74E012299FDB64DF69DD84B9DBBB2BB89300F1481EA980DA7264DB345E81CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 018ae9ae21206c1b22dded91200b915106a687684f7c70b7b5d125aa3f6a028d
                                    • Instruction ID: fda272a03dd7edb40b34e225759718b91f0a3e1ecd3fbfe4b45bec28ec06390c
                                    • Opcode Fuzzy Hash: 018ae9ae21206c1b22dded91200b915106a687684f7c70b7b5d125aa3f6a028d
                                    • Instruction Fuzzy Hash: D672C074E012298FDB65EF69C884BEDBBB2BF49304F5481E9D409A7255DB34AE81CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 157bd26c1e8c8b34c9acf361122d9627d40499a9dd80955eaed843dae071fdb5
                                    • Instruction ID: 327bff5ad45618f9a1c9d2aa016d32c1a1166d90d44f54bda9dc6a9fedb6617f
                                    • Opcode Fuzzy Hash: 157bd26c1e8c8b34c9acf361122d9627d40499a9dd80955eaed843dae071fdb5
                                    • Instruction Fuzzy Hash: E4E1F3B4E01218CFEB54DFA5C944B9DBBB2BF89304F2081A9D409AB395DB355E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 951aca8f786143aa2b609a6578cece72ea977147013de205ccae04e260b36351
                                    • Instruction ID: fd3a1a95131bfdf122af0c975ab3000ed5267f156bbe4ec947c194a4ff8b7027
                                    • Opcode Fuzzy Hash: 951aca8f786143aa2b609a6578cece72ea977147013de205ccae04e260b36351
                                    • Instruction Fuzzy Hash: AFC1D074E00218CFDB54DFA5D984B9DBBB2BF89304F2081A9D809AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 163692bb5dd87efdf69f219ce4805cdefbd0ee24e9970902dd9a63862fdb12ee
                                    • Instruction ID: 918675a90e454bfb594ce68966eb88fd6b16024b9ffc0b37e4552b352e4e20c7
                                    • Opcode Fuzzy Hash: 163692bb5dd87efdf69f219ce4805cdefbd0ee24e9970902dd9a63862fdb12ee
                                    • Instruction Fuzzy Hash: A9C1D374E00218CFDB54EFA5D944B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1ae1a0a5e8191c517e74aef55e5efe850fc3a4e3f29d4ced5cc9ddae93bbf9e9
                                    • Instruction ID: 962a307f410bae1241d24b83cfe4154a0ba51ce1beacb73826a53de14121bbe5
                                    • Opcode Fuzzy Hash: 1ae1a0a5e8191c517e74aef55e5efe850fc3a4e3f29d4ced5cc9ddae93bbf9e9
                                    • Instruction Fuzzy Hash: D6C1D274E00228CFDB54DFA5D994B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 28d25d5d07a6095c5017eaec4253680050c59b1d5135083d8e41b34c4c465370
                                    • Instruction ID: 8e6be2a852477c4dc35e2f071ac61cb13e268929deefe91293223cad975388a6
                                    • Opcode Fuzzy Hash: 28d25d5d07a6095c5017eaec4253680050c59b1d5135083d8e41b34c4c465370
                                    • Instruction Fuzzy Hash: F3A1F470D00218CFDB14EFA9C954BDDBBB1FF89314F208269E409AB291DB749985CF55
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7260c698e40f8eab9b52e238ff4b2a9027a1a55f8833d9123800452f6860fe36
                                    • Instruction ID: c8003e48213d308ec5d53c6f5e4f772c38fe5191aaf38395500584c8b9cd53ad
                                    • Opcode Fuzzy Hash: 7260c698e40f8eab9b52e238ff4b2a9027a1a55f8833d9123800452f6860fe36
                                    • Instruction Fuzzy Hash: C5A10570D00218CFDB14DFA8C594BDDBBB1FF89304F208269E409AB291DB759985CF54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b52df0b1c7ea271e2c4290d42e1f38c500b32b3a86a1d2469e62112c60ce173
                                    • Instruction ID: c7c0ee04757c48f25edad9fcd9b0761209b5aee15a28f53e968b3acd73201262
                                    • Opcode Fuzzy Hash: 8b52df0b1c7ea271e2c4290d42e1f38c500b32b3a86a1d2469e62112c60ce173
                                    • Instruction Fuzzy Hash: F8A1B3B0E01218DFEB68DF6AC944B9DBAF2BF89300F54C1AAD40DA7255DB305A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e467fe56698e162115aa08175c0d6c92341be60cf547ff1e1ff975ab00e09945
                                    • Instruction ID: e362f8b9e994f87d071b722406fdd3ed4ea83378ac08d869c55214f3d98f7419
                                    • Opcode Fuzzy Hash: e467fe56698e162115aa08175c0d6c92341be60cf547ff1e1ff975ab00e09945
                                    • Instruction Fuzzy Hash: EDA1C3B0E012289FEB68DF6AC944B9DBBF2BF89300F14D1AAD40DA7255D7305A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 27f28c40e87c6a080cd042fe280a92e7b3b411fb7680c858d1edb4e589a84e6d
                                    • Instruction ID: 3e584e5d83bb85bde81f26e8a94a7efa3c69d34717300e278f723d8ea0c42966
                                    • Opcode Fuzzy Hash: 27f28c40e87c6a080cd042fe280a92e7b3b411fb7680c858d1edb4e589a84e6d
                                    • Instruction Fuzzy Hash: 2EA1B2B0E012289FEB64CF6AC944B9DFBF2BF89300F54D0AAD409A7255DB345A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 431b178574f512affdd37aef6dbd1c9444ba02a7feb24240384c735a094be0ec
                                    • Instruction ID: e0e87c9a3d8b859629b25b12198dbf381e7908d9ed884a1d2924db6c03917b79
                                    • Opcode Fuzzy Hash: 431b178574f512affdd37aef6dbd1c9444ba02a7feb24240384c735a094be0ec
                                    • Instruction Fuzzy Hash: 9BA1A3B4E012288FEB64DF6AC944B9DBBF2AF89300F54C1AAD40DA7255DB305A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94e0a00fbefdc257749e06a87f9f4a0e6722482a203c53f274bb260c64cb6300
                                    • Instruction ID: a4fe453c8e67d2af75227ec76607fda15bc2e28e32ad44fee150a890026822d4
                                    • Opcode Fuzzy Hash: 94e0a00fbefdc257749e06a87f9f4a0e6722482a203c53f274bb260c64cb6300
                                    • Instruction Fuzzy Hash: 2CA1C3B0E012289FEB64DF6AC944B9DBBF2BF89300F54D0AAD40DA7254DB345A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4c4f9d2792f40a88170f6b9768e8f7269f2b4b0d079860ba1b40a291f7d024e
                                    • Instruction ID: 22c95e3b8cbd33e6807b243cc199cec448bc4e4709e49c57da9b0ab1c182f9fb
                                    • Opcode Fuzzy Hash: a4c4f9d2792f40a88170f6b9768e8f7269f2b4b0d079860ba1b40a291f7d024e
                                    • Instruction Fuzzy Hash: FCA1B3B4E012288FEB64DF6AC944B9DBBF2BF89300F54C0EAD409A7255D7345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1eb6d2cc17d36506a321533fa3be97999a04b1f1c397775c92dc4550f4f516c6
                                    • Instruction ID: 8257db2f19b1a7f4aec7e19c4bddef5707244a33cf7bbdd46b4f0c9faab58118
                                    • Opcode Fuzzy Hash: 1eb6d2cc17d36506a321533fa3be97999a04b1f1c397775c92dc4550f4f516c6
                                    • Instruction Fuzzy Hash: 5BA1A4B4E012188FEB68DF6AC944B9DFBF2AF89300F54C0AAD409B7255DB345A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e568f3f84b85520c23c56fa80386a8fb23deff8a23e52963d31ea8a67f110ffe
                                    • Instruction ID: dfb2d8f5fe1c6bc83a41ce6fc9b89ce989167d466408d5c555888ea5ae636e8d
                                    • Opcode Fuzzy Hash: e568f3f84b85520c23c56fa80386a8fb23deff8a23e52963d31ea8a67f110ffe
                                    • Instruction Fuzzy Hash: EEA1A3B4E012189FEB68DF6AC944B9DFBF2BF89300F54C1AAD409A7254DB305A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 76c48e0e70eecbdf887c93fb9e2acd35a07858ffd7587c26c8832c7b6da0f330
                                    • Instruction ID: 84a5605b0ee24dc9aa4b46539a1901cd6e0a6087eb6238ff440462199ffd10de
                                    • Opcode Fuzzy Hash: 76c48e0e70eecbdf887c93fb9e2acd35a07858ffd7587c26c8832c7b6da0f330
                                    • Instruction Fuzzy Hash: 14A1A2B0E012289FEB64DF6AC944B9DFBF2AF89300F54C1AAD40DA7254D7309A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b20e6ea81bfddcd7bb18178853ae0abb453ea5e13fc64fab548aa68e745835d6
                                    • Instruction ID: e954ac51e6d7ccb4e46aedae22a6b3aa8261c981e0bf7868b46012ef3d4bb9c3
                                    • Opcode Fuzzy Hash: b20e6ea81bfddcd7bb18178853ae0abb453ea5e13fc64fab548aa68e745835d6
                                    • Instruction Fuzzy Hash: C591E374D00218CFEB54EFA8C984BECBBB1FF49314F249269E409AB291DB749985CF54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94fe418c8235d1bfb7ab75781e69473950a7ccc7a80f302d79de74f5313a68e3
                                    • Instruction ID: a8351d9b40161a1a38c2cff8d4fc0a3a2e2904c7b803839086b107bd94d766fc
                                    • Opcode Fuzzy Hash: 94fe418c8235d1bfb7ab75781e69473950a7ccc7a80f302d79de74f5313a68e3
                                    • Instruction Fuzzy Hash: DB819274E412299FDB65DF29DC90BDDBBB2BB89300F1481EAD849A7254DB305E81CF44
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94379760df89866d5ace638697f0beef32b079308c463f17438b83f563039434
                                    • Instruction ID: f9e64ee0a146c2e83c7aab9e05c9f6f4e354a3f0dfa74ea226e0cdc60422efdc
                                    • Opcode Fuzzy Hash: 94379760df89866d5ace638697f0beef32b079308c463f17438b83f563039434
                                    • Instruction Fuzzy Hash: 397185B0E016188FEB68DF6AC944B9DBBF2AF89300F14C1EAD40DA7255DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6a064552a5314b943b09b59407762f45c0495aecf4e8c644942f4494d98eb723
                                    • Instruction ID: 4552cad79fe23cc7844a2a3f9a501319c78a9127c69397f7e1ef0ea69097ebbd
                                    • Opcode Fuzzy Hash: 6a064552a5314b943b09b59407762f45c0495aecf4e8c644942f4494d98eb723
                                    • Instruction Fuzzy Hash: 687175B1E006189FEB68DF6AC94479DBAF2AF89300F14C1EAD40DA7255DB344A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48dcff9a31cdf1567cc34835daff534b19e12e6f7e59d06b7d66daf67f53f2ab
                                    • Instruction ID: 0cf8d2ded3a47e249e2f86206da3c9e11ef4edfc2cef68fd04c7225e85c3c6d8
                                    • Opcode Fuzzy Hash: 48dcff9a31cdf1567cc34835daff534b19e12e6f7e59d06b7d66daf67f53f2ab
                                    • Instruction Fuzzy Hash: 307185B0E016289FEB68DF6AC94479DFBF2AF89300F14C1AAD40DA7254DB344A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05fd223dedf1bfd8a3c33364765fd31d243d0110d840fb7441eca0e9373d5d15
                                    • Instruction ID: b41104435303c21349d88fc176d11120d610466c8026dd36343343cbb1873f0d
                                    • Opcode Fuzzy Hash: 05fd223dedf1bfd8a3c33364765fd31d243d0110d840fb7441eca0e9373d5d15
                                    • Instruction Fuzzy Hash: BC518374E01218DFDB58DFAAD5849DDBBF2BF89310F24816AE419AB365DB30A901CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 54873a49538adfeff85f0835d66c8839429a30b921b8d2c2d14fdad86a597271
                                    • Instruction ID: 46756affebbca3ac87cbe3f31921b59cc11038361afcb4004560533d03a1a05d
                                    • Opcode Fuzzy Hash: 54873a49538adfeff85f0835d66c8839429a30b921b8d2c2d14fdad86a597271
                                    • Instruction Fuzzy Hash: EA41D1B0D002088BEB58DFAAD9547DEBBB2BF88304F14D16AC418AB294DB755946CF54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 835cfa7812e6b7fd751f701ebfb70065c4c4e79691e55dd8c71c2bc251450ff9
                                    • Instruction ID: 9e0165a27d64ea66bc2ad9cbb0c5b6887cef42bbf52d6076b3a12b8b4d55a37a
                                    • Opcode Fuzzy Hash: 835cfa7812e6b7fd751f701ebfb70065c4c4e79691e55dd8c71c2bc251450ff9
                                    • Instruction Fuzzy Hash: 17416AB1D016189BEB58CF6BC9457C9FAF3BFC8304F14C1AAD50CA6264EB740A858F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a21d53d36fc8cbb0fd640782a98d20b1bccb2a98d546a418e184d00854cb9f7
                                    • Instruction ID: abbf861910bfe71989dc8900476e7a114952309e8d7d6f3698e7a8570ffbd372
                                    • Opcode Fuzzy Hash: 2a21d53d36fc8cbb0fd640782a98d20b1bccb2a98d546a418e184d00854cb9f7
                                    • Instruction Fuzzy Hash: 9F4147B1D016188FEB58CF6BC9457DAFAF3AFC8304F14C1AAC50CA6265DB741A868F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 82dfddeeda38bd7ccf3f0a3563a53b3f041743288cc9f4fb341b73a8eb796462
                                    • Instruction ID: 904c901cc7c302f185053ed849ef3288272c84a9bf1e0303a3f01180b8d099f9
                                    • Opcode Fuzzy Hash: 82dfddeeda38bd7ccf3f0a3563a53b3f041743288cc9f4fb341b73a8eb796462
                                    • Instruction Fuzzy Hash: D84158B1E016189BEB58CF6BC9457D9FAF3AFC8304F14C1AAC50CA6264DB740A86CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c93e6c8a0bb93f7333c86687364cc52f176d6735e38e6747c19fab71a41c626
                                    • Instruction ID: d3e8e09a41726874538fe8e7c154dbbdf1bd69eab95a060667b57c82f7a49045
                                    • Opcode Fuzzy Hash: 7c93e6c8a0bb93f7333c86687364cc52f176d6735e38e6747c19fab71a41c626
                                    • Instruction Fuzzy Hash: EC416AB1D016189BEB58CF6BC9457C9FAF3AFC8300F04C1AAC50CA6264DB740A86CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f26b43a7c7e4aa3d9ce8f797e69584ed19638739d6211e8c5f63e1d105c042f3
                                    • Instruction ID: c6cb153c152ced431f04fe08ff09efeae14a8eba753d5d4d9e2f9ff8914e9b5e
                                    • Opcode Fuzzy Hash: f26b43a7c7e4aa3d9ce8f797e69584ed19638739d6211e8c5f63e1d105c042f3
                                    • Instruction Fuzzy Hash: E1415AB1D016189BEB58CF6BC9457D9FAF3AFC8300F14C1AAC50CA6254DB740A868F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b5a1b31cacf6389a00963820d856ed9d0e82b58df91fb5b5a89937be39cb5afc
                                    • Instruction ID: 6fe616c3ff62eb5da6738c01270d6b11f5552338f37410fc69e8864f9934c852
                                    • Opcode Fuzzy Hash: b5a1b31cacf6389a00963820d856ed9d0e82b58df91fb5b5a89937be39cb5afc
                                    • Instruction Fuzzy Hash: 76415AB1D016189BEB58CF6BD9457D9FAF3AFC8300F14C1AAC50CA6264DB740A86CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 2c86e67-2c86e8d 1 2c872bc-2c872c0 0->1 2 2c86e93-2c86eb6 0->2 3 2c872d9-2c872e7 1->3 4 2c872c2-2c872d6 1->4 11 2c86ebc-2c86ec9 2->11 12 2c86f64-2c86f68 2->12 9 2c87358-2c8736d 3->9 10 2c872e9-2c872fe 3->10 18 2c8736f-2c87372 9->18 19 2c87374-2c87381 9->19 20 2c87300-2c87303 10->20 21 2c87305-2c87312 10->21 24 2c86ed8 11->24 25 2c86ecb-2c86ed6 11->25 15 2c86f6a-2c86f78 12->15 16 2c86fb0-2c86fb9 12->16 15->16 30 2c86f7a-2c86f95 15->30 22 2c873cf 16->22 23 2c86fbf-2c86fc9 16->23 26 2c87383-2c873be 18->26 19->26 27 2c87314-2c87355 20->27 21->27 31 2c873d4-2c87404 22->31 23->1 28 2c86fcf-2c86fd8 23->28 32 2c86eda-2c86edc 24->32 25->32 75 2c873c5-2c873cc 26->75 35 2c86fda-2c86fdf 28->35 36 2c86fe7-2c86ff3 28->36 57 2c86fa3 30->57 58 2c86f97-2c86fa1 30->58 53 2c8741d-2c87424 31->53 54 2c87406-2c8741c 31->54 32->12 39 2c86ee2-2c86f44 32->39 35->36 36->31 37 2c86ff9-2c86fff 36->37 43 2c87005-2c87015 37->43 44 2c872a6-2c872aa 37->44 87 2c86f4a-2c86f61 39->87 88 2c86f46 39->88 59 2c87029-2c8702b 43->59 60 2c87017-2c87027 43->60 44->22 49 2c872b0-2c872b6 44->49 49->1 49->28 63 2c86fa5-2c86fa7 57->63 58->63 64 2c8702e-2c87034 59->64 60->64 63->16 70 2c86fa9 63->70 64->44 71 2c8703a-2c87049 64->71 70->16 72 2c8704f 71->72 73 2c870f7-2c87122 call 2c86ca0 * 2 71->73 77 2c87052-2c87063 72->77 90 2c87128-2c8712c 73->90 91 2c8720c-2c87226 73->91 77->31 79 2c87069-2c8707b 77->79 79->31 82 2c87081-2c87099 79->82 144 2c8709b call 2c87438 82->144 145 2c8709b call 2c87437 82->145 84 2c870a1-2c870b1 84->44 86 2c870b7-2c870ba 84->86 92 2c870bc-2c870c2 86->92 93 2c870c4-2c870c7 86->93 87->12 88->87 90->44 94 2c87132-2c87136 90->94 91->1 111 2c8722c-2c87230 91->111 92->93 95 2c870cd-2c870d0 92->95 93->22 93->95 98 2c87138-2c87145 94->98 99 2c8715e-2c87164 94->99 100 2c870d8-2c870db 95->100 101 2c870d2-2c870d6 95->101 114 2c87154 98->114 115 2c87147-2c87152 98->115 103 2c8719f-2c871a5 99->103 104 2c87166-2c8716a 99->104 100->22 102 2c870e1-2c870e5 100->102 101->100 101->102 102->22 109 2c870eb-2c870f1 102->109 106 2c871b1-2c871b7 103->106 107 2c871a7-2c871ab 103->107 104->103 110 2c8716c-2c87175 104->110 112 2c871b9-2c871bd 106->112 113 2c871c3-2c871c5 106->113 107->75 107->106 109->73 109->77 116 2c87184-2c8719a 110->116 117 2c87177-2c8717c 110->117 118 2c8726c-2c87270 111->118 119 2c87232-2c8723c call 2c85b50 111->119 112->44 112->113 120 2c871fa-2c871fc 113->120 121 2c871c7-2c871d0 113->121 122 2c87156-2c87158 114->122 115->122 116->44 117->116 118->75 124 2c87276-2c8727a 118->124 119->118 132 2c8723e-2c87253 119->132 120->44 129 2c87202-2c87209 120->129 127 2c871df-2c871f5 121->127 128 2c871d2-2c871d7 121->128 122->44 122->99 124->75 130 2c87280-2c8728d 124->130 127->44 128->127 135 2c8729c 130->135 136 2c8728f-2c8729a 130->136 132->118 141 2c87255-2c8726a 132->141 138 2c8729e-2c872a0 135->138 136->138 138->44 138->75 141->1 141->118 144->84 145->84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                    • API String ID: 0-1435242062
                                    • Opcode ID: a283291ec5774fbc0b97585e772123eb8e939baec7eeb439b6683b6bf456bbf9
                                    • Instruction ID: 02af8e9afe2b91e0378d52b62c7e914d331bccf419cfcdceb8705a404e8fdc8b
                                    • Opcode Fuzzy Hash: a283291ec5774fbc0b97585e772123eb8e939baec7eeb439b6683b6bf456bbf9
                                    • Instruction Fuzzy Hash: CE125C34A00609CFCB14DF69D984AAEBBF6FF89318F258569E809DB261D730ED45CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1479 2c887e9-2c88805 1480 2c88811-2c8881d 1479->1480 1481 2c88807-2c8880c 1479->1481 1484 2c8882d-2c88832 1480->1484 1485 2c8881f-2c88821 1480->1485 1482 2c88ba6-2c88bab 1481->1482 1484->1482 1486 2c88829-2c8882b 1485->1486 1486->1484 1487 2c88837-2c88843 1486->1487 1489 2c88853-2c88858 1487->1489 1490 2c88845-2c88851 1487->1490 1489->1482 1490->1489 1492 2c8885d-2c88868 1490->1492 1494 2c8886e-2c88879 1492->1494 1495 2c88912-2c8891d 1492->1495 1498 2c8887b-2c8888d 1494->1498 1499 2c8888f 1494->1499 1500 2c889c0-2c889cc 1495->1500 1501 2c88923-2c88932 1495->1501 1502 2c88894-2c88896 1498->1502 1499->1502 1510 2c889dc-2c889ee 1500->1510 1511 2c889ce-2c889da 1500->1511 1508 2c88943-2c88952 1501->1508 1509 2c88934-2c8893e 1501->1509 1505 2c88898-2c888a7 1502->1505 1506 2c888b6-2c888bb 1502->1506 1505->1506 1516 2c888a9-2c888b4 1505->1516 1506->1482 1518 2c88954-2c88960 1508->1518 1519 2c88976-2c8897f 1508->1519 1509->1482 1523 2c889f0-2c889fc 1510->1523 1524 2c88a12-2c88a17 1510->1524 1511->1510 1520 2c88a1c-2c88a27 1511->1520 1516->1506 1527 2c888c0-2c888c9 1516->1527 1529 2c8896c-2c88971 1518->1529 1530 2c88962-2c88967 1518->1530 1533 2c88981-2c88993 1519->1533 1534 2c88995 1519->1534 1531 2c88b09-2c88b14 1520->1531 1532 2c88a2d-2c88a36 1520->1532 1543 2c88a08-2c88a0d 1523->1543 1544 2c889fe-2c88a03 1523->1544 1524->1482 1538 2c888cb-2c888d0 1527->1538 1539 2c888d5-2c888e4 1527->1539 1529->1482 1530->1482 1548 2c88b3e-2c88b4d 1531->1548 1549 2c88b16-2c88b20 1531->1549 1546 2c88a38-2c88a4a 1532->1546 1547 2c88a4c 1532->1547 1536 2c8899a-2c8899c 1533->1536 1534->1536 1536->1500 1541 2c8899e-2c889aa 1536->1541 1538->1482 1557 2c88908-2c8890d 1539->1557 1558 2c888e6-2c888f2 1539->1558 1559 2c889ac-2c889b1 1541->1559 1560 2c889b6-2c889bb 1541->1560 1543->1482 1544->1482 1550 2c88a51-2c88a53 1546->1550 1547->1550 1562 2c88b4f-2c88b5e 1548->1562 1563 2c88ba1 1548->1563 1565 2c88b22-2c88b2e 1549->1565 1566 2c88b37-2c88b3c 1549->1566 1555 2c88a63 1550->1555 1556 2c88a55-2c88a61 1550->1556 1564 2c88a68-2c88a6a 1555->1564 1556->1564 1557->1482 1572 2c888fe-2c88903 1558->1572 1573 2c888f4-2c888f9 1558->1573 1559->1482 1560->1482 1562->1563 1575 2c88b60-2c88b78 1562->1575 1563->1482 1569 2c88a6c-2c88a71 1564->1569 1570 2c88a76-2c88a89 1564->1570 1565->1566 1577 2c88b30-2c88b35 1565->1577 1566->1482 1569->1482 1578 2c88a8b 1570->1578 1579 2c88ac1-2c88acb 1570->1579 1572->1482 1573->1482 1590 2c88b9a-2c88b9f 1575->1590 1591 2c88b7a-2c88b98 1575->1591 1577->1482 1581 2c88a8e-2c88a9f call 2c88258 1578->1581 1586 2c88aea-2c88af6 1579->1586 1587 2c88acd-2c88ad9 call 2c88258 1579->1587 1588 2c88aa1-2c88aa4 1581->1588 1589 2c88aa6-2c88aab 1581->1589 1596 2c88af8-2c88afd 1586->1596 1597 2c88aff 1586->1597 1601 2c88adb-2c88ade 1587->1601 1602 2c88ae0-2c88ae5 1587->1602 1588->1589 1594 2c88ab0-2c88ab3 1588->1594 1589->1482 1590->1482 1591->1482 1598 2c88ab9-2c88abf 1594->1598 1599 2c88bac-2c88bc0 1594->1599 1603 2c88b04 1596->1603 1597->1603 1598->1579 1598->1581 1606 2c88c12-2c88c19 1599->1606 1607 2c88bc2-2c88bc5 1599->1607 1601->1586 1601->1602 1602->1482 1603->1482 1610 2c88c1b-2c88c2a 1606->1610 1611 2c88c4e-2c88c60 1606->1611 1607->1606 1610->1611 1616 2c88c2c-2c88c42 1610->1616 1614 2c88d5f 1611->1614 1615 2c88c66-2c88c74 1611->1615 1617 2c88d61-2c88d65 1614->1617 1620 2c88c80-2c88c83 1615->1620 1621 2c88c76-2c88c7b 1615->1621 1616->1611 1625 2c88c44-2c88c49 1616->1625 1623 2c88c89-2c88c8c 1620->1623 1624 2c88d66-2c88d7d 1620->1624 1621->1617 1623->1615 1626 2c88c8e 1623->1626 1625->1617 1626->1614
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$;]q
                                    • API String ID: 0-1096896373
                                    • Opcode ID: 85129dca6bb5d0ccf55c85ca2e158dd6287c9edc63b1b6b6de32a368c9d2d0bd
                                    • Instruction ID: 8ba16e90b4f7ab0498af4b886dbcd3bae1f690b809707df4b9846f922f1e262b
                                    • Opcode Fuzzy Hash: 85129dca6bb5d0ccf55c85ca2e158dd6287c9edc63b1b6b6de32a368c9d2d0bd
                                    • Instruction Fuzzy Hash: 0AD1A0703451098FDB15AB29CD58B393796AFC570CF8986BAE102CFBA1EB28DD41C752

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2180 2c877f0-2c87cde 2255 2c88230-2c88265 2180->2255 2256 2c87ce4-2c87cf4 2180->2256 2261 2c88271-2c8828f 2255->2261 2262 2c88267-2c8826c 2255->2262 2256->2255 2257 2c87cfa-2c87d0a 2256->2257 2257->2255 2258 2c87d10-2c87d20 2257->2258 2258->2255 2260 2c87d26-2c87d36 2258->2260 2260->2255 2263 2c87d3c-2c87d4c 2260->2263 2273 2c88291-2c8829b 2261->2273 2274 2c88306-2c88312 2261->2274 2264 2c88356-2c8835b 2262->2264 2263->2255 2265 2c87d52-2c87d62 2263->2265 2265->2255 2267 2c87d68-2c87d78 2265->2267 2267->2255 2269 2c87d7e-2c87d8e 2267->2269 2269->2255 2270 2c87d94-2c87da4 2269->2270 2270->2255 2272 2c87daa-2c87dba 2270->2272 2272->2255 2275 2c87dc0-2c8822f 2272->2275 2273->2274 2279 2c8829d-2c882a9 2273->2279 2280 2c88329-2c88335 2274->2280 2281 2c88314-2c88320 2274->2281 2289 2c882ab-2c882b6 2279->2289 2290 2c882ce-2c882d1 2279->2290 2287 2c8834c-2c8834e 2280->2287 2288 2c88337-2c88343 2280->2288 2281->2280 2291 2c88322-2c88327 2281->2291 2287->2264 2371 2c88350 call 2c887e9 2287->2371 2288->2287 2300 2c88345-2c8834a 2288->2300 2289->2290 2302 2c882b8-2c882c2 2289->2302 2292 2c882e8-2c882f4 2290->2292 2293 2c882d3-2c882df 2290->2293 2291->2264 2296 2c8835c-2c8837e 2292->2296 2297 2c882f6-2c882fd 2292->2297 2293->2292 2303 2c882e1-2c882e6 2293->2303 2306 2c8838e 2296->2306 2307 2c88380 2296->2307 2297->2296 2301 2c882ff-2c88304 2297->2301 2300->2264 2301->2264 2302->2290 2309 2c882c4-2c882c9 2302->2309 2303->2264 2311 2c88390-2c88391 2306->2311 2307->2306 2310 2c88387-2c8838c 2307->2310 2309->2264 2310->2311 2371->2264
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $]q$$]q
                                    • API String ID: 0-127220927
                                    • Opcode ID: dc8ec358dba89cacf4d1eefaca3b88bee86a19ede33f3992991aa833138a258b
                                    • Instruction ID: 48fa1e9b96713e9bb3ff3703f5c4846090470db9b825c84d85318c32bb80cc69
                                    • Opcode Fuzzy Hash: dc8ec358dba89cacf4d1eefaca3b88bee86a19ede33f3992991aa833138a258b
                                    • Instruction Fuzzy Hash: 35524274A0022DCFEB15EBA4C860B9EBB76FF98304F1081A9C50A6B765CB345E45DF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o]q$4']q
                                    • API String ID: 0-176817397
                                    • Opcode ID: 78c73927726fb936886a3f6323286426f2b50e33570a783958cb31a3ee494f19
                                    • Instruction ID: bbbdbcb7359d6861c5e1208ed87fdd77fdb22c7756cda3f7674047d0b4e6ef63
                                    • Opcode Fuzzy Hash: 78c73927726fb936886a3f6323286426f2b50e33570a783958cb31a3ee494f19
                                    • Instruction Fuzzy Hash: 5B324D31600509DFCB15EF68C984A7EBBB2BF88309F15C55AE8069B3A5D731E981CB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Haq$Haq
                                    • API String ID: 0-4016896955
                                    • Opcode ID: df3e0e1aff5643cde332eb2429b7650f729b79ae30b77e4ee87b3fd4f07904c0
                                    • Instruction ID: 30f08057b5f2135263de35c766ec7782efc6dac85d183e60d214fa92b6304360
                                    • Opcode Fuzzy Hash: df3e0e1aff5643cde332eb2429b7650f729b79ae30b77e4ee87b3fd4f07904c0
                                    • Instruction Fuzzy Hash: 9E91EF307442558FDB16AF38C858B6E7BA2BFC8348F15896AE4468B391DFB9CD01C791
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (&]q$(aq
                                    • API String ID: 0-1602648543
                                    • Opcode ID: 2482a3ccc3a6f2e34164a177fd96bef36ffdc27d0dd1231b9deaef0e81b5a1b7
                                    • Instruction ID: c127e9f627df330cf69a1377651d80aeb53325f7e7f166b0f319747e5b98e0e2
                                    • Opcode Fuzzy Hash: 2482a3ccc3a6f2e34164a177fd96bef36ffdc27d0dd1231b9deaef0e81b5a1b7
                                    • Instruction Fuzzy Hash: 83718031F002599BDB55EFB9C8606EEBBB2EF89700F148469D506AB380DF349D42C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,aq$,aq
                                    • API String ID: 0-2990736959
                                    • Opcode ID: f00985a4996a448b66e2cdfa5ced22357548ea4d6866c6edd555d4a3ce6dfa06
                                    • Instruction ID: 88ead730509694137037a35ae06e02bc5814af1fe8fefd8ff423afc448b402b5
                                    • Opcode Fuzzy Hash: f00985a4996a448b66e2cdfa5ced22357548ea4d6866c6edd555d4a3ce6dfa06
                                    • Instruction Fuzzy Hash: 8061C175A00505CFCB04EF69C888AADB7F2BF89248B96C16AD802EB365D774ED41CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$T
                                    • API String ID: 0-2893198943
                                    • Opcode ID: d64cc19c3c3a99f116fc04204bfd04bdadbda589093ca7a97371079e2c1b7d62
                                    • Instruction ID: 2d48f289cd0796ec3a55f466c41aacb37812c35c7254de392a4436fd925f1cc8
                                    • Opcode Fuzzy Hash: d64cc19c3c3a99f116fc04204bfd04bdadbda589093ca7a97371079e2c1b7d62
                                    • Instruction Fuzzy Hash: B551D470B042859FDB45AA698890BBEB7B9EFC5308F14C465E402DB351DB78CD41CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Xaq$Xaq
                                    • API String ID: 0-1488805882
                                    • Opcode ID: b89c964bf51f12654f42691a3c616bd516573b6813fa468ea0add06ebde19d27
                                    • Instruction ID: b24b4b01e3bd03ce633ffdebb0b3d231f42c58de62f8b1001de552839ea1db54
                                    • Opcode Fuzzy Hash: b89c964bf51f12654f42691a3c616bd516573b6813fa468ea0add06ebde19d27
                                    • Instruction Fuzzy Hash: DB315731B003658BDF1DAA6A898437EAAEABFC4A1CF148579D806C3384DF74CD0582A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q
                                    • API String ID: 0-3120983240
                                    • Opcode ID: 6694174bcabd8e7cc3b752d5968dbbe3a3e46192583540dbe1f22e8aa0336859
                                    • Instruction ID: ff561242773b8c14b107258c511c77bab43a121a53d6b7cd81d0ce4100dfe270
                                    • Opcode Fuzzy Hash: 6694174bcabd8e7cc3b752d5968dbbe3a3e46192583540dbe1f22e8aa0336859
                                    • Instruction Fuzzy Hash: D9F0CD353001042FD7092A69985097B7BDBDFCC3A4B048925BA0AC7350DE75CC1197A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR]q
                                    • API String ID: 0-3081347316
                                    • Opcode ID: b81ed3b5d5c687bcbc504c31889ee596708be8f1f4a85379d03a93f43e81a305
                                    • Instruction ID: 672bd7f9ebdb4fab4f70025ca8c10f79a267f2f99b89c9b3ef57e5e3810ff227
                                    • Opcode Fuzzy Hash: b81ed3b5d5c687bcbc504c31889ee596708be8f1f4a85379d03a93f43e81a305
                                    • Instruction Fuzzy Hash: 4922FA78A0022ACFCB54EF65E994A9DBBB5FF48304F1087A5E909A7358DB346D46CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR]q
                                    • API String ID: 0-3081347316
                                    • Opcode ID: 8a25c44fa29762be5d66760dcf48acdc8da29ce26de14e12bee68518448f123f
                                    • Instruction ID: 88a65290fe1caf84f2939d0017a21e8a454caf5b4608582108e7d710dfbd1e38
                                    • Opcode Fuzzy Hash: 8a25c44fa29762be5d66760dcf48acdc8da29ce26de14e12bee68518448f123f
                                    • Instruction Fuzzy Hash: 2022F978A0022ACFCB54EF65E994A8DBBB5FF48304F1087A5E909A7358DB346D46CF40
                                    APIs
                                    • LdrInitializeThunk.NTDLL(00000000), ref: 06AE82B6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: b7ad6e786da8a0992d684b0fde368ec8e516500eb1148732d5586c337423ecc3
                                    • Instruction ID: bd5d9962cd92dc07378649742099c3ddb2b7e16999b65f5935cca42b392272b8
                                    • Opcode Fuzzy Hash: b7ad6e786da8a0992d684b0fde368ec8e516500eb1148732d5586c337423ecc3
                                    • Instruction Fuzzy Hash: 251179B4E011098FDB44EBA8D884AEDBBB5FF88314F54C2A5E814E7242D734E941CB60
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR]q
                                    • API String ID: 0-3081347316
                                    • Opcode ID: ef9ec939ea72f01a10a1b43b3ce5f533d4342d8839c37ebd057f0275c0d7c9bb
                                    • Instruction ID: 40166368dc7044df7f2c435937d3f562cad95eb13a66c86837c4006cf71c3469
                                    • Opcode Fuzzy Hash: ef9ec939ea72f01a10a1b43b3ce5f533d4342d8839c37ebd057f0275c0d7c9bb
                                    • Instruction Fuzzy Hash: 9C51D070B101159FCB44EF78C89496E77F2EF88600B5585A9E506DB3A4EB30ED42CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q
                                    • API String ID: 0-1259897404
                                    • Opcode ID: e14684695036bee32a25025517ba8ccc3af079d68cea5a251d6904492b092a85
                                    • Instruction ID: a0b9fbf4071ecfa62bb01665f4f6dbe16048433e6e87b8c17239fad187e8fa5a
                                    • Opcode Fuzzy Hash: e14684695036bee32a25025517ba8ccc3af079d68cea5a251d6904492b092a85
                                    • Instruction Fuzzy Hash: 6A41B274B001559FDB55EBA9C880ABEB7EAAFC9308F14C569E402DB350DB34CD41CBA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 698d0d963167546d141a32e993e556f95b7c69aaab1e2cde738952df78f7469e
                                    • Instruction ID: 3c447083374c768ad556fd79e1f75dfadccfbe2acf7aba00290f4d028d4214a5
                                    • Opcode Fuzzy Hash: 698d0d963167546d141a32e993e556f95b7c69aaab1e2cde738952df78f7469e
                                    • Instruction Fuzzy Hash: 0EB1F971A40554DFCB04DF9CD584AADBBB6FF8C318B1AC09AE505AB261C735ED81CB50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6a11cff305938cdd0213db834db569c3e9ea75e6574fdb63ea8ac9781fc47233
                                    • Instruction ID: a04b9412038bdbdd832e9f4211203cf5a2fa45ee961e59a508af4ceee991d037
                                    • Opcode Fuzzy Hash: 6a11cff305938cdd0213db834db569c3e9ea75e6574fdb63ea8ac9781fc47233
                                    • Instruction Fuzzy Hash: FA711E387002058FCB15EF29C498AADBBE5AF89609F2584A5E505CB371EB71DD45CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df93bd60e37b6430afc55d4de6e1e6cd6114d51203d0c83a1342a798d860e2a1
                                    • Instruction ID: 7a0ac85d6a0fa51bfd73435bbf8df15f3c0eae6dfa3f419115a57d0cc00a641f
                                    • Opcode Fuzzy Hash: df93bd60e37b6430afc55d4de6e1e6cd6114d51203d0c83a1342a798d860e2a1
                                    • Instruction Fuzzy Hash: D251A0709A63478FC3142F64A1AC2AABFB8FB4F31BB056E40F04F86819DB705469CB15
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: de6fdde041c5c8ba612d02cc8138aff7ee9fb9ad019b692a8fcd195b5e523a3e
                                    • Instruction ID: e46e2f3b00f50703d0850dfc1e5ff83149de28f6234ada3842d132c99b53fc15
                                    • Opcode Fuzzy Hash: de6fdde041c5c8ba612d02cc8138aff7ee9fb9ad019b692a8fcd195b5e523a3e
                                    • Instruction Fuzzy Hash: 8D51A0709A63078FC3142F64A1AC26EBFB8FB4F32BB446E00B01F86819DB705465CB25
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 45ef210faf3ce830367684fa7f887e1d96430016fdf89085897c01c9521390a8
                                    • Instruction ID: c967c8c53807534b1d87fee06ecce280f118f353805a64b1ca83ab92b5507a9f
                                    • Opcode Fuzzy Hash: 45ef210faf3ce830367684fa7f887e1d96430016fdf89085897c01c9521390a8
                                    • Instruction Fuzzy Hash: 1D616570E00259DFCF06DFA4C844AEDBFB2BF89308F14855AE805AB361D7349A55CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 68471ff33c23f7998e03d94536c6e6636a421791d5bcdaa7bf59240b96ce00de
                                    • Instruction ID: 0c8c98b233faf075f9ab51125835b9ab61597a26f71b5964abce5bfba8ae114a
                                    • Opcode Fuzzy Hash: 68471ff33c23f7998e03d94536c6e6636a421791d5bcdaa7bf59240b96ce00de
                                    • Instruction Fuzzy Hash: F7511474E00318DFDB14DFA5D954AAEBBB2FF88304F208629E809AB355DB395946CF41
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 555f8326f39538f3481dae827da4b685f14afb9667ca4f37114e3724cedf1534
                                    • Instruction ID: cef5abf17aea717b3fe0b87c025c435990dd7ebdfc9d55ac1ac4bd6a2516f191
                                    • Opcode Fuzzy Hash: 555f8326f39538f3481dae827da4b685f14afb9667ca4f37114e3724cedf1534
                                    • Instruction Fuzzy Hash: 5441AC75901319CFDB00AFB1D05C7EEBBB1EB4A316F5499A8D102672D4CBB80A45CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b3d1d0f7d21ad1319ccd2bfe31055b0f5c1fff4530871abe801040b69fa6354
                                    • Instruction ID: 69144aee9b8cf155073abcaf75400ef067f0c2e9ba983308f12dd768bea76917
                                    • Opcode Fuzzy Hash: 0b3d1d0f7d21ad1319ccd2bfe31055b0f5c1fff4530871abe801040b69fa6354
                                    • Instruction Fuzzy Hash: 36519675E01219CFCB08DFAAD59499DBBF2FF8D304B209569E509AB324DB31A946CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f33f994ec9a3887995e9d5d88910347bbb5d03581d19ece6bd5cf81239bfa02b
                                    • Instruction ID: 42f64e3d0d0a2a84ad77ae37d39349119c591a8df4a7c94ed388343cbaf565b0
                                    • Opcode Fuzzy Hash: f33f994ec9a3887995e9d5d88910347bbb5d03581d19ece6bd5cf81239bfa02b
                                    • Instruction Fuzzy Hash: 79417371E00219EBDB14DFA5C890ADEB7F5FF88700F148169E415BB280DB70A942CBE1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e5ef5a1850a7772c3316df00dd55321e009eb4484d3a3c386dddb36fd3dcccc
                                    • Instruction ID: d27a709b6cc4ccab6e8c39d2b13211617c184153d682d05f6cb6c3614136d6b9
                                    • Opcode Fuzzy Hash: 1e5ef5a1850a7772c3316df00dd55321e009eb4484d3a3c386dddb36fd3dcccc
                                    • Instruction Fuzzy Hash: BA410674D04208CBCB04EFB9D484AEDBBB2FF49309F60D519D41AA7289D775A882CF55
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a3a2d46da57a135bc612ff63a06a3cdb4cd640efaa043033b8e8356f88fb18ce
                                    • Instruction ID: 7fbbad1b0d2492a4a9ef2d77714825ba2489598ea4f4ac0af3842d193a3a0e64
                                    • Opcode Fuzzy Hash: a3a2d46da57a135bc612ff63a06a3cdb4cd640efaa043033b8e8356f88fb18ce
                                    • Instruction Fuzzy Hash: 9A41EFB4E00218DFCB04EFA9D5946EDBBF2BF49304F10912AD409B7294DB346A4ACF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f41df6dc71c1ad5fecf29af0d81334f2e784631f2a58373c04acaa345d22e0d1
                                    • Instruction ID: e065ba09e2ad45be14b3f724afafc2d22ceba54d2edc67500c42f2c211d0b80c
                                    • Opcode Fuzzy Hash: f41df6dc71c1ad5fecf29af0d81334f2e784631f2a58373c04acaa345d22e0d1
                                    • Instruction Fuzzy Hash: D641EFB4E00218DFCB44EFA5D5947EDBBB2BF49304F24912AD419BB294DB346A4ACF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 611b0d29077bf2eed3a2d7dd63e08ce652e18c063a20c8c4faa86cac3103a150
                                    • Instruction ID: 69ef4b884a7a2da25bb7df934f2f1851ff5c1697e57cf51b00cf2bf357471671
                                    • Opcode Fuzzy Hash: 611b0d29077bf2eed3a2d7dd63e08ce652e18c063a20c8c4faa86cac3103a150
                                    • Instruction Fuzzy Hash: 2B41F474D01218CFCB04EFA9D4846EDBBB2FF49319F60D619E406A7289D735A982CF54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac47f18175bae58de9c44d91451a4119e980fdb5f4b5201eb6ea406f25f687f9
                                    • Instruction ID: 3ec793dc5ea2fca4447c69f5fa3504fe90045bab1fb461f2c0b37c1b45c5a72c
                                    • Opcode Fuzzy Hash: ac47f18175bae58de9c44d91451a4119e980fdb5f4b5201eb6ea406f25f687f9
                                    • Instruction Fuzzy Hash: 8E415A306002558FDB01DF68C844BAABBA6EFC9318F54C4A6E908CB3A6D771EE45CB51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c587582e4ae91a4228850cf90d42f463d2222bf9396a1459efbbf0c9f571a366
                                    • Instruction ID: 2a7770c43bd883981812d907f14f74cbd237255dab97941896d6de2e39f15c98
                                    • Opcode Fuzzy Hash: c587582e4ae91a4228850cf90d42f463d2222bf9396a1459efbbf0c9f571a366
                                    • Instruction Fuzzy Hash: 63412470D01208CBCB04EFBAD444AEEFBB2BF89309F54D529D405A7299DB759942CF54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5624a9d461333a577d45a65bf38603fcce1c3321ce7b28b486a80d3deb744cc8
                                    • Instruction ID: e912da38523a54f5d652e005250097e15b895c465daa4bad249659a56bc38208
                                    • Opcode Fuzzy Hash: 5624a9d461333a577d45a65bf38603fcce1c3321ce7b28b486a80d3deb744cc8
                                    • Instruction Fuzzy Hash: 3631727164015B9FCB15AF69D854AAF7BA6FB88309F008414F9158B250CB39DD66CBE0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 479828937525d4e5c266c399671d7b683f8c8a4cc5f329662cc96dc0ed1f0d51
                                    • Instruction ID: 10c0fe93d0b252f913346b41b114afea3d1e49972deea30b5fc86c0fcb550962
                                    • Opcode Fuzzy Hash: 479828937525d4e5c266c399671d7b683f8c8a4cc5f329662cc96dc0ed1f0d51
                                    • Instruction Fuzzy Hash: C031AF35B002449FCB04AF78D8547AE7BB6BBCC214F148569D902E7391CE359C16CBA4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3e1e528a472f1ed5a662bae442c2eccac529f4ee69a0b9266498c74d4b8aab6
                                    • Instruction ID: 199ce8de05548aa2f1e94b73bcd08392686f7516af7b4129858ca84ee373df1e
                                    • Opcode Fuzzy Hash: c3e1e528a472f1ed5a662bae442c2eccac529f4ee69a0b9266498c74d4b8aab6
                                    • Instruction Fuzzy Hash: 3231B030A01645DFCB12DF2CC8809AABBB5FF89324F5485A6E849D7311C731E916CBA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8d55c12d5a5c4a8a2cee6b247ad9d840670ed00c2dba638a4d55a7fa3ebd0890
                                    • Instruction ID: ad6ee90ff6f316edc00b960afc9c26bffd38f36d29890df1b721cf25a3fc128d
                                    • Opcode Fuzzy Hash: 8d55c12d5a5c4a8a2cee6b247ad9d840670ed00c2dba638a4d55a7fa3ebd0890
                                    • Instruction Fuzzy Hash: BA21D6383042414BEB1627398D94B3DBAD79FC961DB2880B9D506CB795FF28CC4AD781
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bdf43b10456ebdc15e63fa97c91a339c7210f2c386bfdc7e83b72c69eb7dc6b4
                                    • Instruction ID: 6a6a86e6ed3d43fe718176ba3f9a780357de95a9358aab12fe7ee851711557cd
                                    • Opcode Fuzzy Hash: bdf43b10456ebdc15e63fa97c91a339c7210f2c386bfdc7e83b72c69eb7dc6b4
                                    • Instruction Fuzzy Hash: 76310771E042098FC705DF69C8846AEBBB2FF89318B15C05AD4519B3A6C7359D52CBE0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d6a7faa263cc599101d455cfd8f1398784059a3ff48a973c9f500400ca56e535
                                    • Instruction ID: d061f78552af5f4b6c9c73fd9080498c2b9e35c19ad70bb9008d7d7bce0b16b3
                                    • Opcode Fuzzy Hash: d6a7faa263cc599101d455cfd8f1398784059a3ff48a973c9f500400ca56e535
                                    • Instruction Fuzzy Hash: 84210F30E002088BDB09EFBAD8046EDBBB2AFCA308F04D465D400B72A5DB319546DF55
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: db710149708d0e92ba9c70da214ee0f6cb1f7b20b9adb9fd1ce894df41c38320
                                    • Instruction ID: 4bedab2c7fcd8e12327c01ac1e7cdb961d5ce6e52dcb4b434f9490809cf49e2f
                                    • Opcode Fuzzy Hash: db710149708d0e92ba9c70da214ee0f6cb1f7b20b9adb9fd1ce894df41c38320
                                    • Instruction Fuzzy Hash: 41319A7180021ADFDB00AFA5D05C3EEBBB1FF4A316F0489A8D00266295CBB81A45CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 04713dcdb24cf0b713b04be5cacc7f310da30a49a96efacc7168c07c1c88e973
                                    • Instruction ID: d32438e5b0ef05cdcf1dbad62040e510469bb48599e95691ef9052d205b42208
                                    • Opcode Fuzzy Hash: 04713dcdb24cf0b713b04be5cacc7f310da30a49a96efacc7168c07c1c88e973
                                    • Instruction Fuzzy Hash: BF21A13C3002014BEB16262A8994B3AB6879FC861DF28C078D506CB798FF29CC46D381
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca95bf50a6cb69bfcd5c761b5328c002a147f2eb3a328a03f6cc2c64316c828d
                                    • Instruction ID: d0eddde38f5948abb86ea6649964c7de2bdbc1af602f97ac352c8cddab56e727
                                    • Opcode Fuzzy Hash: ca95bf50a6cb69bfcd5c761b5328c002a147f2eb3a328a03f6cc2c64316c828d
                                    • Instruction Fuzzy Hash: 2B21A135A001559FCB14EF64D844AAE37A5EB98258F10C519ED098B244EB35FE46CBD3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e7b4bc3afa3142728c6ddc6302eadbe3eec58880abe7a6163ebc94964b3d3cc
                                    • Instruction ID: 0ef18e0d90b71370c81adcb98bbeff4a32423394d7d176b3f735ee6e95740239
                                    • Opcode Fuzzy Hash: 9e7b4bc3afa3142728c6ddc6302eadbe3eec58880abe7a6163ebc94964b3d3cc
                                    • Instruction Fuzzy Hash: 5C21C535744A119FC316AA25C4A457FB7A2FFC969C70685A9E806DB350CF75DC06CBC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500349924.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_132d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89a8d518a0d8ba40c7886b9fe832843ac0ec25afa4bb7486a5d7dae889f94555
                                    • Instruction ID: 71fc4b5c81f0a32eee1614bfe99ae827d9767b57d8c0038c0e45738e9e64bb1d
                                    • Opcode Fuzzy Hash: 89a8d518a0d8ba40c7886b9fe832843ac0ec25afa4bb7486a5d7dae889f94555
                                    • Instruction Fuzzy Hash: 48216771504244DFDB05EF98D9C0F66BF69FB88318F20C169E9091B657C73AE406C7A1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce908fb141a409cf955e2144c2f03dfe6155b2571e1bc6b4575bd279992e9732
                                    • Instruction ID: b390b0ffb6b98c453f8e32a8fc5b4431a0c368b0a47aa6fde00528f4fd148004
                                    • Opcode Fuzzy Hash: ce908fb141a409cf955e2144c2f03dfe6155b2571e1bc6b4575bd279992e9732
                                    • Instruction Fuzzy Hash: 9531AD31704684CFCB21DF68D884B697BB2EF8A318F05869AE5459F3A2C331E810CB61
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500392305.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_133d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a97f4eb733a7a45aa9d898f23e6902b22e211d896964b2d098a3b30b982ac0db
                                    • Instruction ID: 17c0c6a5bd9e28b577d48089a90fb9f148438bb00895574548750289d1bcdb9e
                                    • Opcode Fuzzy Hash: a97f4eb733a7a45aa9d898f23e6902b22e211d896964b2d098a3b30b982ac0db
                                    • Instruction Fuzzy Hash: 0D2122B15042089FCB15CFA8C9C0B26FB69FBC4718F60C66DE9490B352C73AD446CA66
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a36b308b8d39a6ca54fd2b06a18111cc6a70bc1f1b522e6ffc51926a969c766
                                    • Instruction ID: 2744ad30f58a942268aa86cde53a58e19b46cce45ae97f8b8b924ab5bc6a2954
                                    • Opcode Fuzzy Hash: 3a36b308b8d39a6ca54fd2b06a18111cc6a70bc1f1b522e6ffc51926a969c766
                                    • Instruction Fuzzy Hash: 66115E35E042599FCB019BB89C104EEBB35FF8A310B258796D566B7051EA31290BC792
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ccc931e26a4f45c83d55e40d2dbfcc44bf3d24514dee57545b9d5dcdf0a32d32
                                    • Instruction ID: 3bc95e0409c496fcb71c44b118633d9f27ed44f8f9a4295dad468049b53cad9f
                                    • Opcode Fuzzy Hash: ccc931e26a4f45c83d55e40d2dbfcc44bf3d24514dee57545b9d5dcdf0a32d32
                                    • Instruction Fuzzy Hash: 2811C8363043541FDB466EB858645AF7EA7EFC9250B144869E507CB3D2DE398D02C3A6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 897de0b5f64d06208ec7896327580eeaa9bdf50ddcf270bf6d4938fde50f4daf
                                    • Instruction ID: 24473c012e093b1a7b858f171ca3be883836d8d536bc842b4c84cbc8b0a23e93
                                    • Opcode Fuzzy Hash: 897de0b5f64d06208ec7896327580eeaa9bdf50ddcf270bf6d4938fde50f4daf
                                    • Instruction Fuzzy Hash: 7421F6726041969FCB25AF68D45476B7FA2FF8831CF008469F8458B241CB38DD16CBE4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94d418794e2100f6e8930746c8c871c1950e7c7f4a0e4b80d2da3dccf294ec1b
                                    • Instruction ID: c2ddb4cfb7f5bfbaf420506973436239eb7a2906e1342a8cd8b5a5a6cff1cd8c
                                    • Opcode Fuzzy Hash: 94d418794e2100f6e8930746c8c871c1950e7c7f4a0e4b80d2da3dccf294ec1b
                                    • Instruction Fuzzy Hash: A3217A74E0025D9FCB04EFA5D550AEEBFB2BF88308F14816AE411E7294DB329A01CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3969223a0c86877b18f41954b5a2160caba2c8b1d9823234b1e99cb4f57f0ef8
                                    • Instruction ID: 302c46c4e2dab0ec3e11845463e316ff21072a0f5aea536b41ab86db714165a8
                                    • Opcode Fuzzy Hash: 3969223a0c86877b18f41954b5a2160caba2c8b1d9823234b1e99cb4f57f0ef8
                                    • Instruction Fuzzy Hash: AC115670D002089BDB08EFBAD4446DEFBB2AFCE305F08C569D409A7299DB305546CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3cff8c7083efae6c1a4b58dcc822866fec4233feb4ac082f1acc6efbe47895f2
                                    • Instruction ID: 178772101add4ba2dc4ea36ffe152fc769b35d94141cc1c602ba91ec0d726afd
                                    • Opcode Fuzzy Hash: 3cff8c7083efae6c1a4b58dcc822866fec4233feb4ac082f1acc6efbe47895f2
                                    • Instruction Fuzzy Hash: 7B11C2357409129FC7196A2AC498A3EB7A6BFC869D7568178E806CB350CF71DC06CBC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 876187be4796ed60bcf57a14cd0c289daf8ab5340bbb546d5b61ea43cf00efb9
                                    • Instruction ID: 893201dbab5dd8fdc90978cebec105c8de3096246bd80519fd3edca144749160
                                    • Opcode Fuzzy Hash: 876187be4796ed60bcf57a14cd0c289daf8ab5340bbb546d5b61ea43cf00efb9
                                    • Instruction Fuzzy Hash: 28118E703006068FC350AF7ED094A2AB7D5BFD968876584BDD60ACB3A1DFA6DC05C7A4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 087093650e71db6c90088fc0ae8f0e74b1021e96f018ab6167bbe2c377fe0f4c
                                    • Instruction ID: 75c42aaf043394996d2f6770d92a9b8e4b88f2664b514e279fea4d7084d7a526
                                    • Opcode Fuzzy Hash: 087093650e71db6c90088fc0ae8f0e74b1021e96f018ab6167bbe2c377fe0f4c
                                    • Instruction Fuzzy Hash: 7F1126B6800389AFDB10DF99C845BDEBFF9EF48320F148459E518A7251C339A554DFA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500349924.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_132d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 6f4d2d12dcc9ff9b94729b36107f619ac95641b083f99fb34879d316083d9d83
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 8611E172404280CFCB12DF44D5C4B56BF71FB84328F24C5A9D9090B657C33AE45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3847ed565080f790f24e1c979d47b543ded66d87dba5c8150e43e5a5e19f548f
                                    • Instruction ID: d5ca6b26056d46068554295fd35dfa5ad21b90023214099ba7da0af160166d33
                                    • Opcode Fuzzy Hash: 3847ed565080f790f24e1c979d47b543ded66d87dba5c8150e43e5a5e19f548f
                                    • Instruction Fuzzy Hash: BA21F274D0564A8FCB41EFA8D8455EDFFF0BF0A304F14866AD809B3250EB301A55CBA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6af4566756e401c3d7d3df3a912a2e00d63db9f853d9d2f39f1964488703421f
                                    • Instruction ID: f66bd21e0d712150207b5ea33139407143766fb5e99f3a2209daab50334d7498
                                    • Opcode Fuzzy Hash: 6af4566756e401c3d7d3df3a912a2e00d63db9f853d9d2f39f1964488703421f
                                    • Instruction Fuzzy Hash: 9A01B5707042549FD7041A7A58586BBBAAFBFCA310F548976E906C7396CE38CC1683B0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a938a6a2dbc4b97842311a5c5da2835c3edd57fb5f7dd3ca8652de5154a8d4e3
                                    • Instruction ID: fd42eb1ee9ee74d13990567037dca56f26ba6f570390a102b764d7c22cecbf87
                                    • Opcode Fuzzy Hash: a938a6a2dbc4b97842311a5c5da2835c3edd57fb5f7dd3ca8652de5154a8d4e3
                                    • Instruction Fuzzy Hash: 18213D74D0021A9FCB45EFB9D540A9EBFF6FF49304F10C6A9D01597229EB349A0ACB81
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b18311ae3af57453d881b64026879b49d5712c5a574a7253906102d83d979c0a
                                    • Instruction ID: 77f03b7b3af63e2a432c8edd13a820dfb40166f5316d845779da47793d754bab
                                    • Opcode Fuzzy Hash: b18311ae3af57453d881b64026879b49d5712c5a574a7253906102d83d979c0a
                                    • Instruction Fuzzy Hash: A2213674C0460A8FCB00EFA8D8445EEBFF1FF49308F14866AD845B7264EB305A45CBA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17c1b50425d5ded157ffa7801b01b5b870f7dbad7fa511f4c1239c13d52628fc
                                    • Instruction ID: f9f1e7a7d612a9faba1b7b3f90dcfc5fa145ce8509a409f9585044346d514167
                                    • Opcode Fuzzy Hash: 17c1b50425d5ded157ffa7801b01b5b870f7dbad7fa511f4c1239c13d52628fc
                                    • Instruction Fuzzy Hash: FD1156B6800349EFDB10DF99C804BEEBFF4EB48320F148459E918A7210C339A554CFA5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 414f56da6f2df613aa7c49578c6c7001d5371433b14622a806e0fa0859e4576b
                                    • Instruction ID: 7286807701d2af0db59bc1b6da924824b12157b3bca2403ea64db499b02d976e
                                    • Opcode Fuzzy Hash: 414f56da6f2df613aa7c49578c6c7001d5371433b14622a806e0fa0859e4576b
                                    • Instruction Fuzzy Hash: DA114F74D0021ADFCB45EFA9D540A9EBBF5FF49304F50C6A9D01497319EB349A06CB81
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7775ccac696e41d79b8d898b377effcf150fa65b669ce4fd99db16ac0904692a
                                    • Instruction ID: 3e7d85a356593a2e5d902b2c3f627b53bbd5a5fdda7a710a21c5ca827ec963f0
                                    • Opcode Fuzzy Hash: 7775ccac696e41d79b8d898b377effcf150fa65b669ce4fd99db16ac0904692a
                                    • Instruction Fuzzy Hash: 74112A75E001499FEB00DFE8D850BEEBBB2BF48315F8095A1E908AB349E630D9428B50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500392305.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_133d000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: a58085fd252a648b7492060d1fe94f1a7e7c3e88e322d7a43a9e4e42ec974c4b
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 2111DD75504284CFDB12CF54C9C4B15FFA2FB84318F24C6A9D8494B252C33AD44ACF62
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 138442a8e1d8b93fc8c85e3e4226535430c397359fc5e69731c2a91d7dda7f71
                                    • Instruction ID: cd3cb7ea5a15efa854b6fd124b73e36058615454f35c4e295163a39524c6cbdb
                                    • Opcode Fuzzy Hash: 138442a8e1d8b93fc8c85e3e4226535430c397359fc5e69731c2a91d7dda7f71
                                    • Instruction Fuzzy Hash: 3801F571B041156FDB02AE689810AAF3FE7DBC9395B19C06AF505C7294CE758C16C7A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5d2c29be190b050757003e4cd216b2d29dc4052aff04f1d2ec4f7a1eb70cff3b
                                    • Instruction ID: f1ab370b88683a9f5a301118a55181d4fc8a054934c178f88f8cbe37abceac96
                                    • Opcode Fuzzy Hash: 5d2c29be190b050757003e4cd216b2d29dc4052aff04f1d2ec4f7a1eb70cff3b
                                    • Instruction Fuzzy Hash: 1E0148B5F502249FC794EB78D50865E7BF4FF4832571506AAE41AEB324DA31DD018B90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f1ebf279dbfc14030165210603a131fafe36ed9a5381708d1c012795d19d865
                                    • Instruction ID: 255c2ebc4de818de0f2c36986c5ecc95b7ddc971f81a513850e543c5850b3f0d
                                    • Opcode Fuzzy Hash: 7f1ebf279dbfc14030165210603a131fafe36ed9a5381708d1c012795d19d865
                                    • Instruction Fuzzy Hash: D501B670E002199FCF54EFBAC9006AEBBF5BF49205F50856AD519E7250E7385A02CF91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1c53842ce23316728cd3a719a6f1350b311235c532bc73930b3a5ab3775dd78c
                                    • Instruction ID: a1ad01120f369928ea181a11293549314675dcc5a95ac8ec562206259fe6fbc9
                                    • Opcode Fuzzy Hash: 1c53842ce23316728cd3a719a6f1350b311235c532bc73930b3a5ab3775dd78c
                                    • Instruction Fuzzy Hash: 26F0E530A08389D7D706AF7AA808AEABB789BC7300F4054B4E544E7196C7716229DF96
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad02fd1f8b2fa764423faff2deb84f3eb8421ab381c841b36c9da605543ff75b
                                    • Instruction ID: 210981074c6f9951a2ad79009f16d13474254cf408725be4cd5914634bf948c0
                                    • Opcode Fuzzy Hash: ad02fd1f8b2fa764423faff2deb84f3eb8421ab381c841b36c9da605543ff75b
                                    • Instruction Fuzzy Hash: A3F0E534904345DFD706EF79A4046AABBB8EB8B305F449864D405A3092CB71951CCB91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fc0b3fa390f7758cd41205cb8cd1294cc98d2154dd3acec8deab05d2999cf656
                                    • Instruction ID: 32efa7d6c5e6d744ae7b9db7ac7347d2b7188bdcbd6b04045118313c23a3d1ce
                                    • Opcode Fuzzy Hash: fc0b3fa390f7758cd41205cb8cd1294cc98d2154dd3acec8deab05d2999cf656
                                    • Instruction Fuzzy Hash: 05E026E2C08144CBD329ABB764260B9BF74CDE7319B84E0D7D08BDB5A5D228E216DF11
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e0a32bcf6c46629502e56796986c1579b2f3ddfd2012de17fd4eea7ee0c2a749
                                    • Instruction ID: 6c3bad0669116ac9782394be5b86009a6bcb5ce5924e659206495640dc93570b
                                    • Opcode Fuzzy Hash: e0a32bcf6c46629502e56796986c1579b2f3ddfd2012de17fd4eea7ee0c2a749
                                    • Instruction Fuzzy Hash: 34E0C231D2026786CB21EBA0A8444EEBB34EED6364B50472AD41836000EB302A5AC6A1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9c35334365acca33bac5a368b829fc271e0d3db65ced8347aa97fd71a414a0e5
                                    • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                    • Opcode Fuzzy Hash: 9c35334365acca33bac5a368b829fc271e0d3db65ced8347aa97fd71a414a0e5
                                    • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                    • Instruction ID: b6a80db0bac9312e88e8481ff0af2401212e5d625faa6b3ed71f3f0c2db40517
                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                    • Instruction Fuzzy Hash: 62C08C3320C12C2AAA34708F7C40EB3BB8CC3C23F8A654237F91CE3640A942AC8041F9
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 247414b49b8c32ab10511d32e184366bc66ac55f69fc3db4f26016aface6d87b
                                    • Instruction ID: 262dc9373124bfe527a014db32f1768ebdcffc207a7597e3c519d7de73100291
                                    • Opcode Fuzzy Hash: 247414b49b8c32ab10511d32e184366bc66ac55f69fc3db4f26016aface6d87b
                                    • Instruction Fuzzy Hash: 76D0677BB410189FCB049F98EC409DDBBB6FB9C221B048516E925A3261C6319921DB60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1cab55563d45dc4b40e1b52406cfb165a597fbe42a629f66d39b2e2631d08c2c
                                    • Instruction ID: 6887123affd5f691868afb3c0044c0a12a4b0e9b3caa835842542de4d986eed3
                                    • Opcode Fuzzy Hash: 1cab55563d45dc4b40e1b52406cfb165a597fbe42a629f66d39b2e2631d08c2c
                                    • Instruction Fuzzy Hash: 53C0127454471A4BC549FB76FA45916376EBBC4208F504B20E00A0612DEF7C684987D4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 389a75ac11f24415421f981b6137dea9a695878e3cb92fe99dfe72e3e476e890
                                    • Instruction ID: 051ea32611010ac8f47e2c85e8d8fde6a9527b2e8eae83f57c5a1de388eeeb73
                                    • Opcode Fuzzy Hash: 389a75ac11f24415421f981b6137dea9a695878e3cb92fe99dfe72e3e476e890
                                    • Instruction Fuzzy Hash: E7D022345403060ACA09FB36F6818993B3BFFC0208F204B20E0060602DDF79480BCB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$0o@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                    • API String ID: 0-1947560563
                                    • Opcode ID: abb60e765d858ec05b862499a72567d4d34a65c4826ddc18dedab204f49dc6da
                                    • Instruction ID: 94d7afc29380e8d9eb97a8f99e7e5fec9fde8f932829a873c279a3f88af8f78b
                                    • Opcode Fuzzy Hash: abb60e765d858ec05b862499a72567d4d34a65c4826ddc18dedab204f49dc6da
                                    • Instruction Fuzzy Hash: EE3290B4E002188FDB64DF69D944B9DBBB2BF89300F1081E9D809AB365DB759E85CF14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$0o@p$Haq$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                    • API String ID: 0-401091292
                                    • Opcode ID: 5c0c05ff48f658b41e480f4f9f05e85aa981b81155c521dec205c084677f5133
                                    • Instruction ID: 476f47cb64cde99167b3f3669b82294f58fa2dd7c673a7b7a42472ed91ae2274
                                    • Opcode Fuzzy Hash: 5c0c05ff48f658b41e480f4f9f05e85aa981b81155c521dec205c084677f5133
                                    • Instruction Fuzzy Hash: FB12E5B4E002188FDB58DF69D954B9DBBF2BF89300F1081A9D809AB365DB359E85CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$0o@p$Haq$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                    • API String ID: 0-401091292
                                    • Opcode ID: 5e52d99a5d1d7f41d3e3f725673370d197fc02a9fd1af95de5e292458a1eeb1e
                                    • Instruction ID: 16e2a14e44a9b7c1f2a2a2b0295abf3004e3f914baeed37e9b9684917daf50bb
                                    • Opcode Fuzzy Hash: 5e52d99a5d1d7f41d3e3f725673370d197fc02a9fd1af95de5e292458a1eeb1e
                                    • Instruction Fuzzy Hash: 7912D5B4E002188FDB58DF69D954B9DBBF2BF89300F1085A9D409AB365DB359E85CF10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: .5uq
                                    • API String ID: 0-910421107
                                    • Opcode ID: b4423cb8d3e779fd5df24a2d19d170f4af95e0444780277b1f61acdab0037ab7
                                    • Instruction ID: 1c02e4d9aec89b6cf14ad29a44878334ee3b12dd0a1c67c1bd0a52e163d7a14e
                                    • Opcode Fuzzy Hash: b4423cb8d3e779fd5df24a2d19d170f4af95e0444780277b1f61acdab0037ab7
                                    • Instruction Fuzzy Hash: 09529C74E01229CFDB64EF69C884B9DBBB2BF89304F1085E9D409A7254DB35AE85CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p
                                    • API String ID: 0-848860569
                                    • Opcode ID: 58375bb28ff56f7248cf3335aef259b3079d5f4aeca04926dc5cd3e62b869998
                                    • Instruction ID: 7a71625f6978e21ec0389fe87e4c3d0f7a4a8669375e64258b064bb5bca27a70
                                    • Opcode Fuzzy Hash: 58375bb28ff56f7248cf3335aef259b3079d5f4aeca04926dc5cd3e62b869998
                                    • Instruction Fuzzy Hash: 1CB19274E00218CFDB54DFA9D884A9DBBF2FF89310F2481A9D819AB365DB34A945CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0o@p
                                    • API String ID: 0-848860569
                                    • Opcode ID: 655162b845b1d8b4f92bd61541876ffbb7444045e423976f373d658b065db282
                                    • Instruction ID: c50b9a7b77c44927f408690caa86820baaaa08c9903119728a9850536560f0f8
                                    • Opcode Fuzzy Hash: 655162b845b1d8b4f92bd61541876ffbb7444045e423976f373d658b065db282
                                    • Instruction Fuzzy Hash: 5F51A6B4E00618DFDB48DFAAD48499DBBF2BF89310F148169D419BB365EB34A942CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 45ee99e13b3c134e14c75df051a7cae0c1288315a85a770b1f517b806a334ab3
                                    • Instruction ID: 5eab618f2771ad118018a9717dec48f9150c06da7c5633dc954eef2caad3f0d3
                                    • Opcode Fuzzy Hash: 45ee99e13b3c134e14c75df051a7cae0c1288315a85a770b1f517b806a334ab3
                                    • Instruction Fuzzy Hash: ABC1F374E00218CFDB54EFA5C984B9DBBB2BF89304F2081A9D819AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 027d7dd6da11c19a6f5abe0c8856f72b7b6bd40ac2eed26b183ee2562bb49c88
                                    • Instruction ID: 062551f3a9c326e964ea5ca4b84e8f73f880ba75e5a1c72df7ad33963c2a7f2f
                                    • Opcode Fuzzy Hash: 027d7dd6da11c19a6f5abe0c8856f72b7b6bd40ac2eed26b183ee2562bb49c88
                                    • Instruction Fuzzy Hash: F8C1C074E00218CFDB54DFA5D994B9DBBB2BF89304F2081A9D809AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3cf26ba15c2667acaa6ec9b84a8c3c317f0bffb445be67da8eeea5844d13a641
                                    • Instruction ID: 42dc8e48dc730cd1a83ac6654c991888305f306ef793cbf949a884d431558d57
                                    • Opcode Fuzzy Hash: 3cf26ba15c2667acaa6ec9b84a8c3c317f0bffb445be67da8eeea5844d13a641
                                    • Instruction Fuzzy Hash: D5C1D374E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D409AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ef416b78ee18778583d7a89f0a65a538576c91eb8a81803a1d89661bc7b48d19
                                    • Instruction ID: 85af70d76b82d71fcd77c8a13b73bfc5c5feb2da0165677e0f207ad3a18d1a94
                                    • Opcode Fuzzy Hash: ef416b78ee18778583d7a89f0a65a538576c91eb8a81803a1d89661bc7b48d19
                                    • Instruction Fuzzy Hash: BEC1D274E00218CFDB54EFA5D994B9DBBB2BF89304F2081A9D409AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 829bde1f24d56a34bd01beab64db20f37a7d40697a38841509d08368e14efeb5
                                    • Instruction ID: b24ec7c77bfef2513255b2f4b5e77661a34f89a69482685d4befd4f0825fe82c
                                    • Opcode Fuzzy Hash: 829bde1f24d56a34bd01beab64db20f37a7d40697a38841509d08368e14efeb5
                                    • Instruction Fuzzy Hash: 34C1D474E00218CFDB54EFA5D954B9DBBB2BF89304F2081A9D409AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d38529f90ba68d7b2ec36203d4afe976cd1339a75979b97ae5c26d39be132a2
                                    • Instruction ID: 315e36ffbb065363ef71dd679b4363c77439bdefbcc43bd54951b129d2f4e136
                                    • Opcode Fuzzy Hash: 6d38529f90ba68d7b2ec36203d4afe976cd1339a75979b97ae5c26d39be132a2
                                    • Instruction Fuzzy Hash: F1C1E374E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 39e2adfd30abc9f3b74a90f90c0201d0f57a2f3044e5c800e5a4d9feff32f2d2
                                    • Instruction ID: 69afd351ee892790800e4783fc89514ae46618bab582ee1a4d8a5fb4bacd6778
                                    • Opcode Fuzzy Hash: 39e2adfd30abc9f3b74a90f90c0201d0f57a2f3044e5c800e5a4d9feff32f2d2
                                    • Instruction Fuzzy Hash: E0C1B174E00218CFDB54EFA5D954B9DBBB2BF88304F2081A9D809AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4cae5795f9945159a563874f5401eca4b3ff8e31b8d56d030059f27895e1e8f1
                                    • Instruction ID: 65e76b61fe96e52be299220e65e75b3f0b9f7df69494178da38f0905f262db9a
                                    • Opcode Fuzzy Hash: 4cae5795f9945159a563874f5401eca4b3ff8e31b8d56d030059f27895e1e8f1
                                    • Instruction Fuzzy Hash: D0C1C274E00218CFDB54EFA5D954B9DBBB2BF89304F2081A9D409AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5aa455b990db6b9450284ec9794ea680d2a3639a59cd74814afda58673ca208b
                                    • Instruction ID: f2ff7a98e8ca1f57d475e344e04f19c1c3f0a35cb7d6a71e2f2c125eb7a24726
                                    • Opcode Fuzzy Hash: 5aa455b990db6b9450284ec9794ea680d2a3639a59cd74814afda58673ca208b
                                    • Instruction Fuzzy Hash: 53C1E374E00218CFDB54EFA5C984B9DBBB2BF88304F2081A9D419AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cdbfe67c6a2697ff77d2752b9e463bdb373fbafcf3e5535b95ff5a1244e7c1a
                                    • Instruction ID: 55b4c1944fd82bf450f04a8875d124425fe9dc3cc36ecd1af5f1b906fd72403c
                                    • Opcode Fuzzy Hash: 6cdbfe67c6a2697ff77d2752b9e463bdb373fbafcf3e5535b95ff5a1244e7c1a
                                    • Instruction Fuzzy Hash: 17C1E474E00218CFDB54EFA5D944B9DBBB2BF88304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a17c808aaa893d0dce4c0f47a04461a481ed399a2e7ccfe352d3b8727a88d9e4
                                    • Instruction ID: 9a60a8d20349f2317ec9324b54bdca27f1cc9c75da97d0964a9587d489cf1157
                                    • Opcode Fuzzy Hash: a17c808aaa893d0dce4c0f47a04461a481ed399a2e7ccfe352d3b8727a88d9e4
                                    • Instruction Fuzzy Hash: E6C1C074E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 64726b2b44900624eceb80eae6aafb31def6afc3688372a74cc006e79faebf3f
                                    • Instruction ID: c143821d936209d3762f64a43488051a22d45ac410085f275ff19fe5b36a84f9
                                    • Opcode Fuzzy Hash: 64726b2b44900624eceb80eae6aafb31def6afc3688372a74cc006e79faebf3f
                                    • Instruction Fuzzy Hash: 9CC1D374E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D419AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3bf7bb7a8a98acf09fb16fc1c50fb8c8a94666ee8e1239f72c0cccfe621932f6
                                    • Instruction ID: 1e71688410cf3f4319f00a8a8fa9cbfbadbb3fc9499a1c658ca68ef2ba27670d
                                    • Opcode Fuzzy Hash: 3bf7bb7a8a98acf09fb16fc1c50fb8c8a94666ee8e1239f72c0cccfe621932f6
                                    • Instruction Fuzzy Hash: 30C1E374E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D819AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bebec621eae94891e8661ec082778fd3b4b65e8d8e04b80874737be784ffa63f
                                    • Instruction ID: 10b73e5e834e54eb45ba0acebb0c45bb267d36c904095033a21590bda13ba27b
                                    • Opcode Fuzzy Hash: bebec621eae94891e8661ec082778fd3b4b65e8d8e04b80874737be784ffa63f
                                    • Instruction Fuzzy Hash: FCC1D374E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 640f61fcd3b4b1ad9a1386be3b9fd6d08d0c4f5d2665b3f850734646ace1308b
                                    • Instruction ID: 54961843afb91a4c3a796e030432c5bffe4f019be49360bd915386a75734b1d7
                                    • Opcode Fuzzy Hash: 640f61fcd3b4b1ad9a1386be3b9fd6d08d0c4f5d2665b3f850734646ace1308b
                                    • Instruction Fuzzy Hash: C8C1D274E00218CFDB54DFA5D994B9DBBB2BF89304F2081A9D809AB355DB34AE85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f51699a15733383b34a6f2f3d5e7ad5ee9e67382d2e57d47370160e05b6134ee
                                    • Instruction ID: 1ee39ad479f5fecf9989b697c55b0f1b2da4b2e855ff19edbb4a3adf52ae8da0
                                    • Opcode Fuzzy Hash: f51699a15733383b34a6f2f3d5e7ad5ee9e67382d2e57d47370160e05b6134ee
                                    • Instruction Fuzzy Hash: C8C1D274E00228CFDB54DFA5D944B9DBBB2BF89304F2081A9D809AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0081d8ea8f74510bf0c8520b7fce1ed218c41122f78db8643a4356f8a8a9a0b5
                                    • Instruction ID: f297dc2b008afe87c4469a19ea8eca2334918ff69b000002bc45049d2dc7054b
                                    • Opcode Fuzzy Hash: 0081d8ea8f74510bf0c8520b7fce1ed218c41122f78db8643a4356f8a8a9a0b5
                                    • Instruction Fuzzy Hash: ADC1C274E00218CFDB54EFA5D954B9DBBB2BF89304F2081A9D409AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eeb00dd125b998cb4bdd2ef60437e067c5b9533488ee03b907227944536d5baf
                                    • Instruction ID: 0cfa35fefa60b9f40a810941773335d00bdf229849cd4c983005ed859bd23e00
                                    • Opcode Fuzzy Hash: eeb00dd125b998cb4bdd2ef60437e067c5b9533488ee03b907227944536d5baf
                                    • Instruction Fuzzy Hash: E3C1C474E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D409AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502668226.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6ae0000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 47688c2291dc1f11dad6d3e20f61926d51c92cdbf3ab593c2a3fef86685103b4
                                    • Instruction ID: 412f0853cf16571b91b873c7c87aaf02d862786c5d8149545babe0892af97033
                                    • Opcode Fuzzy Hash: 47688c2291dc1f11dad6d3e20f61926d51c92cdbf3ab593c2a3fef86685103b4
                                    • Instruction Fuzzy Hash: C8C1E274E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D409AB365DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b9797458e227ade8c42ea4869088f52ca03d5faf72c8f5014fa063cac64f24b
                                    • Instruction ID: 17a076c068ea06c55bb68904c0e70822adb4fdc8acbe3aa08bfde44d4169468e
                                    • Opcode Fuzzy Hash: 7b9797458e227ade8c42ea4869088f52ca03d5faf72c8f5014fa063cac64f24b
                                    • Instruction Fuzzy Hash: 81C1C274E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07e03cd62740ad086d486ff2b0801b60da8d95495ca8c7537eff0eb2a99d66aa
                                    • Instruction ID: c66d564d5bf9a3371a0a33462f33daf155345c6bcfacb8d806f239e0316ecb33
                                    • Opcode Fuzzy Hash: 07e03cd62740ad086d486ff2b0801b60da8d95495ca8c7537eff0eb2a99d66aa
                                    • Instruction Fuzzy Hash: 38C1D3B4E00218CFDB54EFA5D994B9DBBB2BF88304F1081A9D409AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 37e4a68ce97fac6a42329287300c5d1cd0f7bf386c4ac44e23c84baf298b4ce5
                                    • Instruction ID: 4b7feb6e4bb66e8f209e17459ec5932b46999763095ed3a0a17f419a99161921
                                    • Opcode Fuzzy Hash: 37e4a68ce97fac6a42329287300c5d1cd0f7bf386c4ac44e23c84baf298b4ce5
                                    • Instruction Fuzzy Hash: 8FC1C3B4E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D409AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 409d7ca3d99234ce40677907b39e7222cd7ed32a32e9ef472f70678ecb07dd61
                                    • Instruction ID: 057d9ac8172e0fa93157397d2eb1499dd2351c82510dc3ea8fc5d41906feb53c
                                    • Opcode Fuzzy Hash: 409d7ca3d99234ce40677907b39e7222cd7ed32a32e9ef472f70678ecb07dd61
                                    • Instruction Fuzzy Hash: B0C1C274E00218CFDB54EFA5D984B9DBBB2BF88304F2081A9D419AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0fd796b2361e6e1bd9b82af1b3e4dbe93b3ebcdc7ab54181b4c2b64fed552ce1
                                    • Instruction ID: a3096989fd16748233bb7d17b1f9e86bf33ae9e12855f7bf05baafac5321b1d1
                                    • Opcode Fuzzy Hash: 0fd796b2361e6e1bd9b82af1b3e4dbe93b3ebcdc7ab54181b4c2b64fed552ce1
                                    • Instruction Fuzzy Hash: F4C1D274E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: da2d1b3d7244e5e3fdf440b7470bce10582fba5a23ceaa46edf09fdb376b5505
                                    • Instruction ID: e80675af7a267cd8315ad17aa30fd7b6ea9f4d80167f8fc0d18eb5b7889dbfd6
                                    • Opcode Fuzzy Hash: da2d1b3d7244e5e3fdf440b7470bce10582fba5a23ceaa46edf09fdb376b5505
                                    • Instruction Fuzzy Hash: 68C1D374E00218CFDB54EFA5D954B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b02148c9caec54d1ee4d09384e91b2177deb53bd9c8322ca4694b5211f8c7c8
                                    • Instruction ID: 524a58933428e4e26eae9ad618d1d69355e631989d7e980e38ac59b7917c70ad
                                    • Opcode Fuzzy Hash: 7b02148c9caec54d1ee4d09384e91b2177deb53bd9c8322ca4694b5211f8c7c8
                                    • Instruction Fuzzy Hash: E6C1C174E00218CFDB54EFA5D994B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 644b7b731e74078c3e36ac69e06ce6f2649ae97642d1ecb572d33c6176d9512d
                                    • Instruction ID: 52bd9d453345b6e07855670ecb78c46e2278f8f84aeb3901180bac73789d6b9c
                                    • Opcode Fuzzy Hash: 644b7b731e74078c3e36ac69e06ce6f2649ae97642d1ecb572d33c6176d9512d
                                    • Instruction Fuzzy Hash: F1C1C174E00218CFDB54EFA5D984B9DBBB2BF88304F2081A9D409AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a46d4dc3939482396853cd1f09c9c9c2ecc453cf189572fe436031f89c217334
                                    • Instruction ID: 5feb4f106f540e60b31853a3d3d28efe58208cf65e264dcb2d2fec1f8be226d2
                                    • Opcode Fuzzy Hash: a46d4dc3939482396853cd1f09c9c9c2ecc453cf189572fe436031f89c217334
                                    • Instruction Fuzzy Hash: 88C1C174E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79d3506d20128f8a166b39bc2b2047d2c12e3488ae6a823e7fc72c84d541f400
                                    • Instruction ID: d23df4284f8d97bba289ec3eafe3f795239437deb8e622223b35ed6d8f73db66
                                    • Opcode Fuzzy Hash: 79d3506d20128f8a166b39bc2b2047d2c12e3488ae6a823e7fc72c84d541f400
                                    • Instruction Fuzzy Hash: 67C1E374E00228CFDB54EFA5D994B9DBBB2BF89304F2081A9D409AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a61268f4e2701a461755d9dda80053ac0582aa2dafd2b2b299c0d7b1c26a9b58
                                    • Instruction ID: 4d32ed26c72b2fb8e8e2280ef71c8c49de8df10153ad54c658904729f82cfa31
                                    • Opcode Fuzzy Hash: a61268f4e2701a461755d9dda80053ac0582aa2dafd2b2b299c0d7b1c26a9b58
                                    • Instruction Fuzzy Hash: A3C1C274E00218CFDB54EFA5D994B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3cdd43b7a31badf81cf5a7a95382e69b85730c9722ce4c23b30f0e45b00d9d9e
                                    • Instruction ID: 450743e87755e332636ff2926616be3a89392a6cfe1923aa372ef8737951efcb
                                    • Opcode Fuzzy Hash: 3cdd43b7a31badf81cf5a7a95382e69b85730c9722ce4c23b30f0e45b00d9d9e
                                    • Instruction Fuzzy Hash: 27C1C274E00218CFDB54EFA5D944B9DBBB2BF89304F1081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 66950b4a034a7e5f4621aa5e034f616aeddd4f5f0b44cc319e23a03433fc431e
                                    • Instruction ID: b4f1bb5e4420d4c1e68ad011a5673f81cbc571722855939ef620883ab207d3e1
                                    • Opcode Fuzzy Hash: 66950b4a034a7e5f4621aa5e034f616aeddd4f5f0b44cc319e23a03433fc431e
                                    • Instruction Fuzzy Hash: FFC1D3B4E00218CFDB54EFA5D984B9DBBB2BF89304F2081A9D409AB355DB349D85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f1fe2133ca948d94c6b8e4c34edd783b19609eee2468c05b79956acbca176535
                                    • Instruction ID: 67ef6cd5c68af91b16f0ccfb5d77d62b3ba0f098fdd5a5a0a23cdd18111448e6
                                    • Opcode Fuzzy Hash: f1fe2133ca948d94c6b8e4c34edd783b19609eee2468c05b79956acbca176535
                                    • Instruction Fuzzy Hash: BDC1C274E00218CFDB54EFA5D994B9DBBB2BF88304F2081A9D809AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c37cc450256e2295daa0cde660f10e9e8ba35a2769bd9e0e9409dd7ba28e066d
                                    • Instruction ID: a106643aea44c83d3b3a939d5cc48d9d3ce721f2e94a3c0f1bbd63dc2ea87ffa
                                    • Opcode Fuzzy Hash: c37cc450256e2295daa0cde660f10e9e8ba35a2769bd9e0e9409dd7ba28e066d
                                    • Instruction Fuzzy Hash: A8C1D274E00218CFDB54EFA5D944B9DBBB2BF89304F2081A9D819AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c011b9d4b3092f7c2f25d5c893d6033f212f2c881f384118fb4c4bf881e866c2
                                    • Instruction ID: 679937951284af3fbcadf0ac6545d2c42aad8471ab40d0f59e0a9feb05d6cd03
                                    • Opcode Fuzzy Hash: c011b9d4b3092f7c2f25d5c893d6033f212f2c881f384118fb4c4bf881e866c2
                                    • Instruction Fuzzy Hash: 03C1D274E00218CFDB54EFA5D994B9DBBB2BF89304F2081A9D809AB355DB349E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4502806131.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6b10000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3077b327e4cf057375fa2da3c15ee1d621c3abc4225124ebf963a1bcc1311626
                                    • Instruction ID: d07f7ee3749b787e590794d7a2a9ca2f7b94f64dd3834b0c2a7cd24e54b46a6f
                                    • Opcode Fuzzy Hash: 3077b327e4cf057375fa2da3c15ee1d621c3abc4225124ebf963a1bcc1311626
                                    • Instruction Fuzzy Hash: BBD05E34D0421CCACB20EF68D8503ADB372FF82304F0020E6C109B7250D7345E109F12
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4500624953.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2c80000_order6566546663.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \;]q$\;]q$\;]q$\;]q
                                    • API String ID: 0-2351511683
                                    • Opcode ID: 9237d034a0fe84a0a561356627b6bff1f87f0dc2c768be9fe2653311282438ed
                                    • Instruction ID: ca395a5b6c54f7b08db6c6cc6918ac990458da80e050fd034364aed6d79e0297
                                    • Opcode Fuzzy Hash: 9237d034a0fe84a0a561356627b6bff1f87f0dc2c768be9fe2653311282438ed
                                    • Instruction Fuzzy Hash: BB01BC317000148F8B24AE2DC580A2677EEAFC8AA9335817AE501CB3B4DB72DC41C7CC