Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KBDFW9FTsq.exe

Overview

General Information

Sample name:KBDFW9FTsq.exe
renamed because original name is a hash value
Original sample name:01995be1c953e0f7640f17b5c2247bc2.exe
Analysis ID:1519314
MD5:01995be1c953e0f7640f17b5c2247bc2
SHA1:02abc4ef1134362ded897ebe2806d121522dbf65
SHA256:732c3a097337212ea87c31a6df3e78790963f330c7c0318a5ddeec8576f83123
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • KBDFW9FTsq.exe (PID: 6504 cmdline: "C:\Users\user\Desktop\KBDFW9FTsq.exe" MD5: 01995BE1C953E0F7640F17B5C2247BC2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["95.179.250.45:26212"], "Bot Id": "LiveTraffic", "Message": "Error! Disable antivirus and try again!", "Authorization Header": "143feb5082f9936e624c1e27545e7d19"}
SourceRuleDescriptionAuthorStrings
KBDFW9FTsq.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2027577444.0000000000382000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: KBDFW9FTsq.exe PID: 6504JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Process Memory Space: KBDFW9FTsq.exe PID: 6504JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.KBDFW9FTsq.exe.380000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T11:02:05.920449+020020432341A Network Trojan was detected95.179.250.4526212192.168.2.549704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T11:02:05.734121+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:11.027784+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:11.460853+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:11.649970+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:11.907306+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:12.929754+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:13.123961+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:13.321752+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:13.511249+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:13.699830+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:13.939428+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:14.251621+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:14.440260+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:14.663232+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:14.851509+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:15.043432+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:15.234786+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:15.477292+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:15.495919+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:16.022049+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:16.288673+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:16.293967+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:17.102682+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:17.290994+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    2024-09-26T11:02:17.507591+020020432311A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T11:02:11.465673+020020460561A Network Trojan was detected95.179.250.4526212192.168.2.549704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T11:02:05.734121+020020460451A Network Trojan was detected192.168.2.54970495.179.250.4526212TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: KBDFW9FTsq.exeMalware Configuration Extractor: RedLine {"C2 url": ["95.179.250.45:26212"], "Bot Id": "LiveTraffic", "Message": "Error! Disable antivirus and try again!", "Authorization Header": "143feb5082f9936e624c1e27545e7d19"}
                    Source: KBDFW9FTsq.exeReversingLabs: Detection: 76%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: KBDFW9FTsq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: KBDFW9FTsq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then jmp 06619F65h0_2_06619C90
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then jmp 0661DF20h0_2_0661DA28
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then jmp 0661A767h0_2_0661A008
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then inc dword ptr [ebp-20h]0_2_06612E88
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then jmp 06618BA7h0_2_066187C9
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 4x nop then inc dword ptr [ebp-20h]0_2_06613158

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043231 - Severity 1 - ET MALWARE Redline Stealer TCP CnC Activity : 192.168.2.5:49704 -> 95.179.250.45:26212
                    Source: Network trafficSuricata IDS: 2046045 - Severity 1 - ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) : 192.168.2.5:49704 -> 95.179.250.45:26212
                    Source: Network trafficSuricata IDS: 2043234 - Severity 1 - ET MALWARE Redline Stealer TCP CnC - Id1Response : 95.179.250.45:26212 -> 192.168.2.5:49704
                    Source: Network trafficSuricata IDS: 2046056 - Severity 1 - ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) : 95.179.250.45:26212 -> 192.168.2.5:49704
                    Source: Malware configuration extractorURLs: 95.179.250.45:26212
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 95.179.250.45:26212
                    Source: Joe Sandbox ViewIP Address: 95.179.250.45 95.179.250.45
                    Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.179.250.45
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9i
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002B10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002B10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000296A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002857000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: KBDFW9FTsq.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp397D.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp396C.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_00D1DC740_2_00D1DC74
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_05FC67D80_2_05FC67D8
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_05FCA6880_2_05FCA688
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_05FC6FF80_2_05FC6FF8
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_05FC6FE80_2_05FC6FE8
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_066176B00_2_066176B0
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661CD780_2_0661CD78
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_06618D2A0_2_06618D2A
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661F5380_2_0661F538
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_06616DE00_2_06616DE0
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661DA280_2_0661DA28
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_066113C00_2_066113C0
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661B3B30_2_0661B3B3
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661A0080_2_0661A008
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661A9200_2_0661A920
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_066187C90_2_066187C9
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_0661CD690_2_0661CD69
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_06616A980_2_06616A98
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_066113B00_2_066113B0
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2169505027.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000000.2027610714.00000000003C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHardens.exe8 vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $sq,\\StringFileInfo\\000004B0\\OriginalFilename vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $sq,\\StringFileInfo\\040904B0\\OriginalFilename vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $sq,\\StringFileInfo\\080904B0\\OriginalFilename vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exeBinary or memory string: OriginalFilenameHardens.exe8 vs KBDFW9FTsq.exe
                    Source: KBDFW9FTsq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/5@0/1
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp396C.tmpJump to behavior
                    Source: KBDFW9FTsq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: KBDFW9FTsq.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: KBDFW9FTsq.exeReversingLabs: Detection: 76%
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: esdsip.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
                    Source: Google Chrome.lnk.0.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: KBDFW9FTsq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: KBDFW9FTsq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: KBDFW9FTsq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: KBDFW9FTsq.exeStatic PE information: 0xE5ABE3E9 [Thu Feb 7 18:31:05 2092 UTC]
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_05FCEFB2 push eax; ret 0_2_05FCEFC1

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeMemory allocated: CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeMemory allocated: 2760000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeMemory allocated: 2540000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWindow / User API: threadDelayed 2035Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWindow / User API: threadDelayed 7668Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exe TID: 2796Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exe TID: 3856Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2176979605.000000000607A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.000000000389C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2172746780.0000000003B5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeCode function: 0_2_06613E78 LdrInitializeThunk,0_2_06613E78
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Users\user\Desktop\KBDFW9FTsq.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2169806822.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: KBDFW9FTsq.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.KBDFW9FTsq.exe.380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027577444.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: KBDFW9FTsq.exe PID: 6504, type: MEMORYSTR
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $sq2C:\Users\user\AppData\Roaming\Electrum\wallets\*
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxE#
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLRsq
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLRsqlz
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $sq%appdata%`,sqdC:\Users\user\AppData\Roaming`,sqdC:\Users\user\AppData\Roaming\Binance
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $sq&%localappdata%\Coinomi\Coinomi\walletsLRsq
                    Source: KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $sq6C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Users\user\Desktop\KBDFW9FTsq.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: KBDFW9FTsq.exe PID: 6504, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: KBDFW9FTsq.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.KBDFW9FTsq.exe.380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027577444.0000000000382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: KBDFW9FTsq.exe PID: 6504, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager241
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Install Root Certificate
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Timestomp
                    Cached Domain Credentials113
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    KBDFW9FTsq.exe76%ReversingLabsByteCode-MSIL.Ransomware.RedLine
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                    http://tempuri.org/0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id14ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id6ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id13ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id5ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id21ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id15ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id11ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id8ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id17ResponseD0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%Avira URL Cloudsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id12ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id2ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id9KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id8KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000296A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id5KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id4KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id7KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002857000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id6KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id19ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id13ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKBDFW9FTsq.exe, 00000000.00000002.2170557700.000000000285F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.ip.sb/ipKBDFW9FTsq.exefalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id9ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id20KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id21KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id22KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id24KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id24ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002CB7000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002D98000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id10KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id11KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id12KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id16ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id13KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id14KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id15KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id16KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/NonceKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id17KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id18KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id19KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmp, KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RenewKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id11ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.00000000028EE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id17ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/KBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseDKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyKBDFW9FTsq.exe, 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    95.179.250.45
                    unknownNetherlands
                    20473AS-CHOOPAUStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1519314
                    Start date and time:2024-09-26 11:01:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 30s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:4
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:KBDFW9FTsq.exe
                    renamed because original name is a hash value
                    Original Sample Name:01995be1c953e0f7640f17b5c2247bc2.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@1/5@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 102
                    • Number of non-executed functions: 19
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: KBDFW9FTsq.exe
                    TimeTypeDescription
                    05:02:11API Interceptor47x Sleep call for process: KBDFW9FTsq.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    95.179.250.45file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                      file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                        file.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, Stealc, zgRATBrowse
                          jD6b7MZOhT.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                            SecuriteInfo.com.Win32.TrojanX-gen.1325.25139.exeGet hashmaliciousAmadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
                              file.exeGet hashmaliciousRedLineBrowse
                                VMRhiAFJtl.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, PureLog Stealer, RedLine, StealcBrowse
                                  file.exeGet hashmaliciousRedLineBrowse
                                    XpCyBwDzEt.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, DanaBot, PureLog Stealer, RedLineBrowse
                                      g082Q9DajU.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, PureLog StealerBrowse
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AS-CHOOPAUSfile.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                        • 95.179.250.45
                                        https://duroterra.comGet hashmaliciousUnknownBrowse
                                        • 207.148.0.16
                                        VwsPnLkxnp.exeGet hashmaliciousUnknownBrowse
                                        • 139.180.202.227
                                        t77rOVfEUc.exeGet hashmaliciousUnknownBrowse
                                        • 139.180.202.227
                                        JE2TjQlTkn.exeGet hashmaliciousQuasarBrowse
                                        • 139.180.202.227
                                        dxC31Z2rU3.exeGet hashmaliciousUnknownBrowse
                                        • 139.180.202.227
                                        4IOzVTrG6f.exeGet hashmaliciousUnknownBrowse
                                        • 139.180.202.227
                                        lf3HNjfUat.exeGet hashmaliciousUnknownBrowse
                                        • 139.180.202.227
                                        https://ms.email.streetcontxt.net/platform/al?a=9379139&ad=2080279888&h=mQ0byH1&sig=Fp6bSH7g2Q3qYFAsEOqnIZYZZNz&v=2&url=https://www.hpcwire.com/2024/09/23/ansys-fluent-adds-amd-instinct-mi200-and-mi300-acceleration-to-power-cfd-simulations/Get hashmaliciousUnknownBrowse
                                        • 207.148.0.16
                                        Document.xlsGet hashmaliciousUnknownBrowse
                                        • 149.28.237.171
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:56 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                        Category:dropped
                                        Size (bytes):2104
                                        Entropy (8bit):3.449633847939307
                                        Encrypted:false
                                        SSDEEP:48:8Sh9l2dfTXdARYrnvPdAKRkdAGdAKRFdAKRE:8Sh9lO7
                                        MD5:071FE82829BF163D14CC85A60504C1E4
                                        SHA1:49C50EC05229C7935D1D549E5E2C04622EBC55C6
                                        SHA-256:EC5DF38097E0450EB917D3CFD6DE6638FCFDF9D7772FF98686BAD57BF7899C1D
                                        SHA-512:B5A24C118EEB4B2EF84E9CBFF2FD8067AB8B19152EAB60FFD7EFADC62B3C85A9FCBCD4290D9CE88F18A03B67B5457D8D95885C81D62C583BA229FEEF219E18EF
                                        Malicious:false
                                        Reputation:low
                                        Preview:L..................F.@.. ......,......!n.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                        Process:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):3274
                                        Entropy (8bit):5.3318368586986695
                                        Encrypted:false
                                        SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqc85VD:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlq0
                                        MD5:0C1110E9B7BBBCB651A0B7568D796468
                                        SHA1:7AEE00407EE27655FFF0ADFBC96CF7FAD9610AAA
                                        SHA-256:112E21404A85963FB5DF8388F97429D6A46E9D4663435CC86267C563C0951FA2
                                        SHA-512:46E37552764B4E61006AB99F8C542D55B2418668B097D3C6647D306604C3D7CA3FAF34F8B4121D94B0E7168295B2ABEB7C21C3B96F37208943537B887BC81590
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2662
                                        Entropy (8bit):7.8230547059446645
                                        Encrypted:false
                                        SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                        MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                        SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                        SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                        SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                        Process:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2662
                                        Entropy (8bit):7.8230547059446645
                                        Encrypted:false
                                        SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                        MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                        SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                        SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                        SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                        Process:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2251
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:0158FE9CEAD91D1B027B795984737614
                                        SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                        SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                        SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):5.083544131783037
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:KBDFW9FTsq.exe
                                        File size:311'296 bytes
                                        MD5:01995be1c953e0f7640f17b5c2247bc2
                                        SHA1:02abc4ef1134362ded897ebe2806d121522dbf65
                                        SHA256:732c3a097337212ea87c31a6df3e78790963f330c7c0318a5ddeec8576f83123
                                        SHA512:b9e92edafba6499a38c7c7b3ce1a315acf57e21d5f4ecf8a1d6e75c631088b070169cc9ada1d4ad3743f3259990a551e0bf4121da38fb642221bf53bddc38f7f
                                        SSDEEP:3072:5q6EgY6i1rUjphYowPel9o4TWLZTTAotA/iBMcZqf7D34leqiOLibBOZ:IqY6igwPWxKZTTA0AeMcZqf7DIvL
                                        TLSH:16646C1823EC8511E37F4B7994B1E67493B5EC16A852D31F4ED06CAB3E32741FA11AB2
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............f.... ... ....@.. ....................... ............@................................
                                        Icon Hash:4d8ea38d85a38e6d
                                        Entrypoint:0x42ba66
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0xE5ABE3E9 [Thu Feb 7 18:31:05 2092 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        popad
                                        add byte ptr [ebp+00h], dh
                                        je 00007F14E1464192h
                                        outsd
                                        add byte ptr [esi+00h], ah
                                        imul eax, dword ptr [eax], 006C006Ch
                                        xor eax, 59007400h
                                        add byte ptr [edi+00h], dl
                                        push edx
                                        add byte ptr [ecx+00h], dh
                                        popad
                                        add byte ptr [edi+00h], dl
                                        push esi
                                        add byte ptr [edi+00h], ch
                                        popad
                                        add byte ptr [ebp+00h], ch
                                        push 61006800h
                                        add byte ptr [ebp+00h], ch
                                        dec edx
                                        add byte ptr [eax], bh
                                        add byte ptr [edi+00h], dl
                                        push edi
                                        add byte ptr [ecx], bh
                                        add byte ptr [ecx+00h], bh
                                        bound eax, dword ptr [eax]
                                        xor al, byte ptr [eax]
                                        insb
                                        add byte ptr [eax+00h], bl
                                        pop ecx
                                        add byte ptr [edi+00h], dl
                                        js 00007F14E1464192h
                                        jnc 00007F14E1464192h
                                        pop edx
                                        add byte ptr [eax+00h], bl
                                        push ecx
                                        add byte ptr [ebx+00h], cl
                                        popad
                                        add byte ptr [edi+00h], dl
                                        dec edx
                                        add byte ptr [ebp+00h], dh
                                        pop edx
                                        add byte ptr [edi+00h], dl
                                        jo 00007F14E1464192h
                                        imul eax, dword ptr [eax], 5Ah
                                        add byte ptr [ebp+00h], ch
                                        jo 00007F14E1464192h
                                        je 00007F14E1464192h
                                        bound eax, dword ptr [eax]
                                        push edi
                                        add byte ptr [eax+eax+77h], dh
                                        add byte ptr [ecx+00h], bl
                                        xor al, byte ptr [eax]
                                        xor eax, 63007300h
                                        add byte ptr [edi+00h], al
                                        push esi
                                        add byte ptr [ecx+00h], ch
                                        popad
                                        add byte ptr [edx], dh
                                        add byte ptr [eax+00h], bh
                                        je 00007F14E1464192h
                                        bound eax, dword ptr [eax]
                                        insd
                                        add byte ptr [eax+eax+76h], dh
                                        add byte ptr [edx+00h], bl
                                        push edi
                                        add byte ptr [ecx], bh
                                        add byte ptr [eax+00h], dh
                                        popad
                                        add byte ptr [edi+00h], al
                                        cmp dword ptr [eax], eax
                                        insd
                                        add byte ptr [edx+00h], bl
                                        push edi
                                        add byte ptr [esi+00h], cl
                                        cmp byte ptr [eax], al
                                        push esi
                                        add byte ptr [eax+00h], cl
                                        dec edx
                                        add byte ptr [esi+00h], dh
                                        bound eax, dword ptr [eax]
                                        insd
                                        add byte ptr [eax+00h], bh
                                        jo 00007F14E1464192h
                                        bound eax, dword ptr [eax]
                                        insd
                                        add byte ptr [ebx+00h], dh
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2ba140x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9c4.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x2b9f80x1c.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x2ea4c0x2ec004e873a61cb04c5b4fbaeca8779685e51False0.4701808990641711data6.207590918410276IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x320000x1c9c40x1cc00402b4ad6ae5f8a52c5570702f6e95b4bFalse0.23721127717391305data2.605891841224002IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x500000xc0x4009a04cc8a2e6cf6b058d2bb33d40346aaFalse0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x321a00x3d04PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934058898847631
                                        RT_ICON0x35eb40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                                        RT_ICON0x466ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                                        RT_ICON0x4a9240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                                        RT_ICON0x4cedc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                                        RT_ICON0x4df940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                                        RT_GROUP_ICON0x4e40c0x5adata0.7666666666666667
                                        RT_VERSION0x4e4780x34adata0.4418052256532066
                                        RT_MANIFEST0x4e7d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-09-26T11:02:05.734121+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:05.734121+02002046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:05.920449+02002043234ET MALWARE Redline Stealer TCP CnC - Id1Response195.179.250.4526212192.168.2.549704TCP
                                        2024-09-26T11:02:11.027784+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:11.460853+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:11.465673+02002046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)195.179.250.4526212192.168.2.549704TCP
                                        2024-09-26T11:02:11.649970+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:11.907306+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:12.929754+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:13.123961+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:13.321752+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:13.511249+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:13.699830+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:13.939428+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:14.251621+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:14.440260+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:14.663232+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:14.851509+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:15.043432+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:15.234786+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:15.477292+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:15.495919+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:16.022049+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:16.288673+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:16.293967+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:17.102682+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:17.290994+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        2024-09-26T11:02:17.507591+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.54970495.179.250.4526212TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 26, 2024 11:02:04.686393976 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:04.692092896 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:04.692198992 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:04.711059093 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:04.717153072 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:05.332655907 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:05.383594990 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:05.734121084 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:05.739084005 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:05.920449018 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:05.962117910 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.027784109 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.032759905 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218163013 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218188047 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218199015 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218209028 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218223095 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.218276024 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.460853100 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.465672970 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.646776915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.649970055 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.654887915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.835510969 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.883531094 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.907305956 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.912288904 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912352085 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912379980 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912385941 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.912408113 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912434101 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.912435055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912434101 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:11.912482977 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912532091 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912595034 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912621021 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912693977 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.912719965 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.917567968 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.917594910 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.917624950 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.917773008 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:11.917799950 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:12.181648016 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:12.227299929 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:12.929754019 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:12.934806108 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.116383076 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.123960972 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.129195929 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.129239082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.129265070 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.129292965 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.129342079 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.129368067 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.318708897 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.321752071 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.326721907 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.507217884 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.511249065 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.516110897 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.696342945 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.699830055 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.704705000 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.885162115 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:13.930406094 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.939428091 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:13.944437027 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.125622034 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.180424929 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:14.251621008 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:14.256589890 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.437906027 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.440259933 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:14.445131063 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.660336018 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.663232088 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:14.668076992 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.849772930 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:14.851509094 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:14.856484890 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.036981106 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.043431997 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:15.048270941 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.228637934 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.234786034 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:15.239639997 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.420456886 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.477292061 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:15.495918989 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:15.683157921 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:15.988676071 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.022048950 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.027091980 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.207691908 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.258529902 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.288672924 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.293901920 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.293941975 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.293967009 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.293970108 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294003010 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294012070 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294023037 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294032097 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294059038 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294060946 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294085979 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294087887 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294101000 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294112921 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294131994 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294140100 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.294154882 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.294190884 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298460960 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298491001 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298531055 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298554897 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298566103 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298593998 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298610926 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298624992 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298651934 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298651934 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298672915 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298679113 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298700094 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298718929 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298726082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298753023 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298787117 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298799038 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298808098 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298825979 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298852921 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298862934 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298871040 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298897982 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298913002 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298945904 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.298945904 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298973083 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.298990011 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.299036026 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303196907 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303226948 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303260088 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303277016 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303287983 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303304911 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303329945 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303330898 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303342104 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303359032 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303379059 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303405046 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303422928 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303450108 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303476095 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303483963 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303502083 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303528070 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303535938 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303556919 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.303574085 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303605080 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303631067 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303657055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303683043 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303708076 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303734064 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303778887 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303806067 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303847075 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303899050 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303926945 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303939104 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.303983927 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304011106 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304037094 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304063082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304112911 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304127932 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304141998 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304168940 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304188013 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304194927 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304218054 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304250956 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304261923 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304280043 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304302931 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304307938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304328918 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304347992 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304354906 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304382086 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304400921 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304408073 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304438114 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.304454088 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304481030 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304526091 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304552078 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.304579020 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308777094 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308806896 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308849096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308882952 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308911085 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308938026 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308964014 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.308990002 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.309015989 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.309041023 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.309067011 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.309092999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.309982061 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310009003 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310034990 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310060978 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310087919 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310115099 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310142040 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310201883 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310229063 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310255051 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310281038 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310307026 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310332060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310378075 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310404062 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310431957 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310456991 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310514927 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310542107 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310566902 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310591936 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310617924 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310642958 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310689926 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310715914 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310741901 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310767889 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310794115 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310817957 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.310839891 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310868025 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310893059 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310893059 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.310924053 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310949087 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.310975075 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311001062 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311049938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311077118 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311101913 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311127901 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311155081 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311181068 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311229944 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311255932 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311284065 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311310053 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311335087 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311362028 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311428070 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311455011 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311480999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311506987 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311532974 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311594009 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311620951 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311646938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311671972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311697960 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311753988 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311779976 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311805964 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311831951 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311857939 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311882973 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311908960 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311934948 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.311980009 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312006950 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312032938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312058926 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312086105 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312112093 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312160015 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.312186003 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.314008951 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.314181089 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.314261913 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.316072941 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317044020 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317071915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317118883 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317207098 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317253113 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317279100 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317308903 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317394972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317421913 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317509890 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317537069 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317599058 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317625999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317724943 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317751884 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317796946 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.317825079 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318355083 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318382978 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318409920 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318434954 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318461895 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318487883 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318514109 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318540096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318588972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318615913 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318643093 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318669081 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318702936 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318723917 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318736076 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318747997 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318758965 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318769932 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318782091 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318794012 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318804979 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318816900 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318828106 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318839073 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318861008 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318871975 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318882942 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318893909 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318905115 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318916082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318927050 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318938017 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318958044 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318969011 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318979025 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.318989992 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319118977 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319132090 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319228888 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.319297075 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.319327116 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319340944 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319353104 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319364071 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319375038 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319392920 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319405079 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319416046 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319437027 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319447994 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319458961 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319470882 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319482088 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319502115 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319513083 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319525957 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319536924 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319576979 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319588900 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319745064 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319757938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319768906 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319780111 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319799900 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319813013 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319823980 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319834948 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319854975 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319866896 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319914103 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319945097 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319981098 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.319993019 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320050001 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320070028 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320090055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320101023 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320113897 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320188999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320202112 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320228100 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320240021 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320250988 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320265055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320285082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320372105 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320384026 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320405960 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320416927 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320430994 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320441961 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320743084 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.320930958 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.320997953 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.324101925 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324281931 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324321985 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324415922 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324429035 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324460983 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324474096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324486017 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324497938 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324517965 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324531078 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324552059 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324563026 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324584007 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324595928 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324666977 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324680090 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324774027 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324784994 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324836016 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324847937 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324860096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324882984 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324893951 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324904919 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324927092 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324939013 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324949980 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.324960947 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325004101 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325016022 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325037003 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325047970 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325139999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325187922 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325198889 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325222015 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325233936 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325254917 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325265884 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325333118 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325344086 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325357914 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325368881 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325400114 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325449944 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325462103 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325474024 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325496912 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325509071 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325520039 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325531006 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325566053 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325577974 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.325758934 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.325824976 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.327259064 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327272892 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327301979 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327312946 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327347040 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327359915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327379942 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327402115 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327471972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327483892 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327495098 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327507019 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327531099 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327543974 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327563047 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327574015 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327584982 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327596903 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327658892 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327671051 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327682972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327693939 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327713966 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327724934 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327737093 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327748060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327768087 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327780008 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327800989 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327812910 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327827930 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327840090 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327908993 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327920914 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327934980 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327955008 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.327966928 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328007936 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328020096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328032970 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328052998 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328063965 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328084946 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328097105 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328135967 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328147888 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328172922 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328183889 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328222990 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328233957 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328270912 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328283072 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328373909 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328386068 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.328572989 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.328639984 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.330640078 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330651999 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330673933 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330686092 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330697060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330709934 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330729961 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330777884 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330851078 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330863953 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330874920 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330885887 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330907106 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330919027 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330929995 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330944061 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.330990076 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331002951 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331013918 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331024885 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331044912 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331058025 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331078053 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331089020 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331157923 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331170082 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331211090 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331222057 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331259966 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331270933 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331305981 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331373930 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331396103 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331407070 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331428051 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331439972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331492901 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331505060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331535101 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331546068 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331585884 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331597090 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331727982 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331739902 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331778049 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331891060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331912994 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331924915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331954002 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.331998110 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.332036972 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.332050085 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.332129002 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.332140923 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.332367897 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.332434893 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.333585024 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333597898 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333628893 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333641052 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333683968 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333695889 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333740950 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333751917 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333780050 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333812952 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333869934 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333890915 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333931923 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.333971977 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334012985 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334024906 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334068060 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334079981 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334147930 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334160089 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334182024 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334193945 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334233046 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334244967 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334269047 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334280968 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334340096 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334352970 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334388971 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334402084 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334446907 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334459066 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334508896 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334521055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334556103 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334568024 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334639072 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334650993 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334671974 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334685087 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334726095 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334737062 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334760904 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334825993 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334837914 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.334850073 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.380165100 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:16.380418062 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:16.431997061 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.102112055 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.102682114 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:17.107506990 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.290026903 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.290993929 CEST4970426212192.168.2.595.179.250.45
                                        Sep 26, 2024 11:02:17.295892954 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.477485895 CEST262124970495.179.250.45192.168.2.5
                                        Sep 26, 2024 11:02:17.507591009 CEST4970426212192.168.2.595.179.250.45

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Target ID:0
                                        Start time:05:02:02
                                        Start date:26/09/2024
                                        Path:C:\Users\user\Desktop\KBDFW9FTsq.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\KBDFW9FTsq.exe"
                                        Imagebase:0x380000
                                        File size:311'296 bytes
                                        MD5 hash:01995BE1C953E0F7640F17B5C2247BC2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.2027577444.0000000000382000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2170557700.0000000002809000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2170557700.0000000002982000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.7%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:7.1%
                                          Total number of Nodes:113
                                          Total number of Limit Nodes:13
                                          execution_graph 37029 d1d300 DuplicateHandle 37030 d1d396 37029->37030 37116 6613b80 37117 6613b8b 37116->37117 37119 6613b9b 37117->37119 37120 66108dc 37117->37120 37121 6613bd0 OleInitialize 37120->37121 37122 6613c34 37121->37122 37122->37119 37031 6611b38 37032 6611b52 37031->37032 37036 6611b89 37032->37036 37044 6611f9a 37032->37044 37033 6611b6e 37037 6611bc5 37036->37037 37038 6611fd0 37037->37038 37052 6613a30 37037->37052 37058 6613858 37037->37058 37067 6618580 37038->37067 37072 661856f 37038->37072 37039 661205e 37039->37033 37048 6611f68 37044->37048 37045 6611fd0 37050 6618580 3 API calls 37045->37050 37051 661856f 3 API calls 37045->37051 37046 661205e 37046->37033 37047 6613a30 3 API calls 37047->37048 37048->37045 37048->37047 37049 6613858 3 API calls 37048->37049 37049->37048 37050->37046 37051->37046 37053 6613a42 37052->37053 37078 6613acb 37053->37078 37054 6613a69 37082 6613c97 37054->37082 37055 6613aa0 37055->37037 37059 661385d 37058->37059 37062 6613a62 37059->37062 37063 6613a02 37059->37063 37060 6613a69 37064 6613c97 2 API calls 37060->37064 37061 6613aa0 37061->37037 37062->37060 37066 6613acb GetKeyboardLayout 37062->37066 37065 6613acb GetKeyboardLayout 37063->37065 37064->37061 37065->37060 37066->37060 37069 66185a7 37067->37069 37068 661864f 37068->37039 37069->37068 37092 6619670 37069->37092 37098 661965f 37069->37098 37073 661856e 37072->37073 37075 661857a 37072->37075 37073->37039 37074 661864f 37074->37039 37075->37074 37076 6619670 3 API calls 37075->37076 37077 661965f 3 API calls 37075->37077 37076->37075 37077->37075 37079 6613b32 GetKeyboardLayout 37078->37079 37081 6613ace 37078->37081 37080 6613b49 37079->37080 37080->37054 37081->37079 37083 6613cc4 37082->37083 37088 6613e78 37083->37088 37086 6613e07 37086->37055 37089 6613e9f 37088->37089 37090 6613ed7 LdrInitializeThunk 37089->37090 37091 6613d8e KiUserExceptionDispatcher 37089->37091 37090->37091 37091->37086 37093 6619697 37092->37093 37094 661971d 37093->37094 37104 661c8b1 37093->37104 37108 661c7d2 37093->37108 37112 661b3b3 37093->37112 37094->37069 37099 6619670 37098->37099 37100 661971d 37099->37100 37101 661c8b1 LdrInitializeThunk 37099->37101 37102 661b3b3 LdrInitializeThunk 37099->37102 37103 661c7d2 LdrInitializeThunk 37099->37103 37100->37069 37101->37100 37102->37100 37103->37100 37107 661b530 37104->37107 37105 661c854 37106 661bd4e LdrInitializeThunk 37106->37107 37107->37105 37107->37106 37109 661b6c5 37108->37109 37110 661c854 37109->37110 37111 661bd4e LdrInitializeThunk 37109->37111 37111->37109 37115 661b3c5 37112->37115 37113 661c854 37114 661bd4e LdrInitializeThunk 37114->37115 37115->37113 37115->37114 37123 d1d0b8 37124 d1d0fe GetCurrentProcess 37123->37124 37126 d1d150 GetCurrentThread 37124->37126 37127 d1d149 37124->37127 37128 d1d186 37126->37128 37129 d1d18d GetCurrentProcess 37126->37129 37127->37126 37128->37129 37130 d1d1c3 37129->37130 37131 d1d1eb GetCurrentThreadId 37130->37131 37132 d1d21c 37131->37132 37133 d1ad38 37137 d1ae20 37133->37137 37142 d1ae30 37133->37142 37134 d1ad47 37138 d1ae64 37137->37138 37139 d1ae41 37137->37139 37138->37134 37139->37138 37140 d1b068 GetModuleHandleW 37139->37140 37141 d1b095 37140->37141 37141->37134 37143 d1ae64 37142->37143 37144 d1ae41 37142->37144 37143->37134 37144->37143 37145 d1b068 GetModuleHandleW 37144->37145 37146 d1b095 37145->37146 37146->37134 37147 d14668 37148 d14684 37147->37148 37149 d14696 37148->37149 37151 d147a0 37148->37151 37152 d147c5 37151->37152 37156 d148a1 37152->37156 37160 d148b0 37152->37160 37157 d148d7 37156->37157 37158 d149b4 37157->37158 37164 d14248 37157->37164 37161 d148d7 37160->37161 37162 d149b4 37161->37162 37163 d14248 CreateActCtxA 37161->37163 37163->37162 37165 d15940 CreateActCtxA 37164->37165 37167 d15a03 37165->37167 37167->37167

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 490 661b3b3-661b3fb 492 661b402-661b49e 490->492 493 661b3fd 490->493 496 661b4f0-661c895 492->496 497 661b4a0-661b4ea 492->497 493->492 505 661b530-661b686 496->505 506 661c89b-661c8c1 496->506 497->496 742 661b68c call 661d1b1 505->742 743 661b68c call 661cd69 505->743 744 661b68c call 661cd78 505->744 745 661b68c call 661d1cc 505->745 509 661c8d0 506->509 510 661c8c3-661c8cf 506->510 511 661c8d1 509->511 510->509 511->511 522 661b692-661b6c0 524 661c834-661c84e 522->524 526 661b6c5-661b809 524->526 527 661c854-661c878 524->527 543 661b80b-661b837 526->543 544 661b83c-661b883 526->544 547 661b8cb-661ba83 543->547 549 661b885-661b8a7 544->549 550 661b8a9-661b8b8 544->550 572 661bad5-661bae0 547->572 573 661ba85-661bacf 547->573 556 661b8be-661b8ca 549->556 550->556 556->547 740 661bae6 call 661d8a1 572->740 741 661bae6 call 661d8b0 572->741 573->572 575 661baec-661bb50 580 661bba2-661bbad 575->580 581 661bb52-661bb9c 575->581 746 661bbb3 call 661d8a1 580->746 747 661bbb3 call 661d8b0 580->747 581->580 583 661bbb9-661bc1c 588 661bc6e-661bc79 583->588 589 661bc1e-661bc68 583->589 736 661bc7f call 661d8a1 588->736 737 661bc7f call 661d8b0 588->737 589->588 590 661bc85-661bcbe 594 661bcc4-661bd27 590->594 595 661c137-661c1be 590->595 603 661bd29 594->603 604 661bd2e-661bd80 LdrInitializeThunk call 661afdc 594->604 606 661c1c0-661c216 595->606 607 661c21c-661c227 595->607 603->604 614 661bd85-661bead call 661a008 call 661adb0 call 6616904 call 6619890 604->614 606->607 738 661c22d call 661d8a1 607->738 739 661c22d call 661d8b0 607->739 611 661c233-661c2c0 624 661c2c2-661c318 611->624 625 661c31e-661c329 611->625 648 661beb3-661bf05 614->648 649 661c11a-661c136 614->649 624->625 734 661c32f call 661d8a1 625->734 735 661c32f call 661d8b0 625->735 630 661c335-661c3ad 640 661c40b-661c416 630->640 641 661c3af-661c405 630->641 732 661c41c call 661d8a1 640->732 733 661c41c call 661d8b0 640->733 641->640 645 661c422-661c48e 659 661c4e0-661c4eb 645->659 660 661c490-661c4da 645->660 657 661bf57-661bfd2 648->657 658 661bf07-661bf51 648->658 649->595 675 661c024-661c09e 657->675 676 661bfd4-661c01e 657->676 658->657 730 661c4f1 call 661d8a1 659->730 731 661c4f1 call 661d8b0 659->731 660->659 664 661c4f7-661c53c 673 661c672-661c81b 664->673 674 661c542-661c671 664->674 727 661c833 673->727 728 661c81d-661c832 673->728 674->673 690 661c0f0-661c119 675->690 691 661c0a0-661c0ea 675->691 676->675 690->649 691->690 727->524 728->727 730->664 731->664 732->645 733->645 734->630 735->630 736->590 737->590 738->611 739->611 740->575 741->575 742->522 743->522 744->522 745->522 746->583 747->583
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #>$#jRl^$3jRl^$CjRl^$SjRl^$cjRl^
                                          • API String ID: 0-3258293859
                                          • Opcode ID: e97c801ee9906c54b9a5b8fa7d246c32a5888b3f872e9ba1a0e57e9ebeaa3941
                                          • Instruction ID: f658832e82c6949a835b52eb67a137c1b27740f16ca4967865048568eccb0ddc
                                          • Opcode Fuzzy Hash: e97c801ee9906c54b9a5b8fa7d246c32a5888b3f872e9ba1a0e57e9ebeaa3941
                                          • Instruction Fuzzy Hash: CAC2AE74A01229CFDBA4EF24D898B9DB7B2FB89301F1095E9D909A7354DB346E85CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 855 661f538-661f545 856 661f547-661f54b 855->856 857 661f5a6-661f5f9 855->857 859 661f551-661f555 856->859 860 661f605-661f609 857->860 861 661f5fb-661f603 857->861 862 661f557-661f559 859->862 863 661f55b-661f55c 859->863 864 661f60e-661f613 860->864 861->864 862->863 865 661f54d-661f550 862->865 866 661f615-661f61a 864->866 867 661f61c-661f625 864->867 865->859 868 661f628-661f62a 866->868 867->868 869 661f630-661f649 call 661f430 868->869 870 661f996-661f9c0 868->870 874 661f697-661f69e 869->874 875 661f64b-661f65b 869->875 895 661f9c7-661fa07 870->895 876 661f6a0 874->876 877 661f6a3-661f6b3 874->877 878 661f661-661f679 875->878 879 661f92e-661f94b 875->879 876->877 881 661f6c3-661f6e0 877->881 882 661f6b5-661f6c1 877->882 883 661f954-661f95d 878->883 884 661f67f-661f686 878->884 879->883 888 661f6e4-661f6f0 881->888 882->888 885 661f965-661f98f 883->885 884->885 886 661f68c-661f696 884->886 885->870 889 661f6f2-661f6f4 888->889 890 661f6f6 888->890 893 661f6f9-661f6fb 889->893 890->893 894 661f701-661f716 893->894 893->895 897 661f726-661f743 894->897 898 661f718-661f724 894->898 926 661fa0e-661fa4e 895->926 900 661f747-661f753 897->900 898->900 902 661f755-661f75a 900->902 903 661f75c-661f765 900->903 905 661f768-661f76a 902->905 903->905 906 661f770 905->906 907 661f7f2-661f7f6 905->907 997 661f772 call 661f561 906->997 998 661f772 call 661fab0 906->998 999 661f772 call 661f538 906->999 910 661f7f8-661f816 907->910 911 661f82a-661f842 call 661f2f8 907->911 910->911 923 661f818-661f825 call 661f430 910->923 930 661f847-661f871 call 661f430 911->930 912 661f778-661f798 call 661f430 919 661f7a8-661f7c5 912->919 920 661f79a-661f7a6 912->920 924 661f7c9-661f7d5 919->924 920->924 923->875 928 661f7d7-661f7dc 924->928 929 661f7de-661f7e7 924->929 953 661fa55-661fac7 926->953 932 661f7ea-661f7ec 928->932 929->932 938 661f881-661f89e 930->938 939 661f873-661f87f 930->939 932->907 932->926 940 661f8a2-661f8ae 938->940 939->940 942 661f8b0-661f8b2 940->942 943 661f8b4 940->943 944 661f8b7-661f8b9 942->944 943->944 944->875 946 661f8bf-661f8cf 944->946 947 661f8d1-661f8dd 946->947 948 661f8df-661f8fc 946->948 950 661f900-661f90c 947->950 948->950 951 661f915-661f91e 950->951 952 661f90e-661f913 950->952 954 661f921-661f923 951->954 952->954 963 661faf1-661fb00 953->963 964 661fac9-661fad9 953->964 954->953 955 661f929 954->955 955->869 965 661fb01-661fb15 964->965 966 661fadb-661faf0 964->966 968 661fb17-661fb37 call 661f430 965->968 969 661fb76-661fb85 965->969 977 661fb39-661fb3e 968->977 978 661fb3f-661fb46 968->978 971 661fb87-661fb95 969->971 972 661fbe6 969->972 973 661fb97-661fb9b 971->973 974 661fb9d-661fba2 971->974 976 661fba7-661fbaa 973->976 974->976 979 661fbb0 976->979 980 661fbac-661fbae 976->980 981 661fb48 978->981 982 661fb4b-661fb58 978->982 983 661fbb5-661fbb7 979->983 980->983 981->982 989 661fb66-661fb71 982->989 990 661fb5a-661fb5c call 661fbf8 982->990 984 661fbe9-661fbef 983->984 985 661fbb9-661fbc3 983->985 987 661fbc5-661fbc9 985->987 988 661fbcb-661fbd0 985->988 991 661fbd5-661fbd8 987->991 988->991 994 661fb62-661fb65 990->994 992 661fbe0-661fbe5 991->992 993 661fbda-661fbdd 991->993 992->972 997->912 998->912 999->912
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hwq$Hwq$Hwq$Hwq$Hwq
                                          • API String ID: 0-154242596
                                          • Opcode ID: c311e7e89a7b20754891c656a8bd694cbb503b669f426c31f7446f1aab83f868
                                          • Instruction ID: d20d85cf1422eddc930ebc9481334ba3312ca17ee512b1915b67285b9cbe60d5
                                          • Opcode Fuzzy Hash: c311e7e89a7b20754891c656a8bd694cbb503b669f426c31f7446f1aab83f868
                                          • Instruction Fuzzy Hash: DC02B031E04256CFCB55DF75C4502ADFBF2BF85300F28866AD446AF251EB74AA86CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1168 661da28-661da5a 1169 661da61-661db2d 1168->1169 1170 661da5c 1168->1170 1175 661db42 1169->1175 1176 661db2f-661db3d 1169->1176 1170->1169 1239 661db48 call 661e275 1175->1239 1240 661db48 call 661e30d 1175->1240 1241 661db48 call 661e46e 1175->1241 1242 661db48 call 661e3de 1175->1242 1177 661dff0-661dffd 1176->1177 1178 661db4e-661dbfe 1186 661df7f-661dfa9 1178->1186 1188 661dc03-661de19 1186->1188 1189 661dfaf-661dfee 1186->1189 1216 661de25-661de6f 1188->1216 1189->1177 1219 661de71 1216->1219 1220 661de77-661de79 1216->1220 1221 661de73-661de75 1219->1221 1222 661de7b 1219->1222 1223 661de80-661de87 1220->1223 1221->1220 1221->1222 1222->1223 1224 661df01-661df27 1223->1224 1225 661de89-661df00 1223->1225 1228 661df34-661df40 1224->1228 1229 661df29-661df32 1224->1229 1225->1224 1230 661df46-661df65 1228->1230 1229->1230 1234 661df67-661df7a 1230->1234 1235 661df7b-661df7c 1230->1235 1234->1235 1235->1186 1239->1178 1240->1178 1241->1178 1242->1178
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .$1
                                          • API String ID: 0-1839485796
                                          • Opcode ID: 1a3fa669e7c24e302aa7ed9ea002bbe95a8d9b3b2c012bf09b9f732239c43d8f
                                          • Instruction ID: 7a9389a6f5e4231f14f5acde0c0e4d855b685310d4ab7aa6aa3a62dc3f5f0637
                                          • Opcode Fuzzy Hash: 1a3fa669e7c24e302aa7ed9ea002bbe95a8d9b3b2c012bf09b9f732239c43d8f
                                          • Instruction Fuzzy Hash: 88F1CF74E01229CFDB68DF65C984B9DBBB2FF8A301F1081A9D509AB250DB359E85CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1243 661a920-661a940 1244 661a942 1243->1244 1245 661a947-661a9ce 1243->1245 1244->1245 1249 661a9d0-661a9ef 1245->1249 1250 661a9f2-661aa0b 1245->1250 1249->1250 1253 661ab8f-661aba5 1250->1253 1254 661aa10-661aa36 1253->1254 1255 661abab-661abcf 1253->1255 1260 661aa38 1254->1260 1261 661aa3d-661aa6d 1254->1261 1260->1261 1264 661aa6f-661aa78 1261->1264 1265 661aa8e 1261->1265 1267 661aa7a-661aa7d 1264->1267 1268 661aa7f-661aa82 1264->1268 1266 661aa91-661ab1e 1265->1266 1277 661ab20-661ab34 1266->1277 1278 661ab6b-661ab7c 1266->1278 1269 661aa8c 1267->1269 1268->1269 1269->1266 1282 661ab3d-661ab69 1277->1282 1281 661ab7d-661ab8c 1278->1281 1281->1253 1282->1281
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $sq$$sq
                                          • API String ID: 0-1184984226
                                          • Opcode ID: 73ad4e8fdfcd2be291a1efa6dddde35a0d4a6b42637382de153e0b2cb6549270
                                          • Instruction ID: b3be1b7b1f6b63c6549edd3de917b254a32bb578751c06abde4c0642c2364e56
                                          • Opcode Fuzzy Hash: 73ad4e8fdfcd2be291a1efa6dddde35a0d4a6b42637382de153e0b2cb6549270
                                          • Instruction Fuzzy Hash: 2E91E270E01218CFDB58DFA9D584A9DBBF2FF89301F208469E409AB355DB359986CF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: e89bc46300d88728c81e7e4480db3375c2a95b0e2d6ea2b2c2dc2e86b775881d
                                          • Instruction ID: d1e3032837bd32584b1579ca53818ea33ff4b0acc3ea4e06714749d25b030804
                                          • Opcode Fuzzy Hash: e89bc46300d88728c81e7e4480db3375c2a95b0e2d6ea2b2c2dc2e86b775881d
                                          • Instruction Fuzzy Hash: D121BF74E012589FCB48DFA9E484ADDBBB2FB89320F14902AE415B7360DB305881CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fboieaf
                                          • API String ID: 0-4216440741
                                          • Opcode ID: c08cbd94db3fe2f6a6d9014b224e6df3e0520cc724e200fa7982fdb8f3fff5cc
                                          • Instruction ID: bb6432875060ee96bfb1d36aa56a2ecc1c828909d22b7d5edbeede7122c56338
                                          • Opcode Fuzzy Hash: c08cbd94db3fe2f6a6d9014b224e6df3e0520cc724e200fa7982fdb8f3fff5cc
                                          • Instruction Fuzzy Hash: 88D1F570900318CFDB18EFB4D854A9DBBB2FF8A301F1095A9E54AAB395DB315989CF41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \VOj
                                          • API String ID: 0-304670344
                                          • Opcode ID: 3a2c8731378e139bf2066c36729a97f64e116a6275ebdb5bc264545b2cb93d11
                                          • Instruction ID: ece8eafcb80d54b470e4dcf5016b373d0fea81a6154130e7d040462e3070aa3a
                                          • Opcode Fuzzy Hash: 3a2c8731378e139bf2066c36729a97f64e116a6275ebdb5bc264545b2cb93d11
                                          • Instruction Fuzzy Hash: 98B17D70E00209CFDB50CFA9D9857EEBBF2AF88314F188529E415EB394EB759845CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: +E
                                          • API String ID: 0-2499271914
                                          • Opcode ID: 36d0c0a48e7758447c66a63a9e1d75e12c8d714d4c434864a95f82fd4412dc75
                                          • Instruction ID: 8d5dc65f8d24e7511432db99bcd0010d402e44819c7491d723d741bbb93e94b8
                                          • Opcode Fuzzy Hash: 36d0c0a48e7758447c66a63a9e1d75e12c8d714d4c434864a95f82fd4412dc75
                                          • Instruction Fuzzy Hash: 34910374D01219CFDB64DFA9C994B9DBBB2FF89300F1091A9E909AB351DB705A89CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 46fb9aa8e2eaa1ad72cf7730a88a3d0e60843d01a2614ebc7754f0393c58424d
                                          • Instruction ID: 206a4ec463471129a210bacd08e1a815ecc52a61eaec3e692a64f545f3fc6c7e
                                          • Opcode Fuzzy Hash: 46fb9aa8e2eaa1ad72cf7730a88a3d0e60843d01a2614ebc7754f0393c58424d
                                          • Instruction Fuzzy Hash: DF227E74D01229CFDBA5DF65C854BD9B7B2BF89300F1085EAD509AB250EB31AE85CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e2971a7a9b19474f3bf8dd1b06623b2be3cfbb2e03091a7b430d8727069a2bd
                                          • Instruction ID: 729e87e98e61829b9f33c69ff544ca6904a6bac961933bb83aec53b3e524532a
                                          • Opcode Fuzzy Hash: 5e2971a7a9b19474f3bf8dd1b06623b2be3cfbb2e03091a7b430d8727069a2bd
                                          • Instruction Fuzzy Hash: 31F1B271A0420A9FCB05DF69D984B9EBBF2FF84300F1485A9E505EB2A1DB35ED45CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6ca66a6ce0f455e238a3564f54f77544c30fc5f2c4d99f1892eb054e6c78a65
                                          • Instruction ID: 65d79bd5a2db6c7c5ff3d6517b2c27ce1020d458089dc46264675d2a305c43e0
                                          • Opcode Fuzzy Hash: a6ca66a6ce0f455e238a3564f54f77544c30fc5f2c4d99f1892eb054e6c78a65
                                          • Instruction Fuzzy Hash: BE224CB4E012288FDB64DF69C994BDDBBB2BB49300F1081EAD509AB350DB319E85DF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca2fde0c5399f52fbd8a991e37ed3ade0a57ecda4aa7296b0183d353edafbb6f
                                          • Instruction ID: 89e2ddb92815f0efdeca473a3884eb818584d1784e03e43c9dbd0e7042dd5916
                                          • Opcode Fuzzy Hash: ca2fde0c5399f52fbd8a991e37ed3ade0a57ecda4aa7296b0183d353edafbb6f
                                          • Instruction Fuzzy Hash: 1BE11E74E002199FDF88DBF5C895AAEBBB6EF88300F105019A60ABB355DF306D85DB54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57236f9d02b61f8546f56e506a4e950f3c92548ef749aa7b69d270af7bfdffa5
                                          • Instruction ID: 36fc9887c279c7e272eb1a938b68c313e9e8b5f254938cd7509aa0b007536cef
                                          • Opcode Fuzzy Hash: 57236f9d02b61f8546f56e506a4e950f3c92548ef749aa7b69d270af7bfdffa5
                                          • Instruction Fuzzy Hash: 4DE11E74E002199FDF88DBF5C895AAEBBB6EF88300F105019A60ABB355CF316D85DB54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b6942bc41f3d4084b5416e8822d15e3d3a25d029cbe56fd20bc4fd5a40cd61f
                                          • Instruction ID: 78a8eb4de8692917f4ba2b9e1788e46b1a4534206fe9d7fb84d2bdff7035cb35
                                          • Opcode Fuzzy Hash: 6b6942bc41f3d4084b5416e8822d15e3d3a25d029cbe56fd20bc4fd5a40cd61f
                                          • Instruction Fuzzy Hash: 49C1B3B0D01229CFDB68DF65C850BDEBBB2BF89300F5481AAD509AB250DB755A85CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c681982f2846c6f632edd08d7890c53ec6d3a08c5d43f73ce12524b64a46279
                                          • Instruction ID: 17e5002f699d00756f9a145031f2d26fe36dea09ef01188e297efbe5cf263771
                                          • Opcode Fuzzy Hash: 0c681982f2846c6f632edd08d7890c53ec6d3a08c5d43f73ce12524b64a46279
                                          • Instruction Fuzzy Hash: D8B15C70E0020A9FDB90CFA9D99579DBFF2EF88314F188529E415EB394EB749845CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 5fb0d80-5fb0dcb 299 5fb0efd-5fb0f10 294->299 300 5fb0dd1-5fb0dd3 294->300 303 5fb1006-5fb1011 299->303 304 5fb0f16-5fb0f25 299->304 301 5fb0dd6-5fb0de5 300->301 306 5fb0deb-5fb0e1d 301->306 307 5fb0e9d-5fb0ea1 301->307 309 5fb1019-5fb1022 303->309 314 5fb0f2b-5fb0f51 304->314 315 5fb0fd1-5fb0fd5 304->315 342 5fb0e1f-5fb0e24 306->342 343 5fb0e26-5fb0e2d 306->343 310 5fb0ea3-5fb0eae 307->310 311 5fb0eb0 307->311 313 5fb0eb5-5fb0eb8 310->313 311->313 313->309 316 5fb0ebe-5fb0ec2 313->316 344 5fb0f5a-5fb0f61 314->344 345 5fb0f53-5fb0f58 314->345 317 5fb0fd7-5fb0fe2 315->317 318 5fb0fe4 315->318 321 5fb0ed1 316->321 322 5fb0ec4-5fb0ecf 316->322 323 5fb0fe6-5fb0fe8 317->323 318->323 328 5fb0ed3-5fb0ed5 321->328 322->328 326 5fb0fea-5fb0ff4 323->326 327 5fb1039-5fb10b5 323->327 337 5fb0ff7-5fb1000 326->337 376 5fb10bb-5fb10bd 327->376 377 5fb1189-5fb119c 327->377 332 5fb0edb-5fb0ee5 328->332 333 5fb1025-5fb1032 328->333 346 5fb0ee8-5fb0ef2 332->346 333->327 337->303 337->304 347 5fb0e91-5fb0e9b 342->347 348 5fb0e2f-5fb0e50 343->348 349 5fb0e52-5fb0e76 343->349 351 5fb0f63-5fb0f84 344->351 352 5fb0f86-5fb0faa 344->352 350 5fb0fc5-5fb0fcf 345->350 346->301 353 5fb0ef8 346->353 347->346 348->347 366 5fb0e78-5fb0e7e 349->366 367 5fb0e8e 349->367 350->337 351->350 368 5fb0fac-5fb0fb2 352->368 369 5fb0fc2 352->369 353->309 371 5fb0e82-5fb0e84 366->371 372 5fb0e80 366->372 367->347 373 5fb0fb6-5fb0fb8 368->373 374 5fb0fb4 368->374 369->350 371->367 372->367 373->369 374->369 378 5fb10c0-5fb10cf 376->378 380 5fb11a2-5fb11b1 377->380 381 5fb1234-5fb123f 377->381 383 5fb1129-5fb112d 378->383 384 5fb10d1-5fb10dd 378->384 391 5fb11ff-5fb1203 380->391 392 5fb11b3-5fb11dc 380->392 386 5fb1247-5fb1250 381->386 387 5fb112f-5fb113a 383->387 388 5fb113c 383->388 397 5fb10e7-5fb10fe 384->397 390 5fb1141-5fb1144 387->390 388->390 390->386 396 5fb114a-5fb114e 390->396 394 5fb1212 391->394 395 5fb1205-5fb1210 391->395 415 5fb11de-5fb11e4 392->415 416 5fb11f4-5fb11fd 392->416 400 5fb1214-5fb1216 394->400 395->400 398 5fb115d 396->398 399 5fb1150-5fb115b 396->399 406 5fb1104-5fb1106 397->406 405 5fb115f-5fb1161 398->405 399->405 403 5fb1218-5fb1222 400->403 404 5fb1267-5fb1294 400->404 420 5fb1225-5fb122e 403->420 428 5fb1296-5fb12af 404->428 429 5fb12c4-5fb12c5 404->429 409 5fb1253-5fb1260 405->409 410 5fb1167-5fb1171 405->410 412 5fb1108-5fb110e 406->412 413 5fb111e-5fb1127 406->413 409->404 427 5fb1174-5fb117e 410->427 418 5fb1112-5fb1114 412->418 419 5fb1110 412->419 413->427 421 5fb11e8-5fb11ea 415->421 422 5fb11e6 415->422 416->420 418->413 419->413 420->380 420->381 421->416 422->416 427->378 430 5fb1184 427->430 431 5fb12c7-5fb12e9 428->431 434 5fb12b1-5fb12b7 428->434 429->431 430->386 438 5fb12ec-5fb12f0 431->438 435 5fb12bb-5fb12bd 434->435 436 5fb12b9 434->436 435->429 436->431 439 5fb12f9-5fb12fe 438->439 440 5fb12f2-5fb12f7 438->440 441 5fb1304-5fb1307 439->441 440->441 442 5fb14f8-5fb1500 441->442 443 5fb130d-5fb1322 441->443 443->438 445 5fb1324 443->445 446 5fb132b-5fb1350 445->446 447 5fb1498 445->447 448 5fb13e0-5fb1405 445->448 460 5fb1352-5fb1354 446->460 461 5fb1356-5fb135a 446->461 449 5fb14a2-5fb14b9 447->449 458 5fb140b-5fb140f 448->458 459 5fb1407-5fb1409 448->459 453 5fb14bf-5fb14f3 449->453 453->438 463 5fb1411-5fb142e 458->463 464 5fb1430-5fb1453 458->464 462 5fb146d-5fb1493 459->462 465 5fb13b8-5fb13db 460->465 466 5fb137b-5fb139e 461->466 467 5fb135c-5fb1379 461->467 462->438 463->462 484 5fb146b 464->484 485 5fb1455-5fb145b 464->485 465->438 482 5fb13a0-5fb13a6 466->482 483 5fb13b6 466->483 467->465 486 5fb13aa-5fb13ac 482->486 487 5fb13a8 482->487 483->465 484->462 488 5fb145f-5fb1461 485->488 489 5fb145d 485->489 486->483 487->483 488->484 489->484
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq
                                          • API String ID: 0-2105939943
                                          • Opcode ID: bbf0f70f7968050f8e15cd8e7cfc9528173d1c77b4cbaf25a9e63db96642b24c
                                          • Instruction ID: af562ce8f74e4758c5c2eb1d40e68d83f4d2b69768e88c0e04b18288850ad2ad
                                          • Opcode Fuzzy Hash: bbf0f70f7968050f8e15cd8e7cfc9528173d1c77b4cbaf25a9e63db96642b24c
                                          • Instruction Fuzzy Hash: 54227F30B04145DFEB149B6AC858ABEBBEAFF88200F158469E506C7392DF78DC45CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 748 5fb1582-5fb1584 749 5fb158e 748->749 750 5fb1598-5fb15af 749->750 751 5fb15b5-5fb15b7 750->751 752 5fb15b9-5fb15bf 751->752 753 5fb15cf-5fb15f1 751->753 754 5fb15c3-5fb15c5 752->754 755 5fb15c1 752->755 758 5fb1638-5fb163f 753->758 754->753 755->753 759 5fb1571-5fb1580 758->759 760 5fb1645-5fb1747 758->760 759->748 763 5fb15f3-5fb15f7 759->763 764 5fb15f9-5fb1604 763->764 765 5fb1606 763->765 767 5fb160b-5fb160e 764->767 765->767 767->760 770 5fb1610-5fb1614 767->770 771 5fb1623 770->771 772 5fb1616-5fb1621 770->772 773 5fb1625-5fb1627 771->773 772->773 775 5fb174a-5fb177c 773->775 776 5fb162d-5fb1637 773->776 782 5fb177e-5fb1788 775->782 783 5fb1795-5fb17a7 775->783 776->758 784 5fb178a-5fb1794 782->784 785 5fb17b8-5fb17b9 782->785 787 5fb17bf-5fb17e1 783->787 788 5fb17a9-5fb17af 783->788 784->783 785->787 793 5fb17e4-5fb17e8 787->793 789 5fb17b3-5fb17b5 788->789 790 5fb17b1 788->790 789->785 790->787 794 5fb17ea-5fb17ef 793->794 795 5fb17f1-5fb17f6 793->795 796 5fb17fc-5fb17ff 794->796 795->796 797 5fb1abf-5fb1ac7 796->797 798 5fb1805-5fb181a 796->798 798->793 800 5fb181c 798->800 801 5fb18d8-5fb198b 800->801 802 5fb1823-5fb18d3 800->802 803 5fb1990-5fb19bd 800->803 804 5fb1a07-5fb1a2c 800->804 801->793 802->793 822 5fb19c3-5fb19cd 803->822 823 5fb1b36-5fb1b73 803->823 818 5fb1a2e-5fb1a30 804->818 819 5fb1a32-5fb1a36 804->819 824 5fb1a94-5fb1aba 818->824 825 5fb1a38-5fb1a55 819->825 826 5fb1a57-5fb1a7a 819->826 829 5fb19d3-5fb1a02 822->829 830 5fb1b00-5fb1b2f 822->830 824->793 825->824 847 5fb1a7c-5fb1a82 826->847 848 5fb1a92 826->848 829->793 830->823 850 5fb1a86-5fb1a88 847->850 851 5fb1a84 847->851 848->824 850->848 851->848
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $sq$$sq$$sq$$sq$$sq$$sq
                                          • API String ID: 0-3087168343
                                          • Opcode ID: 301843d694e1d93533398e2a323c9143be290e20514cb93f2625be5406fb6751
                                          • Instruction ID: a4a4cbc8a45a0093830869e8330f0c01d72e29f4ada40d36b893fad646c04e53
                                          • Opcode Fuzzy Hash: 301843d694e1d93533398e2a323c9143be290e20514cb93f2625be5406fb6751
                                          • Instruction Fuzzy Hash: ADC1B174B042449FEB149BA9C8A8E6F77EBBB85300F108429E602CB392DFB8DC05C751

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1022 d1d0b8-d1d147 GetCurrentProcess 1026 d1d150-d1d184 GetCurrentThread 1022->1026 1027 d1d149-d1d14f 1022->1027 1028 d1d186-d1d18c 1026->1028 1029 d1d18d-d1d1c1 GetCurrentProcess 1026->1029 1027->1026 1028->1029 1031 d1d1c3-d1d1c9 1029->1031 1032 d1d1ca-d1d1e5 call d1d289 1029->1032 1031->1032 1035 d1d1eb-d1d21a GetCurrentThreadId 1032->1035 1036 d1d223-d1d285 1035->1036 1037 d1d21c-d1d222 1035->1037 1037->1036
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00D1D136
                                          • GetCurrentThread.KERNEL32 ref: 00D1D173
                                          • GetCurrentProcess.KERNEL32 ref: 00D1D1B0
                                          • GetCurrentThreadId.KERNEL32 ref: 00D1D209
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: f2cfeadfd3dfa4ffaf4fe0b18d39e6ffadc436f38812255ceeb6c467eda9260b
                                          • Instruction ID: 301c6e016f12611bdc665d33722f7da3c4d0748b03a7d5f76b30773038923fde
                                          • Opcode Fuzzy Hash: f2cfeadfd3dfa4ffaf4fe0b18d39e6ffadc436f38812255ceeb6c467eda9260b
                                          • Instruction Fuzzy Hash: B4517AB0900349DFDB14DFA9D948BDEBBF2EF48314F24845AE419A7350CB74A984CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1000 d1d0a8-d1d147 GetCurrentProcess 1004 d1d150-d1d184 GetCurrentThread 1000->1004 1005 d1d149-d1d14f 1000->1005 1006 d1d186-d1d18c 1004->1006 1007 d1d18d-d1d1c1 GetCurrentProcess 1004->1007 1005->1004 1006->1007 1009 d1d1c3-d1d1c9 1007->1009 1010 d1d1ca-d1d1e5 call d1d289 1007->1010 1009->1010 1013 d1d1eb-d1d21a GetCurrentThreadId 1010->1013 1014 d1d223-d1d285 1013->1014 1015 d1d21c-d1d222 1013->1015 1015->1014
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00D1D136
                                          • GetCurrentThread.KERNEL32 ref: 00D1D173
                                          • GetCurrentProcess.KERNEL32 ref: 00D1D1B0
                                          • GetCurrentThreadId.KERNEL32 ref: 00D1D209
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: c7389599ac5688bad673aafd93f74f60ad4f5cdc56adbebec231f63dd9418983
                                          • Instruction ID: 56889a800074e73fc624afd3c2ce552cbd541e4f4015dd08437f905312671ef4
                                          • Opcode Fuzzy Hash: c7389599ac5688bad673aafd93f74f60ad4f5cdc56adbebec231f63dd9418983
                                          • Instruction Fuzzy Hash: C25178B0900349DFDB14DFA9D948BDEBBF2EF88314F24805AE419A7360CB349984CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1435 5fc8c78-5fc8c94 1436 5fc8c96-5fc8c9a 1435->1436 1437 5fc8d00-5fc8d25 1435->1437 1438 5fc8d2c-5fc8d51 1436->1438 1439 5fc8ca0-5fc8ca7 1436->1439 1437->1438 1442 5fc8d58-5fc8dd4 1438->1442 1441 5fc8cad-5fc8cef 1439->1441 1439->1442 1456 5fc8cf7-5fc8cfd 1441->1456 1461 5fc8ddc-5fc8e46 1442->1461 1462 5fc8dd6-5fc8dd9 1442->1462 1469 5fc8e4d-5fc8e5b 1461->1469 1470 5fc8e48 1461->1470 1470->1469
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (wq$(wq
                                          • API String ID: 0-707371155
                                          • Opcode ID: 1c24207a5b8e8777f0a4dfa4e9bb65160e25606b679846ac77773f4da2ff715d
                                          • Instruction ID: 5323686945f6c46383715236bfb089933e178650e6e55bec939f676bbae6225c
                                          • Opcode Fuzzy Hash: 1c24207a5b8e8777f0a4dfa4e9bb65160e25606b679846ac77773f4da2ff715d
                                          • Instruction Fuzzy Hash: E53136327081582BEF486E689805B6F7A9BFFC5390F144029F909DB344CE399D0287E1
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00D1B086
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: f3a2538507ca6177e60059c0e91e214c730134323717676522bfc5bc631e8831
                                          • Instruction ID: b939cd51b2e0e9dab71318e504d85f77e67f36b5140bfde1f0f24b6c650ab47c
                                          • Opcode Fuzzy Hash: f3a2538507ca6177e60059c0e91e214c730134323717676522bfc5bc631e8831
                                          • Instruction Fuzzy Hash: 51715BB0A01B059FDB24DF29D04179ABBF1FF88304F04892DE44AD7A51DB34E946CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $sq
                                          • API String ID: 0-923501781
                                          • Opcode ID: e748a0fb1f6eb71c58043ac684da01375b5dfc7df8acf68fef2dbc7cb4e2fc86
                                          • Instruction ID: 12f7aa9a3583ea45acd42866eb404f7ee8a475c47bb7ddc6a4bc41c93c9c468c
                                          • Opcode Fuzzy Hash: e748a0fb1f6eb71c58043ac684da01375b5dfc7df8acf68fef2dbc7cb4e2fc86
                                          • Instruction Fuzzy Hash: 83E13F74B002068FCB14DF69C594AAEBBF6BF88601B1485A9E906EB365DF34DC01CB90
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 06613DF0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 77e53d88a4ea8fae111418d7c12d421247b280ba40059eae6f80613e69320d06
                                          • Instruction ID: 2c72c64c95f0579cee65e83e8e537a107592c9f33493e1127b42d59e3189d10f
                                          • Opcode Fuzzy Hash: 77e53d88a4ea8fae111418d7c12d421247b280ba40059eae6f80613e69320d06
                                          • Instruction Fuzzy Hash: ED51C2B4E012089FDB58DFA5E5546EEBBB2FF88300F24942AE416BB355DB349946CF40
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D159F1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 4464ec6ca2ea914dea469e1560b7f9b7ef7a303c70d099d5092cc35c8504e682
                                          • Instruction ID: 87b241df17e702ae8be8fab56acb382a2a9ed94c5a5d7cfbc89a035e195b46bc
                                          • Opcode Fuzzy Hash: 4464ec6ca2ea914dea469e1560b7f9b7ef7a303c70d099d5092cc35c8504e682
                                          • Instruction Fuzzy Hash: 5A41D2B0D00619DBDB24CFA9D984BCDBBF5FF88304F20815AD408AB255DB75694ACF90
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D159F1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 3243c3c8e3a34b604cc153f2072e3e9c7dc55a3ba87c363927018e590ece8bdb
                                          • Instruction ID: 1fce2b7df5524f8ce32fff30a0dc8e79e54a5f4979d5c31b9145fd1fa0c6cfe1
                                          • Opcode Fuzzy Hash: 3243c3c8e3a34b604cc153f2072e3e9c7dc55a3ba87c363927018e590ece8bdb
                                          • Instruction Fuzzy Hash: 8A41E0B0C00619CADB24DFA9D984BCDBBF5FF88304F24815AD408AB255DB75698ACF90
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D1D387
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 87ca4e9022964697c63cde121ca55ad231c966b9d3ba6041c64dfbdd43787ab7
                                          • Instruction ID: ce24828401e2e19a898c320689b24ceecb2dc5914b3911a2a0c5be6d3f925032
                                          • Opcode Fuzzy Hash: 87ca4e9022964697c63cde121ca55ad231c966b9d3ba6041c64dfbdd43787ab7
                                          • Instruction Fuzzy Hash: EA21E3B5900208AFDB10CF9AD984ADEBBF9EB48320F14801AE918A3310C374A944CFA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D1D387
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e411e58e4cbe5b11ce3ec50a42bd7ea15fe6ca9e6945059bb5b27f93c85d6488
                                          • Instruction ID: 16b8050d0058f2e5c8808cdf1b03e427671b83a8abf013207150fc3371a9f5f8
                                          • Opcode Fuzzy Hash: e411e58e4cbe5b11ce3ec50a42bd7ea15fe6ca9e6945059bb5b27f93c85d6488
                                          • Instruction Fuzzy Hash: F121E3B5900209DFDB10CF99E584ADEBBF5FB48314F24801AE918A3310C378A954CF65
                                          APIs
                                          • GetKeyboardLayout.USER32(00000000), ref: 06613B36
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: KeyboardLayout
                                          • String ID:
                                          • API String ID: 194098044-0
                                          • Opcode ID: 01ab6e087fc277e4030aeb92cc07d4b87ea443a1f703d7995bd22ae2974aebf0
                                          • Instruction ID: e9a9200a168655ab369a56d99730617e02f479959c34eff15c7ac121b99600f7
                                          • Opcode Fuzzy Hash: 01ab6e087fc277e4030aeb92cc07d4b87ea443a1f703d7995bd22ae2974aebf0
                                          • Instruction Fuzzy Hash: 151123B19002489FCB60DFA9D849A9EBFF4EB48224F14845AD519AB340D635A944CFA5
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06613C25
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 7c8fae0e403609ce2018959be230a1b861c4d3446565f1c203941b88fb537537
                                          • Instruction ID: 57ccdd578583587c9f6589ab7ad1b16cb9a181e662609f671e96dc87b6c967bd
                                          • Opcode Fuzzy Hash: 7c8fae0e403609ce2018959be230a1b861c4d3446565f1c203941b88fb537537
                                          • Instruction Fuzzy Hash: 3511F2B59002488FCB20DF9AD985B8EBFF8EB48324F24841AD519A7300C378A544CFA5
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06613C25
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 5264ea39fb5b109b465857130407da9a0c071034fd71ed0e5a1634f1329a2d17
                                          • Instruction ID: 50aa416771377bb45c22b3eb10b4779c5c73c18d4ab5b16cf8bd95f52b41823a
                                          • Opcode Fuzzy Hash: 5264ea39fb5b109b465857130407da9a0c071034fd71ed0e5a1634f1329a2d17
                                          • Instruction Fuzzy Hash: 871125B08047488FCB10DF9AD588B9ABFF8EB48324F249459D519A7301C374A544CBA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00D1B086
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 828a203a9ca90f8e623dac142de4b4a0f31999138c276eaba67fe2a55b9c0ad5
                                          • Instruction ID: 18cf69a0e924a72f6dc43290187286403db0272b8deff1f8e2af5e016b0bcbf6
                                          • Opcode Fuzzy Hash: 828a203a9ca90f8e623dac142de4b4a0f31999138c276eaba67fe2a55b9c0ad5
                                          • Instruction Fuzzy Hash: 0311D2B5C007499FCB20DF9AD444ADEFBF4AB89324F14841AD429B7610C775A545CFA1
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06613C25
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 10fbf2050b7f08a1d82854319b81877262bff7ca67dcfa238f0c03df49492af6
                                          • Instruction ID: 9ba0c5aea9cd50bd11816d85e12fabda8ac8b3e6c5ce3b43e5b75e587e28db6b
                                          • Opcode Fuzzy Hash: 10fbf2050b7f08a1d82854319b81877262bff7ca67dcfa238f0c03df49492af6
                                          • Instruction Fuzzy Hash: EA1133B18006488FDB20DF9AD588B9EBBF8EB48324F248459D519B7300C378A944CFA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: b9e577d24290f96a8f2f92d79ea3dccc7960071de0462d7a2a75496c1a1d4e17
                                          • Instruction ID: 4d682d113427372758c7f60efe24c9da426fc8d5777bf1d267ebf39d89f24ba7
                                          • Opcode Fuzzy Hash: b9e577d24290f96a8f2f92d79ea3dccc7960071de0462d7a2a75496c1a1d4e17
                                          • Instruction Fuzzy Hash: 1DC15B35600602CFCB24DF29C580D6ABBF2FF89314B55C9A9D45A9B765DB34F846CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52e0f6b0251e6f7e0053a9dacdac99f1eab18c75a140afa6a4f504d2c07b74f2
                                          • Instruction ID: 4ca79e32f1bec99a6244ba218fe1ad0c7778b161dee1e60264ba07976f895ea5
                                          • Opcode Fuzzy Hash: 52e0f6b0251e6f7e0053a9dacdac99f1eab18c75a140afa6a4f504d2c07b74f2
                                          • Instruction Fuzzy Hash: 2EC27D74B001189FDB54DF68C891AEDBBB2FF89700F108499E60AAB3A1DB71AD45CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'sq
                                          • API String ID: 0-1075809040
                                          • Opcode ID: 86cbea64b4822197fe7e88e997a72dff9e795ebbb7afa3e8b095f5b50ce97206
                                          • Instruction ID: 4b0b0f1c1d1c71e61e5efba5ea4ad06ed09758ed5c28b2b52ec73ba479633459
                                          • Opcode Fuzzy Hash: 86cbea64b4822197fe7e88e997a72dff9e795ebbb7afa3e8b095f5b50ce97206
                                          • Instruction Fuzzy Hash: 1131E4727002118BC719B738E45166E77E6DFC6354704487EE44ACB781DE39EC078790
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'sq
                                          • API String ID: 0-1075809040
                                          • Opcode ID: 1b3a60b8696f8d5b0f182f7a649cce3b9e197fdf57349aa1f03eb49f6451c1a6
                                          • Instruction ID: 2a869bd6ba4d3397613c82eaf5aa2e6c69a580487be3d248e22b1d6fa77178b7
                                          • Opcode Fuzzy Hash: 1b3a60b8696f8d5b0f182f7a649cce3b9e197fdf57349aa1f03eb49f6451c1a6
                                          • Instruction Fuzzy Hash: B631CF717002048BCF09BB7894A55AEBBE3AFC8211B54443DD516DB385EF38DE068795
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'sq
                                          • API String ID: 0-1075809040
                                          • Opcode ID: cd71bf41cee707b1f1fe7ac79b7c72cec9c945a16fab8bf3fc8a6b73af567abe
                                          • Instruction ID: 5858a97ee8a704dea6cdcd2d7887c96c149dd0c1adca276980f0f10b0ef30666
                                          • Opcode Fuzzy Hash: cd71bf41cee707b1f1fe7ac79b7c72cec9c945a16fab8bf3fc8a6b73af567abe
                                          • Instruction Fuzzy Hash: 86F0B4313002058BC60DFB29E49596E77EBEFC9250350592DE04A8B715EF30ED4697E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'sq
                                          • API String ID: 0-1075809040
                                          • Opcode ID: 50c516582f8f57cc41152a3af3d9a91c4e97a6d215c24af2a5ab3c949936aff7
                                          • Instruction ID: 0b2f6b61d5c1fffdb54f95e19180e6f4f9d5624e2f5797929aaf6ebdc470f2f0
                                          • Opcode Fuzzy Hash: 50c516582f8f57cc41152a3af3d9a91c4e97a6d215c24af2a5ab3c949936aff7
                                          • Instruction Fuzzy Hash: FA01FC709083869FCB0AEFB8E49889C7F71FB82210B1815DDE062AB293CA341E40DB01
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'sq
                                          • API String ID: 0-1075809040
                                          • Opcode ID: 4dae3e6093e97471b9807552debedd10cd4b4287e52890422df6faf29b1ba808
                                          • Instruction ID: 5a3496724cff62e3d395bff3cf99e59474b84a78d6108a4334e1f16b119239e8
                                          • Opcode Fuzzy Hash: 4dae3e6093e97471b9807552debedd10cd4b4287e52890422df6faf29b1ba808
                                          • Instruction Fuzzy Hash: 01F08C70E01209EFCF09EFB8E49995CBBB5FB85200B2055ACE406E7341DB341E44DB41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7312cfb5602a51ee0705b70c5f7387c81bc11ec4adb316b92b92bb2eba293f2b
                                          • Instruction ID: 1eb27585101ae23b1141f90d52d290713535a0d0990b848790c8561bc432ab2e
                                          • Opcode Fuzzy Hash: 7312cfb5602a51ee0705b70c5f7387c81bc11ec4adb316b92b92bb2eba293f2b
                                          • Instruction Fuzzy Hash: B94269747406288FCB28EB78C49466EB7B2FBC5704B50591CD503AB392CF7AED058B86
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 68c53a9c21f1b83cef01e03330fc9f43e3b2ee945086dbe018613eee84febb2d
                                          • Instruction ID: 8e692147718bcd3468e13d6990d72214450f67c49dd8453049d3b582f7a19020
                                          • Opcode Fuzzy Hash: 68c53a9c21f1b83cef01e03330fc9f43e3b2ee945086dbe018613eee84febb2d
                                          • Instruction Fuzzy Hash: E8422534B40214DFDB44DF69C994EAEBBF6BF88700F118499E606DB3A1DA71ED448B50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9bc13bcd8893c0b42742027dc25893e68f44f4afc171022dd9071ec833b72f30
                                          • Instruction ID: 98883d5184b51d35bd740b3725764a23c5a8ca4baa23e91ff748d916682cf946
                                          • Opcode Fuzzy Hash: 9bc13bcd8893c0b42742027dc25893e68f44f4afc171022dd9071ec833b72f30
                                          • Instruction Fuzzy Hash: BC123775B006068FCB14DF29C598A6ABBF2FF89305B1584ACE546DB3A2DB34EC45CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b8ebe35f10f9333c0d4af61a8e0057d69f9a7064b7ea90116a1cc71aa348e127
                                          • Instruction ID: 5c3aabbf77c7c152a171016318ffd3857cff9ce1e01fb298eca75b279a77707d
                                          • Opcode Fuzzy Hash: b8ebe35f10f9333c0d4af61a8e0057d69f9a7064b7ea90116a1cc71aa348e127
                                          • Instruction Fuzzy Hash: 00C15074B05204DFEB049B65C859B7A7BABFF89700F108065E6029B3A2CFB9DD45CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 428b5b8647cd6b0d24a819da38264fcdd5421363de3771c3293da7e91a61ee1e
                                          • Instruction ID: 7bc75e92049cebc9ab60e09fe2d2cdfa9d6d1a5df4b904e30e43ed4330a801c0
                                          • Opcode Fuzzy Hash: 428b5b8647cd6b0d24a819da38264fcdd5421363de3771c3293da7e91a61ee1e
                                          • Instruction Fuzzy Hash: 69512671E012199BDB18DFA9D985B9EBFF6FF48300F14806DE415A7244DB78A846CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a5ee3c63425b87b9c8aedccaa7c70c788db8d73aba53c034424ff586f127883
                                          • Instruction ID: 634ed511f19f3a6d6a7bbf951076a2a50eabdce8e02a71ba022a851c3cf56b61
                                          • Opcode Fuzzy Hash: 4a5ee3c63425b87b9c8aedccaa7c70c788db8d73aba53c034424ff586f127883
                                          • Instruction Fuzzy Hash: 33513735B405199FDB44DF69C884DAEBBB2FF89310B118469E906EB3A1EB70ED05CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ca14db09d109ba328bb295ecf984c4d01acb0db26942f8b5ac5b002918a9988
                                          • Instruction ID: ef9e28c6f75b96f082e038aeab453e03bbc1a0b4757bc901e460e5cb135c399e
                                          • Opcode Fuzzy Hash: 6ca14db09d109ba328bb295ecf984c4d01acb0db26942f8b5ac5b002918a9988
                                          • Instruction Fuzzy Hash: B25126B1D012199BDB18DFA9CA85B9DBBF6FF48304F14852EE405A7244DB789846CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb513e07da7c3859a57aa068ddd2413d12391df418bb653591754f748dfff260
                                          • Instruction ID: 90da927cb2eb3e85e16f546a9ef8eb58fe53eabd7946e8a44a275718342ec8eb
                                          • Opcode Fuzzy Hash: bb513e07da7c3859a57aa068ddd2413d12391df418bb653591754f748dfff260
                                          • Instruction Fuzzy Hash: 3A313275B012119FCB05DF39D884A6EBFB2BF89204B5084A9E906CB3A5DF31ED05DB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94cd61548747c0c02a6775152197ae52224ea04c2d9f1274a1cf0431b10ffee9
                                          • Instruction ID: 5027a7b5107f5db3ce72f520c3d04024c2cffb12352221ea085ed63a57711a51
                                          • Opcode Fuzzy Hash: 94cd61548747c0c02a6775152197ae52224ea04c2d9f1274a1cf0431b10ffee9
                                          • Instruction Fuzzy Hash: 8E313575B012119FCB15DF39D88496EBFB2BF89204B5084A9E906CB355DF31ED05CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0334c4a89035128193f76997fd23703c79a285016fea5157f02f21ff8ade383e
                                          • Instruction ID: 140db3a3094f059a3a9e3a54b882d636be5b08f8e87e34073020768cc1bea8e3
                                          • Opcode Fuzzy Hash: 0334c4a89035128193f76997fd23703c79a285016fea5157f02f21ff8ade383e
                                          • Instruction Fuzzy Hash: 4F41F2B1D012499FDB14DFAAD984ADEFFF6AF88310F14806AE415B7290DB34A945CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 63df046a6bda8b9e8d271f95ac81f8b1ee688ec17e0e0d160d2367cd75160813
                                          • Instruction ID: bcbd40affde64e99ad9cc7ef978f2b39fb3f2bd1829f501d7418b212947166d9
                                          • Opcode Fuzzy Hash: 63df046a6bda8b9e8d271f95ac81f8b1ee688ec17e0e0d160d2367cd75160813
                                          • Instruction Fuzzy Hash: 0A2135307093885FCB159B78A81466A7FAAEF82314F1445BEF849CB392CE36CC42C791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 216f1aa03afc0c535364679494388d373c1d024432e4232aac33dc7137e4a401
                                          • Instruction ID: 1bda6db8ee73409f0a7621ab10bc52b0c2aea31b5e73c6c3af7ac2a363b79880
                                          • Opcode Fuzzy Hash: 216f1aa03afc0c535364679494388d373c1d024432e4232aac33dc7137e4a401
                                          • Instruction Fuzzy Hash: 4D3103B1D012499FDB14DFA9DA85ADEBFF6AF88300F14802AE405B7290DB349945CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9038001b4ae703dd88985a4a82ea0e7a19639d1dd9c9b2755b6a9613e74de0eb
                                          • Instruction ID: e20030103a06ceedffe442a3b122b60934ad09f4418dbe0f625e663489cbae7e
                                          • Opcode Fuzzy Hash: 9038001b4ae703dd88985a4a82ea0e7a19639d1dd9c9b2755b6a9613e74de0eb
                                          • Instruction Fuzzy Hash: F43116B1D01219DFCB14CFA9D980ADEBFF9BF48350F14806AE405B7240CB75A846CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2169983653.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c9d000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d111e3fc49f0009ed21ba86580fff11909995fbbbaf02bcbcbae718cdf7fae09
                                          • Instruction ID: 708d5cca189617ac28a65bc88a53ef63498fdce5b86795ed6639afe32dc05900
                                          • Opcode Fuzzy Hash: d111e3fc49f0009ed21ba86580fff11909995fbbbaf02bcbcbae718cdf7fae09
                                          • Instruction Fuzzy Hash: 4D2145B1104200DFDF04DF04C9C8B26BF65FB98324F20C569E90B2B256C33AE856CBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176592365.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fb0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c83fe32572f9184be88476d2f96cefa9fcfd53007e69308c3411954528b257a
                                          • Instruction ID: 4591e6d6736240ba9ce340b4cd1ff2e99efc633e5b562407ed89a162e0db6717
                                          • Opcode Fuzzy Hash: 4c83fe32572f9184be88476d2f96cefa9fcfd53007e69308c3411954528b257a
                                          • Instruction Fuzzy Hash: 2221FD30B00104EFEB04DBAAD954DAEB7EBFFC8210B118129E616D72A2DB70CC14C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170010335.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_cad000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d7446497b7e5c19201c1e4ef8e2d2b02624bbf9a720ce258bfb594470a4aa573
                                          • Instruction ID: e94f02b1f8308aa6257b2853e6e8291ee81c3a7b18e30f7b3d7fe5f12c4edf42
                                          • Opcode Fuzzy Hash: d7446497b7e5c19201c1e4ef8e2d2b02624bbf9a720ce258bfb594470a4aa573
                                          • Instruction Fuzzy Hash: 2C2134B1604201DFCB14DF24D9C0B26BB65FB89318F20C96DE80B4B696C33AD807CB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4054ae0092555eea186f5b83bf37c424d77f58b6a9920e42c5da400436f85e01
                                          • Instruction ID: 2d6143088f7ebfa1560cebd322006f17486f568bc4659d8d6176f7558daeed7c
                                          • Opcode Fuzzy Hash: 4054ae0092555eea186f5b83bf37c424d77f58b6a9920e42c5da400436f85e01
                                          • Instruction Fuzzy Hash: D921F4B1D00249DFDB14CFA9C995B9EBFF9AF48350F24846EE405B7240DB789946CB60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170010335.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_cad000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f738e9ff55c9d2e1624c08cfaf082c16e2f006023cabad5168483882c48081d0
                                          • Instruction ID: ca89f8a13a34ee52edcc6fec37031b0272b2d024a8c6ca420053335142350625
                                          • Opcode Fuzzy Hash: f738e9ff55c9d2e1624c08cfaf082c16e2f006023cabad5168483882c48081d0
                                          • Instruction Fuzzy Hash: D12183755093808FCB12CF24D590715BF71EB46318F28C5DAD84A8F6A7C33A990ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08afd877f2039edeac3e6d195939b0c7d4451a1c948252820c8476edd1c9a261
                                          • Instruction ID: 629084d0e17682f33c6bbe371144ade7889758dcb329367f35638ab42326dac5
                                          • Opcode Fuzzy Hash: 08afd877f2039edeac3e6d195939b0c7d4451a1c948252820c8476edd1c9a261
                                          • Instruction Fuzzy Hash: 7E21D675E05218DBCB08DFA9E9846DDBBB6FF89310F10902AE405B3360D7741945CB54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2169983653.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c9d000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                          • Instruction ID: b7fe0ad99eef7313e078547ecec313a82cedd514391fd9d6c073f322c85f4657
                                          • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                          • Instruction Fuzzy Hash: B4112672404240CFCF12CF00D5C4B16BF72FB94324F24C2A9D80A1B656C33AE95ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a274a159bb9a331e9e1c1f07ab19796039bb5e4bd59b52ad18995ce1792ae83
                                          • Instruction ID: 26f3f1a08a37b297540685b07844c04974a6d55d6a7f1da66826c4d1a26b53a0
                                          • Opcode Fuzzy Hash: 7a274a159bb9a331e9e1c1f07ab19796039bb5e4bd59b52ad18995ce1792ae83
                                          • Instruction Fuzzy Hash: 76014E312006415FCB45AF38E85956E3BABEFC1351305281CF1868BA81DE747D4B97E3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ec8ca154586fb048d5c28d690b40788d96f86c2d03774041cb79f491555166d
                                          • Instruction ID: 0891c15d8c27cdbcaf9b90745c480fd4e893a070252816df959314f598e3bbc7
                                          • Opcode Fuzzy Hash: 1ec8ca154586fb048d5c28d690b40788d96f86c2d03774041cb79f491555166d
                                          • Instruction Fuzzy Hash: 80111571D002098BCB08CFA9D904AEEBBB6FF89305F108069D414B3260DB365941CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a5cfa1c2009352ac5d15091511dfeaad89d8050b86917dc2f485cde5cd9855d5
                                          • Instruction ID: 1f89e01617e49cef3eb8112fb7b0962b5b4b03ca0523b2c49b437ea8ba17ce81
                                          • Opcode Fuzzy Hash: a5cfa1c2009352ac5d15091511dfeaad89d8050b86917dc2f485cde5cd9855d5
                                          • Instruction Fuzzy Hash: 2901B131B002099BDF10DAA9AC45ABFBBBAFBC4351F14403AE604D3240EB31991587A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c77fbc07e0ed338248c595538e1db8c3a5e63519feaf86c0e32fd72813431526
                                          • Instruction ID: 46b4959ddebd23ae1d724f8a74105b8e0fd9271d5b5553a30c75ff800234d49e
                                          • Opcode Fuzzy Hash: c77fbc07e0ed338248c595538e1db8c3a5e63519feaf86c0e32fd72813431526
                                          • Instruction Fuzzy Hash: A501D4312009019FCF49AB78E49952E3BABEFC1351356682CE0868BA81DE347D4697E2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1c8948e13dbaff23b2a3e1be905d68bbd364fd29725e159514aae584b85f999
                                          • Instruction ID: e8df2da0dd1ec0180335dacb6709d791f3a27fcc63ce09cc7b9e5560d089e82c
                                          • Opcode Fuzzy Hash: f1c8948e13dbaff23b2a3e1be905d68bbd364fd29725e159514aae584b85f999
                                          • Instruction Fuzzy Hash: 4111E5302043418FD315EF38D15825A7BE2EF86311B158A6ED08A8B796CF74AC0ADB92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2169983653.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c9d000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f59b9a34a3c5ec79b8c060cbbbbeed2480ef66dced614aa28678df7200a10a3b
                                          • Instruction ID: bf9d90f4285a50ba2e5503d91e067deac698a429f498bea17a1a58afccfc4d9a
                                          • Opcode Fuzzy Hash: f59b9a34a3c5ec79b8c060cbbbbeed2480ef66dced614aa28678df7200a10a3b
                                          • Instruction Fuzzy Hash: 5A01F7715083409AEB105E2ACDC8726BFECDF51324F18C45AED1A6A1C3C6789840DAF5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5078fe90c52fcd7c589d01c92116a50620fbdadc540f0d48fd1f61cf1c6f7ab
                                          • Instruction ID: 82e4c92a99f77b54dab4d3b9298bf7bcaa1b8c83c408dac97aba3c67531f564e
                                          • Opcode Fuzzy Hash: e5078fe90c52fcd7c589d01c92116a50620fbdadc540f0d48fd1f61cf1c6f7ab
                                          • Instruction Fuzzy Hash: 65019A35A157028FCB29CA75EA0473BBFB3BF80209B088CBCD04286655DE79E584CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3604c29a68f9299580cf98f99ec7b73e46740c0988a7105bddc577c9e86fafb4
                                          • Instruction ID: ed27c87cb19c584fed01a5a48282b8981544cdd727971de9b347562ad6dfc20f
                                          • Opcode Fuzzy Hash: 3604c29a68f9299580cf98f99ec7b73e46740c0988a7105bddc577c9e86fafb4
                                          • Instruction Fuzzy Hash: 4B01D4302002058FD324AF69E45865F7BE7EFC5315B118A2DE04B87B85CF78AC0A9BD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8641dd348367abb461e20ae118d775aa13d641b9412eb45a2efc3bb136a384db
                                          • Instruction ID: 0b1aeba3bd08d1a8b11f0026a0ec6df37620dcd81d56f76e074f02157dc550d5
                                          • Opcode Fuzzy Hash: 8641dd348367abb461e20ae118d775aa13d641b9412eb45a2efc3bb136a384db
                                          • Instruction Fuzzy Hash: 39F090B23002156FE714DE65DC85FABBBAEEBCC314F11452AE119D7391DAB1EC0187A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 874164a2169d356f27fdfda6a97daa87c1ef9133ce604a13bb1926bf10010aa9
                                          • Instruction ID: 243a717be1f4e281d602828e610dcc760fb2866f42bc032ad18f6b94ba0a92cf
                                          • Opcode Fuzzy Hash: 874164a2169d356f27fdfda6a97daa87c1ef9133ce604a13bb1926bf10010aa9
                                          • Instruction Fuzzy Hash: D501D6342083499FCB469F78D8548A93FBAEF4620071488EDE941CB762DA36DC05C791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b00cee9af679ddf7ff5894f3202cadc760c3d0c7f93723bca7790b7635303425
                                          • Instruction ID: 777c652647146d496f261b6adbf4711f1edabd53224e82f6d4c730d0d30e0c66
                                          • Opcode Fuzzy Hash: b00cee9af679ddf7ff5894f3202cadc760c3d0c7f93723bca7790b7635303425
                                          • Instruction Fuzzy Hash: 45F090632041D83FCB514EAA9C12EFB3FEDDB8E161B084066FBD8C1241C529C911ABB0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 177e5b40822c399bd7c87b6aec4cb4b772d8a7b2163e053228c6c8c3c3d56352
                                          • Instruction ID: b41584ce429445da294a046e2e8ed2b7b51a8eee0ab63da942464e751a69409f
                                          • Opcode Fuzzy Hash: 177e5b40822c399bd7c87b6aec4cb4b772d8a7b2163e053228c6c8c3c3d56352
                                          • Instruction Fuzzy Hash: 6B0108B4D0520ADFCB04DFA4DA497AEBBB5FB09301F2084A99815A3350D3795A40DF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 777d0407bbac65ba2d3c7b58f867faa7093b794e686575e8797633c857410604
                                          • Instruction ID: c78a9a1e661f09bd0fb96f57d02fc8f11f93520ad17aba8ef4f273186480a4e9
                                          • Opcode Fuzzy Hash: 777d0407bbac65ba2d3c7b58f867faa7093b794e686575e8797633c857410604
                                          • Instruction Fuzzy Hash: CB01C4B4D0520ADFCB04DFA9DA496AEBFF5BB49300F2085A99415A3350D7785A40CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 68c0f59f10973233744868ee3a5d192d5e72194a5086fd1a3ea34ae642c850b6
                                          • Instruction ID: ae8b9caf5b4a0141455f229862368a54fc2be0704bd6808cea34a3531c726f28
                                          • Opcode Fuzzy Hash: 68c0f59f10973233744868ee3a5d192d5e72194a5086fd1a3ea34ae642c850b6
                                          • Instruction Fuzzy Hash: 3DF05EB27002155FE714DE59EC84EABB7AEEBCC314F10452EE11AC7391DAB1EC0587A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2169983653.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c9d000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a23e34df366e3c3730018a66ca56c1b259276c50e26c573c2e203eea394bc7fb
                                          • Instruction ID: 0017c29da115f862f1aaf95b2e0aa1a6e59d0bc875b53e0da309c70ecbce7cf8
                                          • Opcode Fuzzy Hash: a23e34df366e3c3730018a66ca56c1b259276c50e26c573c2e203eea394bc7fb
                                          • Instruction Fuzzy Hash: 0BF0C271404340AAEB109E09C8C8B62FFD8EB51724F18C05AED096E2C3C278AC44CAB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2a5de989a60de170209084b0e0c0523bf470751d0b69991720c93a5ce047120
                                          • Instruction ID: bcd038b89067864b8bde56995c1ab56dc9b2cb0b3756655b45b5a33d16696cc0
                                          • Opcode Fuzzy Hash: c2a5de989a60de170209084b0e0c0523bf470751d0b69991720c93a5ce047120
                                          • Instruction Fuzzy Hash: DCF02E312082809FD7112B69A858B9E7FD9DFCB714F04446DF149C3383CA251C4587A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 309ba3e1ae83ca3b2cea619e13799834f4f0155717797446272886d231d89913
                                          • Instruction ID: 425a3797b04773a3161b6da4f38825fa672bf4b7a576fbaef5d3c4aea2ba4285
                                          • Opcode Fuzzy Hash: 309ba3e1ae83ca3b2cea619e13799834f4f0155717797446272886d231d89913
                                          • Instruction Fuzzy Hash: 94012130504B829FD362DF25E418562BFF6FB8A310710865FD4CAC3A62CB30600ACF81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a86caa8e3b2ed59a0e00055ce1292cf26597c447c5dd3380a0701ff3148d9595
                                          • Instruction ID: 99eae5e3259ca39553b18e5f0033462b57c3e4ffcbe8b725c1a4cb8120839fcc
                                          • Opcode Fuzzy Hash: a86caa8e3b2ed59a0e00055ce1292cf26597c447c5dd3380a0701ff3148d9595
                                          • Instruction Fuzzy Hash: C7F0E96230C2A55FD71717386C640BD3FA6DAC765134810DEE1C6CB393DA58590AD3E2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 12cbcc786395ee67ae7a89f9a18c61b53111e0e7a286fda97e93cfd69a33e999
                                          • Instruction ID: 5057ab2fdee6c9122444f21e854f82eab91415cc1617c788f04b193cf4fdbb4f
                                          • Opcode Fuzzy Hash: 12cbcc786395ee67ae7a89f9a18c61b53111e0e7a286fda97e93cfd69a33e999
                                          • Instruction Fuzzy Hash: 84F012662041E83F8B518EAA5C15CFB7FEDDACE1617084156FFD8D2141C529C921ABB0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9912a5cc08c76a7d1e92d22e6c0ce4f0211f717787dfe074cecc53ee64ae7506
                                          • Instruction ID: fc7a428a57b1532a1226c6e6090ab8556647f922ac41aa6d02f26dfed7f9ccd9
                                          • Opcode Fuzzy Hash: 9912a5cc08c76a7d1e92d22e6c0ce4f0211f717787dfe074cecc53ee64ae7506
                                          • Instruction Fuzzy Hash: B4F0B431B043059BC720DA28ED41F667FE5EF81715F1581BAF254CB1E2DAB5E805D740
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ecbed83b75fd58657750307e661e7c57b75493f773b2170d1b4ac04ebca061d
                                          • Instruction ID: eaa3ef9dd2eabed22432e41b2e5d787bab11e4f4d8e5ea9eb4417ecae0a90abb
                                          • Opcode Fuzzy Hash: 1ecbed83b75fd58657750307e661e7c57b75493f773b2170d1b4ac04ebca061d
                                          • Instruction Fuzzy Hash: 26F082317042044B8754DBA9DA805A6FBEAEF89764318C8AED94EC7B40DA32FC028780
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ffb7121cd4b63a35a216286f8483d91302c77a1b81cd5526e5c42aca9718a8bc
                                          • Instruction ID: 7559930151abfdf8b0d47ca715ab99d64c1b47c7db00433ac1ceecca9f02d13f
                                          • Opcode Fuzzy Hash: ffb7121cd4b63a35a216286f8483d91302c77a1b81cd5526e5c42aca9718a8bc
                                          • Instruction Fuzzy Hash: 20F096301087D14FC7129B38E45939E7FE5DB82214B19195FE186CB683CA696845C762
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d464afc64b58789b5fef7055758abfc56e73370ad007916c3520af64380b59c
                                          • Instruction ID: 88a75d64d64490578ae7e6dcfbe1f5b4b1b805f58c83937c659ee56acd6b23bb
                                          • Opcode Fuzzy Hash: 3d464afc64b58789b5fef7055758abfc56e73370ad007916c3520af64380b59c
                                          • Instruction Fuzzy Hash: 28F0A772F1011A5BDF11D969AC499BF7FB9EB95252B08007BE514D3240FB34980987A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1427da91056b54dca405074ce4870c408f6428d613a3c107283e868ab4b29210
                                          • Instruction ID: b1fc19df09117b8d2361097ab8ab9d6e6c2faaac0f48b71316901921cc779229
                                          • Opcode Fuzzy Hash: 1427da91056b54dca405074ce4870c408f6428d613a3c107283e868ab4b29210
                                          • Instruction Fuzzy Hash: A4F0B471E092459FE705DFA4E9717AD7F70EB51300F0081DAD4428B3A5D77DA941DB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad3953aad042ba3915f30cd1f1f03a3535f13ad4cd4ed0324b1e3c9f4119e691
                                          • Instruction ID: b83b189c4ebe4e02f8bff372639791d40e90edc2a9ded17b064250a88af00442
                                          • Opcode Fuzzy Hash: ad3953aad042ba3915f30cd1f1f03a3535f13ad4cd4ed0324b1e3c9f4119e691
                                          • Instruction Fuzzy Hash: 30F08C71A00702CFCB24CA26DA40973BBFBBF80218B149CBCE04242A15DAB9F485CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ad11e261a3c79abd1c50152f860e9b20a9e78000a3ac07f24f1266ee7616cea
                                          • Instruction ID: d95d452cf7ad137a99957e618eab59a318e57894fedd948d0e03e6b596006e05
                                          • Opcode Fuzzy Hash: 1ad11e261a3c79abd1c50152f860e9b20a9e78000a3ac07f24f1266ee7616cea
                                          • Instruction Fuzzy Hash: 60E09231200210ABD7146B9AA449B9E7ADAEBC9351B10452CF60EC3382CE611C0547A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d5288c0879a184750b4542fd184d9b0c6bae2cc5bdd36017d8589e31b25d77d7
                                          • Instruction ID: cfb2ee695e0a9fb1a0c7ae9226c614cb39b26cb3efa6e769a5d3dedecbfc9cf1
                                          • Opcode Fuzzy Hash: d5288c0879a184750b4542fd184d9b0c6bae2cc5bdd36017d8589e31b25d77d7
                                          • Instruction Fuzzy Hash: 84F09070501B02DFD765DF26E548562BBFAFB88301711C62EE88B83B51DB74A40ACF84
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42e1e8d490282f5bdbc33fdfcbccd2a61b9b74caf7970201006f5012e6807763
                                          • Instruction ID: 7a51cc71e3a0d5eca13a3af725bb77fd5e4595c07f541a34e9ce479e60385415
                                          • Opcode Fuzzy Hash: 42e1e8d490282f5bdbc33fdfcbccd2a61b9b74caf7970201006f5012e6807763
                                          • Instruction Fuzzy Hash: DDE092713082955BDB172735A8285AD7FAADBC7611348149FE186CB383CE141D4A87D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0ab210f58e91a57f69b4acb379cc41815d7f90be0248e3c40bdcc36dc8835ac
                                          • Instruction ID: 13082a67a00ef8f716aad9d9fe68071abcd2de445adccc0d6c9fa5e05ff111b4
                                          • Opcode Fuzzy Hash: c0ab210f58e91a57f69b4acb379cc41815d7f90be0248e3c40bdcc36dc8835ac
                                          • Instruction Fuzzy Hash: 15E065302007514FC715EB2DE4497AE7BEADFC6315F05192DE186C7781CFA96D058791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 22c2a986cef8874c1faf95f61416094694eb7f6482fa17fe3f3c2966c81dd643
                                          • Instruction ID: 3358e11c6e5cee41610e8a7f8fd0c8994866a2d4f9829f5cd3207b61cfb44ff4
                                          • Opcode Fuzzy Hash: 22c2a986cef8874c1faf95f61416094694eb7f6482fa17fe3f3c2966c81dd643
                                          • Instruction Fuzzy Hash: 21F085B4F00309AFD714EFA4E920BAD7BB1EB84300F1082A8D4119B3A4DBB99940CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 41b1341fceeb5e86bead459991db9bbfeb6b5c8b0226f4604d7b3489c65f0d07
                                          • Instruction ID: fd5cb3c2dae8e43297196ef5619db9939ccbcfbfaf79d558e7c75a4bf9fed64b
                                          • Opcode Fuzzy Hash: 41b1341fceeb5e86bead459991db9bbfeb6b5c8b0226f4604d7b3489c65f0d07
                                          • Instruction Fuzzy Hash: 32E0D8B210C3019FD304DB60E8048967BE4EF95320F058CBEE481C7181EB76E841C799
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d309c3c339bf09ff5bf5e77b0c96fec82dbccdbf208148e0c088882a0431ff55
                                          • Instruction ID: 9ef9cc72cedaad2456fa51b3dca93e572cbdc13943c958a2da0690278a7aeac1
                                          • Opcode Fuzzy Hash: d309c3c339bf09ff5bf5e77b0c96fec82dbccdbf208148e0c088882a0431ff55
                                          • Instruction Fuzzy Hash: 07F06D74E00308AFD744EFB4E961B9DBBB0BB44300F1082A8D805973A4D7786D44CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3742024433ba070547b04ee766bb3c8ed83cd183545b3ef6a9c2d7bd1d1b29b
                                          • Instruction ID: 60e2726f9c8a3408d9289b296928f0ee444613960ae39759378265648c203ee2
                                          • Opcode Fuzzy Hash: f3742024433ba070547b04ee766bb3c8ed83cd183545b3ef6a9c2d7bd1d1b29b
                                          • Instruction Fuzzy Hash: D5F03935C0424AEFCB06CFB4DA488CDBF38EB02244B2182DAE8A1971D1DA351A46DB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c19ff9202c00570a0b68f0c42827a4c11b94c9b15f2f22b1f2a9d59d1fc786a
                                          • Instruction ID: a4e7604e3f5e9d23e0543debe903a7f3c9f05d12b9c5b6583fc3caa0c408828f
                                          • Opcode Fuzzy Hash: 9c19ff9202c00570a0b68f0c42827a4c11b94c9b15f2f22b1f2a9d59d1fc786a
                                          • Instruction Fuzzy Hash: 36E0D8310083804BCB02EB38BCF60887F64FB476047029489DC9447297CB645D49D386
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a460b1cf284e39f4a91b5f95d4a3375c3ceb918df4bb1d1d5af1af846b4d8c7
                                          • Instruction ID: 80b45f1be83903875d5bd4e280830b6bcb6b2e5ee87ffc53299b6282c823b695
                                          • Opcode Fuzzy Hash: 8a460b1cf284e39f4a91b5f95d4a3375c3ceb918df4bb1d1d5af1af846b4d8c7
                                          • Instruction Fuzzy Hash: 90D05B3130011457DA052769B4585AE7B9BDBC9661304152DF607C7341CF651D0947D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f839b1f0cc91e71c14ef863654d31d62f146c9a5a358e55852a4050ea125376
                                          • Instruction ID: 66cff827fafe69fddc68171073fdbe614f9f57d9c89941e057c05b5f034a0f0d
                                          • Opcode Fuzzy Hash: 6f839b1f0cc91e71c14ef863654d31d62f146c9a5a358e55852a4050ea125376
                                          • Instruction Fuzzy Hash: F7E0D8311083818BCB06EF38F8A44987F60EB46210307559ED04587357C6241C59C7D1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6e93d944a9b2a3d577f0a2389a832c1742cddf2021279c04e9077b59a660a19
                                          • Instruction ID: 4447cb9cc09d62d041844eccd114a683e05acd37f9590b5f1e92362362611c4f
                                          • Opcode Fuzzy Hash: c6e93d944a9b2a3d577f0a2389a832c1742cddf2021279c04e9077b59a660a19
                                          • Instruction Fuzzy Hash: 7FE09270904348EFCB46DBB8EB555987B74EB82201B1115DED008EB292D6301E14D752
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a910a17b4fd44a488ae003d6c8f9c0cbdd5514569495e03219586ef47e4497d
                                          • Instruction ID: 444cdc45d642e65394e8e05222256c6e84fae7b7050f2c904e93f96f5a0cce99
                                          • Opcode Fuzzy Hash: 0a910a17b4fd44a488ae003d6c8f9c0cbdd5514569495e03219586ef47e4497d
                                          • Instruction Fuzzy Hash: DAE09275D0020DEFCB41DFE4E9448DDBBB9EB48200F2082AAD809A3240EB346B55DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c9fba302a3668f9d81a4410d365eb077b8afc77ee91d3e57e923fcab6d265173
                                          • Instruction ID: 223d36e1f7effdbf5fdc6efd9d29370d290ab3e90095f5d8d98d328c83150473
                                          • Opcode Fuzzy Hash: c9fba302a3668f9d81a4410d365eb077b8afc77ee91d3e57e923fcab6d265173
                                          • Instruction Fuzzy Hash: DED0A7713042045BA354E69DDE40592BFDEDF8A76431888BEED0EE7751DE62FC028790
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b8f8b61e9915e44bdf67c75aa5fdfdc1732a0bf55c18919f2a4580a571aa38f
                                          • Instruction ID: 29a9f4ae9796f5b925cdf37417d2469b760d25a1fb4806ffa3710c59cd14175e
                                          • Opcode Fuzzy Hash: 3b8f8b61e9915e44bdf67c75aa5fdfdc1732a0bf55c18919f2a4580a571aa38f
                                          • Instruction Fuzzy Hash: DDD01271A0020CFBCB00DFA8E95155D77B9DB85204B10559DD408E3341DA311F009B91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 352d08221c0303ec0f8a38bdd8e4c0288c6ada1b0ad97e114164fb394a3e3219
                                          • Instruction ID: 79f68f3376300bb5c342213cba77d1bd94e3834c4a413e3083720d4e05b668e4
                                          • Opcode Fuzzy Hash: 352d08221c0303ec0f8a38bdd8e4c0288c6ada1b0ad97e114164fb394a3e3219
                                          • Instruction Fuzzy Hash: FEE012352583849FC7429F68D8108557F76AF5661074444CEE5C48B672C6269424DB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 277d888d9635db4a62048acc0db7b84dda7989ae71db6be0ae55b1fbaf4bb705
                                          • Instruction ID: 553497450d39ce5104c70068f2c8b6e657e22370b4030e55dff5be885a354afd
                                          • Opcode Fuzzy Hash: 277d888d9635db4a62048acc0db7b84dda7989ae71db6be0ae55b1fbaf4bb705
                                          • Instruction Fuzzy Hash: 68C08C32300020130AA5256C780D8AE65DED7C9B63346002FF90BC3384CE608C4613F1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 18c7ea395d5f214638352c3ff0cfc9d7207ade0d17682424ad801db513ecd292
                                          • Instruction ID: e0277401f48b8dffbbb07fff939fd115e06c29e37ff428440c59003f52ed519f
                                          • Opcode Fuzzy Hash: 18c7ea395d5f214638352c3ff0cfc9d7207ade0d17682424ad801db513ecd292
                                          • Instruction Fuzzy Hash: B7B092326601021BF7507261AC0BFD2389193E07A5F195020B752A528ADEDAD04086A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $sq$$sq
                                          • API String ID: 0-1184984226
                                          • Opcode ID: 6bd9c0259adbbe9398f552e6634dc4a652517fcea002b41c2da05f46ab602ec5
                                          • Instruction ID: 877ef8ddba3668885730128216db5197d96490a8618e0d7ff07bdd3e42aff98d
                                          • Opcode Fuzzy Hash: 6bd9c0259adbbe9398f552e6634dc4a652517fcea002b41c2da05f46ab602ec5
                                          • Instruction Fuzzy Hash: B761AE74E00208DFDB44DFA9D884ADDBBB2FF89300F249029E415BB361DB35A986CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \VOj
                                          • API String ID: 0-304670344
                                          • Opcode ID: d6a6397e5697061fe39f48412378ec307d56aff4110d1352cf88999eaff4fbbc
                                          • Instruction ID: cced2b5af1a17fe1958a51e73a4d1f9a2e63d72c3274a0d47df6d9390b51b2db
                                          • Opcode Fuzzy Hash: d6a6397e5697061fe39f48412378ec307d56aff4110d1352cf88999eaff4fbbc
                                          • Instruction Fuzzy Hash: 5D916D74E002098FDF54CFA9C9857ADBBF2EF88314F288529E415EB394DB749846CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19a1a0240817a7b7d2b03171dd98738e698c37fda717b7b75ebe332627f30ed1
                                          • Instruction ID: 883978945623dcc8fd58ed3376c15ef88558708f0ba3463379477ee4a74c188f
                                          • Opcode Fuzzy Hash: 19a1a0240817a7b7d2b03171dd98738e698c37fda717b7b75ebe332627f30ed1
                                          • Instruction Fuzzy Hash: C2626EB06002009FDB48DF68C49971A7AE6EB84308F64D85CD1099F396CFBBDD4B9B95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cf29a0de8165e803b9aa0011b0ded7b9bf3d5889c06be3bc69cf4fa61e9a5a74
                                          • Instruction ID: 9f1914ff7a81978ab4cee36d30d8d301b761661a3647f9e844ad0154c12d7ad8
                                          • Opcode Fuzzy Hash: cf29a0de8165e803b9aa0011b0ded7b9bf3d5889c06be3bc69cf4fa61e9a5a74
                                          • Instruction Fuzzy Hash: 05625EB06002009FDB48DF68C49971A7AE6EB84308F64D85CD1099F396CFBBDD4B9B95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2170168733.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d10000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc1dbf6c0c92eec09acecd87ecef8283527329d1acf9c1030bc257882ce88c69
                                          • Instruction ID: 7acdc2840923eda8d2d9cc8ed412e33b89284c313c441f85cd2864653cdcd727
                                          • Opcode Fuzzy Hash: dc1dbf6c0c92eec09acecd87ecef8283527329d1acf9c1030bc257882ce88c69
                                          • Instruction Fuzzy Hash: A4A14B32E002159FCF09DFA5E8405DEB7B2FF84300B15456AE805AB265DF71E995CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27382dd697795ec3f089113c956d7e363574e8a5b170e5480b8ef77a150c64fe
                                          • Instruction ID: 8620a5dcca7ea7428d8d84878b8faf716cd182391d9a135d50e856d869453e31
                                          • Opcode Fuzzy Hash: 27382dd697795ec3f089113c956d7e363574e8a5b170e5480b8ef77a150c64fe
                                          • Instruction Fuzzy Hash: 35C19074E01218CFDB58DFA9D854B9DBBB2BF89300F2084AAD419AB355DB349D86CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bfacf4c8e147960d2aede8f53c2ab6c870be6b2258011cd01d9cb183e311699
                                          • Instruction ID: 66fcd8e4955fe7cecd60eac797f7388c7c1c15cd1377fb8a7281aaa5198d0d91
                                          • Opcode Fuzzy Hash: 1bfacf4c8e147960d2aede8f53c2ab6c870be6b2258011cd01d9cb183e311699
                                          • Instruction Fuzzy Hash: 2691D6B0D012298BDB68DF65C851BDEBBB2BF88300F50C1EAD509AB250DB355E85DF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2177640499.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6610000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b54d8409c46d8b93947e9e644a29e110c650614a2e7aa4e98da5eed7182b24e7
                                          • Instruction ID: 350718a6c4e91aa69ff23947218fe2a28171961adfcf6694a5b6be31fc5e9cd2
                                          • Opcode Fuzzy Hash: b54d8409c46d8b93947e9e644a29e110c650614a2e7aa4e98da5eed7182b24e7
                                          • Instruction Fuzzy Hash: FE01E434A40208DFCB14CF84E845AEDF7B5FB4A311F549159E94AAB361CB329D51CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-3332464785
                                          • Opcode ID: 83aeb025bb618f6de65c2148af469b297c54ae64671fa8564c04872b75618b73
                                          • Instruction ID: f27a42fa0f2a07d381b897b384c009e7ad0869b5d63bf75e3a4d7bc555a36ae6
                                          • Opcode Fuzzy Hash: 83aeb025bb618f6de65c2148af469b297c54ae64671fa8564c04872b75618b73
                                          • Instruction Fuzzy Hash: 02D1A0703006146BC70A7AA0DD9AABDA693FBC7300B918C38E1044F7A6DF756D1D6B97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-3332464785
                                          • Opcode ID: 961c7b9f39870469223c16861f3f6b3a8c715dba71fb70a6d46a710b9cc34beb
                                          • Instruction ID: 1cb4f5caa4d5dce3ba94257a0fc0630b45148b6c8d1bd5f4419e387412b32737
                                          • Opcode Fuzzy Hash: 961c7b9f39870469223c16861f3f6b3a8c715dba71fb70a6d46a710b9cc34beb
                                          • Instruction Fuzzy Hash: F0D1B2703006146BC60A7BA4DD9AABDA293FBC7300BA18C38E1044F796DF756D1D6B97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-2675541404
                                          • Opcode ID: c1c66c2e0b55baad4ab13d21a8873abc2a61f1b76a5a28aa0dc2f799dc0fde92
                                          • Instruction ID: 40747a3e0609e356234d7c227ad44ca35d27b670e0cc341fbd0580922b317701
                                          • Opcode Fuzzy Hash: c1c66c2e0b55baad4ab13d21a8873abc2a61f1b76a5a28aa0dc2f799dc0fde92
                                          • Instruction Fuzzy Hash: BC41D3703006106BC70A6BA4D99667DA693FBC7300B918C38E2084FB96CF7A6D4D5797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-2675541404
                                          • Opcode ID: d8981fdfcf596075511b53e321119c47af5ba36f9f19ee2c7b9f59d84c8923d5
                                          • Instruction ID: 9fc04df574036ca9d10b4fca4cfe59ecb0f1d3c19c12150656f0b58590e43d99
                                          • Opcode Fuzzy Hash: d8981fdfcf596075511b53e321119c47af5ba36f9f19ee2c7b9f59d84c8923d5
                                          • Instruction Fuzzy Hash: 2741A5703006146BD7067AA4D98667E6693FBC7300F918C38E2094FB86DF796D0D5797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-975092858
                                          • Opcode ID: 72bfb2a429473f16e4fa8b8c9358b6713e19078f78174182e3d19095be4d0b1c
                                          • Instruction ID: c65141726e839473eee38853461f322cd7b799716708c7ff1b6b4bbeb13dcd30
                                          • Opcode Fuzzy Hash: 72bfb2a429473f16e4fa8b8c9358b6713e19078f78174182e3d19095be4d0b1c
                                          • Instruction Fuzzy Hash: 3231D3703002552BCB066BA4D986A7DAA93BBC7300F918938E2094F786CFB56D4D9796
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-975092858
                                          • Opcode ID: b1e22ffe64a89d59db3fca3304214cc9ca3310e666f234f6304789abd5c99955
                                          • Instruction ID: c629bc871d58da024d0e399dcb32a4e610e0e4dbff621df09ea7477bce550cda
                                          • Opcode Fuzzy Hash: b1e22ffe64a89d59db3fca3304214cc9ca3310e666f234f6304789abd5c99955
                                          • Instruction Fuzzy Hash: 8B21D2703002152BCB066AA4DD86A7EA693FBC7300FA18C38F2084F786CFB56D495796
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-3690536320
                                          • Opcode ID: 24e03d68b22fa0d538c91832380e4ba7bec2c20c2d104bca83c50f41e75d47ef
                                          • Instruction ID: b5d88e3a95e32bca0f9808c8bfd8aff5ecba0018aac4330571e71ebdb21a42ae
                                          • Opcode Fuzzy Hash: 24e03d68b22fa0d538c91832380e4ba7bec2c20c2d104bca83c50f41e75d47ef
                                          • Instruction Fuzzy Hash: 9231C5313002556FCB052FA1E8968AD7BA3FB863017515538E1058FB96CF741E8A9BC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-3690536320
                                          • Opcode ID: a7b814fbc4a83f3fabee6e255fe47c274bd47aa01f920f29f6d91c4726c92745
                                          • Instruction ID: 28dd9117ae2d679ef9f71270e2d7c603f4d8554963ce6337b8541cba8f1e685b
                                          • Opcode Fuzzy Hash: a7b814fbc4a83f3fabee6e255fe47c274bd47aa01f920f29f6d91c4726c92745
                                          • Instruction Fuzzy Hash: 2C21D331300256ABCB052FA5EC968AE77A3FBC63007519438F1058FB95CF745E8A9BC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (_sq$(_sq$(_sq$(_sq$(_sq$(_sq
                                          • API String ID: 0-2477685147
                                          • Opcode ID: 43ac36dbcc43ee130bc7018aeda76e3ff59699a4f9ed9985ffbfdcffa5d0b07c
                                          • Instruction ID: d52a8525a9277b730fc66579f2edba7546eded26af6b283ca131e5c8e682fe34
                                          • Opcode Fuzzy Hash: 43ac36dbcc43ee130bc7018aeda76e3ff59699a4f9ed9985ffbfdcffa5d0b07c
                                          • Instruction Fuzzy Hash: 39D1A139B04244AFCB059F68C4545AEBFB6EFC5310B6580AEEC46DB382DA359D06CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-118940947
                                          • Opcode ID: 769e3b8e341a91878171590f0caeb35266db0701a80f230dd63bf0887949a32f
                                          • Instruction ID: 1f7489b50ebddb6c6c4e8a0a21237cc5acca3724c11128d213c2a33cbae58c07
                                          • Opcode Fuzzy Hash: 769e3b8e341a91878171590f0caeb35266db0701a80f230dd63bf0887949a32f
                                          • Instruction Fuzzy Hash: 4E2103303002902BC7066AA49896A6DBA93EBC7700F958938E1084F786CF766D5D9792
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2176615843.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5fc0000_KBDFW9FTsq.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Dsj$Dsj$Dsj$Dsj$Dsj$Dsj
                                          • API String ID: 0-118940947
                                          • Opcode ID: c4c8077448e4960b01f4360422fc919f68d1a7ca8c5d6856a61f0ff5ca582a4a
                                          • Instruction ID: 17165fee41efa80a334fdcbf96e82db696170b1d783c990da250e7de635827cc
                                          • Opcode Fuzzy Hash: c4c8077448e4960b01f4360422fc919f68d1a7ca8c5d6856a61f0ff5ca582a4a
                                          • Instruction Fuzzy Hash: B111D2303002542BC7066AA5D986A7EA693FBC7700F91893CE1084F786CF766D595792