Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MB267382625AE.exe

Overview

General Information

Sample name:MB267382625AE.exe
Analysis ID:1559137
MD5:30cfd90585ed8d00c8f6507409beff00
SHA1:6ab2aa9cca85d4cda78da92336d7c0c5939a44c2
SHA256:50603d9481c76ac7052a18320666f9206f6729c78fdb779c0e7010952eaede26
Tags:exeuser-abuse_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • MB267382625AE.exe (PID: 412 cmdline: "C:\Users\user\Desktop\MB267382625AE.exe" MD5: 30CFD90585ED8D00C8F6507409BEFF00)
    • powershell.exe (PID: 5972 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3180 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7448 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 1120 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MB267382625AE.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\MB267382625AE.exe" MD5: 30CFD90585ED8D00C8F6507409BEFF00)
  • IFUybmFQxR.exe (PID: 7404 cmdline: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe MD5: 30CFD90585ED8D00C8F6507409BEFF00)
    • schtasks.exe (PID: 7608 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • IFUybmFQxR.exe (PID: 7656 cmdline: "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe" MD5: 30CFD90585ED8D00C8F6507409BEFF00)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "FTP", "FTP Server": "ftp://cpanel2-nl.thcservers.com/", "FTP Username": "snup@lifechangerscare.com", "Password": "Uvob2G1Tc73ZCus02X", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14919:$a1: get_encryptedPassword
      • 0x14c05:$a2: get_encryptedUsername
      • 0x14725:$a3: get_timePasswordChanged
      • 0x14820:$a4: get_passwordField
      • 0x1492f:$a5: set_encryptedPassword
      • 0x15fab:$a7: get_logins
      • 0x15f0e:$a10: KeyLoggerEventArgs
      • 0x15b79:$a11: KeyLoggerEventArgsEventHandler
      00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x198b5:$x1: $%SMTPDV$
      • 0x18250:$x2: $#TheHashHere%&
      • 0x181fc:$x3: %FTPDV$
      • 0x1998b:$x4: $%TelegramDv$
      • 0x15b79:$x5: KeyLoggerEventArgs
      • 0x15f0e:$x5: KeyLoggerEventArgs
      • 0x19881:$m2: Clipboard Logs ID
      • 0x19adb:$m2: Screenshot Logs ID
      • 0x19beb:$m2: keystroke Logs ID
      • 0x19ec5:$m3: SnakePW
      • 0x19ab3:$m4: \SnakeKeylogger\
      0000000E.00000002.4509401972.0000000002A2B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 19 entries
        SourceRuleDescriptionAuthorStrings
        0.2.MB267382625AE.exe.3b4e870.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.MB267382625AE.exe.3b4e870.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.MB267382625AE.exe.3b4e870.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12d19:$a1: get_encryptedPassword
            • 0x13005:$a2: get_encryptedUsername
            • 0x12b25:$a3: get_timePasswordChanged
            • 0x12c20:$a4: get_passwordField
            • 0x12d2f:$a5: set_encryptedPassword
            • 0x143ab:$a7: get_logins
            • 0x1430e:$a10: KeyLoggerEventArgs
            • 0x13f79:$a11: KeyLoggerEventArgsEventHandler
            0.2.MB267382625AE.exe.3b4e870.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a687:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x198b9:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19cec:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ad2b:$a5: \Kometa\User Data\Default\Login Data
            0.2.MB267382625AE.exe.3b4e870.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x13908:$s1: UnHook
            • 0x1390f:$s2: SetHook
            • 0x13917:$s3: CallNextHook
            • 0x13924:$s4: _hook
            Click to see the 21 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB267382625AE.exe", ParentImage: C:\Users\user\Desktop\MB267382625AE.exe, ParentProcessId: 412, ParentProcessName: MB267382625AE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", ProcessId: 5972, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB267382625AE.exe", ParentImage: C:\Users\user\Desktop\MB267382625AE.exe, ParentProcessId: 412, ParentProcessName: MB267382625AE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", ProcessId: 5972, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe, ParentImage: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe, ParentProcessId: 7404, ParentProcessName: IFUybmFQxR.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp", ProcessId: 7608, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MB267382625AE.exe", ParentImage: C:\Users\user\Desktop\MB267382625AE.exe, ParentProcessId: 412, ParentProcessName: MB267382625AE.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", ProcessId: 1120, ProcessName: schtasks.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB267382625AE.exe", ParentImage: C:\Users\user\Desktop\MB267382625AE.exe, ParentProcessId: 412, ParentProcessName: MB267382625AE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe", ProcessId: 5972, ProcessName: powershell.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MB267382625AE.exe", ParentImage: C:\Users\user\Desktop\MB267382625AE.exe, ParentProcessId: 412, ParentProcessName: MB267382625AE.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp", ProcessId: 1120, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T08:23:13.830995+010028033053Unknown Traffic192.168.2.549710188.114.96.3443TCP
            2024-11-20T08:23:15.940003+010028033053Unknown Traffic192.168.2.549713188.114.96.3443TCP
            2024-11-20T08:23:17.145731+010028033053Unknown Traffic192.168.2.549716188.114.96.3443TCP
            2024-11-20T08:23:18.704923+010028033053Unknown Traffic192.168.2.549720188.114.96.3443TCP
            2024-11-20T08:23:19.533513+010028033053Unknown Traffic192.168.2.549723188.114.96.3443TCP
            2024-11-20T08:23:19.887710+010028033053Unknown Traffic192.168.2.549724188.114.96.3443TCP
            2024-11-20T08:23:20.767415+010028033053Unknown Traffic192.168.2.549727188.114.96.3443TCP
            2024-11-20T08:23:21.059785+010028033053Unknown Traffic192.168.2.549728188.114.96.3443TCP
            2024-11-20T08:23:23.420811+010028033053Unknown Traffic192.168.2.549734188.114.96.3443TCP
            2024-11-20T08:23:24.619226+010028033053Unknown Traffic192.168.2.549739188.114.96.3443TCP
            2024-11-20T08:23:25.848497+010028033053Unknown Traffic192.168.2.549744188.114.96.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T08:23:11.990318+010028032742Potentially Bad Traffic192.168.2.549707158.101.44.24280TCP
            2024-11-20T08:23:13.291037+010028032742Potentially Bad Traffic192.168.2.549707158.101.44.24280TCP
            2024-11-20T08:23:15.337913+010028032742Potentially Bad Traffic192.168.2.549711158.101.44.24280TCP
            2024-11-20T08:23:17.087900+010028032742Potentially Bad Traffic192.168.2.549715158.101.44.24280TCP
            2024-11-20T08:23:17.962907+010028032742Potentially Bad Traffic192.168.2.549715158.101.44.24280TCP
            2024-11-20T08:23:19.337918+010028032742Potentially Bad Traffic192.168.2.549722158.101.44.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "FTP", "FTP Server": "ftp://cpanel2-nl.thcservers.com/", "FTP Username": "snup@lifechangerscare.com", "Password": "Uvob2G1Tc73ZCus02X", "Version": "5.1"}
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeReversingLabs: Detection: 65%
            Source: MB267382625AE.exeReversingLabs: Detection: 65%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeJoe Sandbox ML: detected
            Source: MB267382625AE.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: MB267382625AE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49717 version: TLS 1.0
            Source: MB267382625AE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: Igax.pdb source: MB267382625AE.exe, IFUybmFQxR.exe.0.dr
            Source: Binary string: Igax.pdbSHA256z* source: MB267382625AE.exe, IFUybmFQxR.exe.0.dr
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06FC4A2Dh0_2_06FC476A
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06FC4A2Dh0_2_06FC4729
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 02BFF1F6h9_2_02BFF007
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 02BFFB80h9_2_02BFF007
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_02BFE528
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_02BFEB5B
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_02BFED3C
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B68945h9_2_06B68608
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06B636CE
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B66171h9_2_06B65EC8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B658C1h9_2_06B65618
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B66A21h9_2_06B66778
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B67751h9_2_06B674A8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B60741h9_2_06B60498
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B68001h9_2_06B67D58
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B60FF1h9_2_06B60D48
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B65D19h9_2_06B65A70
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06B633B8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_06B633A8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B66E79h9_2_06B66BD0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B665C9h9_2_06B66320
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B60B99h9_2_06B608F0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B672FAh9_2_06B67050
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B602E9h9_2_06B60040
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B68459h9_2_06B681B0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B65441h9_2_06B65198
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 4x nop then jmp 06B67BA9h9_2_06B67900
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 07813885h10_2_07813581
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 07813885h10_2_078135C2
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 00DBF1F6h14_2_00DBF007
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 00DBFB80h14_2_00DBF007
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_00DBE528
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_00DBEB5B
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_00DBED3C
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E8945h14_2_052E8608
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E0FF1h14_2_052E0D48
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E8001h14_2_052E7D58
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E7751h14_2_052E74A8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E0741h14_2_052E0498
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E6A21h14_2_052E6778
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E58C1h14_2_052E5618
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_052E36CE
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E6171h14_2_052E5EC8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E7BA9h14_2_052E7900
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E8459h14_2_052E81B0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E5441h14_2_052E5198
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E02E9h14_2_052E0040
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E72FAh14_2_052E7050
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E0B99h14_2_052E08F0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E65C9h14_2_052E6320
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_052E33A8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_052E33B8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E6E79h14_2_052E6BD0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 4x nop then jmp 052E5D19h14_2_052E5A70

            Networking

            barindex
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPE
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49722 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49715 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49716 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49728 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49724 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49727 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49739 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49744 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49720 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49723 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49734 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49713 -> 188.114.96.3:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49717 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029F0000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000291B000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: MB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000293F000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: MB267382625AE.exe, 00000000.00000002.2078759240.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000A.00000002.2131633671.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: MB267382625AE.exe, IFUybmFQxR.exe.0.drString found in binary or memory: http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E57000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: MB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E57000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

            System Summary

            barindex
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_00EAD57C0_2_00EAD57C
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EB34B80_2_06EB34B8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EB00400_2_06EB0040
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EB66690_2_06EB6669
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EB66780_2_06EB6678
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EB34A80_2_06EB34A8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EBB4400_2_06EBB440
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EBF5B00_2_06EBF5B0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EBF1780_2_06EBF178
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EBF1710_2_06EBF171
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06EBED410_2_06EBED41
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06FC5C910_2_06FC5C91
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06FC04780_2_06FC0478
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 0_2_06FC00400_2_06FC0040
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFB3289_2_02BFB328
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFF0079_2_02BFF007
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFC1909_2_02BFC190
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BF61089_2_02BF6108
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFC7529_2_02BFC752
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFC4709_2_02BFC470
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BF4AD99_2_02BF4AD9
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFCA329_2_02BFCA32
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFBBD29_2_02BFBBD2
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BF68809_2_02BF6880
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BF98589_2_02BF9858
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFBEB09_2_02BFBEB0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFB4F29_2_02BFB4F2
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFE5289_2_02BFE528
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BFE5179_2_02BFE517
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_02BF35729_2_02BF3572
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6B6E89_2_06B6B6E8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B686089_2_06B68608
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6D6709_2_06B6D670
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6A4089_2_06B6A408
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6BD389_2_06B6BD38
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6AA589_2_06B6AA58
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6C3889_2_06B6C388
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B68BF29_2_06B68BF2
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6B0A09_2_06B6B0A0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6D0289_2_06B6D028
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B611A09_2_06B611A0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6C9D89_2_06B6C9D8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B65EB89_2_06B65EB8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6B6D99_2_06B6B6D9
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B65EC89_2_06B65EC8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B656189_2_06B65618
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6560A9_2_06B6560A
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6D6629_2_06B6D662
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B637309_2_06B63730
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B667789_2_06B66778
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6676A9_2_06B6676A
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B674A89_2_06B674A8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B674979_2_06B67497
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B604989_2_06B60498
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B604889_2_06B60488
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B644309_2_06B64430
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B685FC9_2_06B685FC
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6BD339_2_06B6BD33
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B60D399_2_06B60D39
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B67D589_2_06B67D58
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B60D489_2_06B60D48
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B67D489_2_06B67D48
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B65A709_2_06B65A70
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B65A609_2_06B65A60
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6AA489_2_06B6AA48
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B633B89_2_06B633B8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B633A89_2_06B633A8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6A3F89_2_06B6A3F8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B66BD09_2_06B66BD0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B66BC19_2_06B66BC1
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B663209_2_06B66320
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B663129_2_06B66312
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6C3789_2_06B6C378
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6B08F9_2_06B6B08F
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B608F09_2_06B608F0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B678F09_2_06B678F0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B608E09_2_06B608E0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B628189_2_06B62818
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6D0189_2_06B6D018
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B600069_2_06B60006
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B628079_2_06B62807
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B670509_2_06B67050
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B600409_2_06B60040
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B670409_2_06B67040
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B681B09_2_06B681B0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B681A09_2_06B681A0
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B611919_2_06B61191
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B651989_2_06B65198
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6518A9_2_06B6518A
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B6C9C89_2_06B6C9C8
            Source: C:\Users\user\Desktop\MB267382625AE.exeCode function: 9_2_06B679009_2_06B67900
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_054ED57C10_2_054ED57C
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_076234B810_2_076234B8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762210610_2_07622106
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762666910_2_07626669
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762667810_2_07626678
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762F5B010_2_0762F5B0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762B44010_2_0762B440
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_076234A810_2_076234A8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0762F17810_2_0762F178
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_07814AEA10_2_07814AEA
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_07814F1010_2_07814F10
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0781047810_2_07810478
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 10_2_0781004010_2_07810040
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBF00714_2_00DBF007
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBC19014_2_00DBC190
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB610814_2_00DB6108
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBB32814_2_00DBB328
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBC47014_2_00DBC470
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBC75114_2_00DBC751
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB688014_2_00DB6880
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB985814_2_00DB9858
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB4AD914_2_00DB4AD9
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBCA3114_2_00DBCA31
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBBBD314_2_00DBBBD3
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBBEB014_2_00DBBEB0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBB4F314_2_00DBB4F3
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB357014_2_00DB3570
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBE51714_2_00DBE517
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DBE52814_2_00DBE528
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EBD3814_2_052EBD38
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EA40814_2_052EA408
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E860814_2_052E8608
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052ED67014_2_052ED670
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EB6E814_2_052EB6E8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EC9D814_2_052EC9D8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052ED02814_2_052ED028
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EB0A014_2_052EB0A0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E8B5814_2_052E8B58
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EC38814_2_052EC388
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EAA5814_2_052EAA58
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EBD2814_2_052EBD28
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E0D3914_2_052E0D39
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E0D4814_2_052E0D48
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E7D4814_2_052E7D48
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E7D5814_2_052E7D58
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E85FC14_2_052E85FC
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E443014_2_052E4430
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E74A814_2_052E74A8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E048814_2_052E0488
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E049814_2_052E0498
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E749714_2_052E7497
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E373014_2_052E3730
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E676814_2_052E6768
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E677814_2_052E6778
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E560A14_2_052E560A
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E561814_2_052E5618
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052ED66214_2_052ED662
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E5EB814_2_052E5EB8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E5EC814_2_052E5EC8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EB6D914_2_052EB6D9
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E790014_2_052E7900
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E11A014_2_052E11A0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E81A014_2_052E81A0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E81B014_2_052E81B0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E518A14_2_052E518A
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E519814_2_052E5198
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E119114_2_052E1191
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EC9C814_2_052EC9C8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E000614_2_052E0006
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E280714_2_052E2807
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E281814_2_052E2818
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052ED01814_2_052ED018
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E004014_2_052E0040
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E704014_2_052E7040
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E705014_2_052E7050
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EB08F14_2_052EB08F
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E08E014_2_052E08E0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E08F014_2_052E08F0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E78F014_2_052E78F0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E632014_2_052E6320
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E631214_2_052E6312
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EC37814_2_052EC378
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E33A814_2_052E33A8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E33B814_2_052E33B8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EA3F814_2_052EA3F8
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E6BC114_2_052E6BC1
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E6BD014_2_052E6BD0
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E5A6014_2_052E5A60
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052E5A7014_2_052E5A70
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_052EAA4814_2_052EAA48
            Source: MB267382625AE.exe, 00000000.00000000.2039475377.000000000057A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIgax.exeP vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2078759240.00000000029A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2076762220.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2078759240.00000000029BB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2096098809.0000000008870000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000000.00000002.2085114099.0000000005360000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs MB267382625AE.exe
            Source: MB267382625AE.exe, 00000009.00000002.4506408258.0000000000F37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs MB267382625AE.exe
            Source: MB267382625AE.exeBinary or memory string: OriginalFilenameIgax.exeP vs MB267382625AE.exe
            Source: MB267382625AE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: MB267382625AE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: IFUybmFQxR.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, vxeJg4aQgvbcMODx2c.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, n2yegX5y42BUUl1DTY.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, vxeJg4aQgvbcMODx2c.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@2/2
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:984:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7616:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1276:120:WilError_03
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9D96.tmpJump to behavior
            Source: MB267382625AE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: MB267382625AE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: MB267382625AE.exe, 00000009.00000002.4508378480.0000000002FDF000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F8D000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002FD3000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002FAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F9D000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4512470061.0000000003DE0000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002AB9000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A9B000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: MB267382625AE.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile read: C:\Users\user\Desktop\MB267382625AE.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\MB267382625AE.exe "C:\Users\user\Desktop\MB267382625AE.exe"
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Users\user\Desktop\MB267382625AE.exe "C:\Users\user\Desktop\MB267382625AE.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Users\user\Desktop\MB267382625AE.exe "C:\Users\user\Desktop\MB267382625AE.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rasapi32.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rasman.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rtutils.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: mswsock.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: winhttp.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: iphlpapi.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: dhcpcsvc.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: dnsapi.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: winnsi.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: rasadhlp.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: fwpuclnt.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: secur32.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: schannel.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: mskeyprotect.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ntasn1.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ncrypt.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: ncryptsslp.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeSection loaded: dpapi.dll
            Source: C:\Users\user\Desktop\MB267382625AE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: MB267382625AE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: MB267382625AE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: MB267382625AE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: Igax.pdb source: MB267382625AE.exe, IFUybmFQxR.exe.0.dr
            Source: Binary string: Igax.pdbSHA256z* source: MB267382625AE.exe, IFUybmFQxR.exe.0.dr

            Data Obfuscation

            barindex
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, n2yegX5y42BUUl1DTY.cs.Net Code: UqgYRx6M29 System.Reflection.Assembly.Load(byte[])
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, n2yegX5y42BUUl1DTY.cs.Net Code: UqgYRx6M29 System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB0250 push ebx; ret 14_2_00DB025B
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB030C push edx; ret 14_2_00DB02CB
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeCode function: 14_2_00DB9692 push 00000066h; ret 14_2_00DB9694
            Source: MB267382625AE.exeStatic PE information: section name: .text entropy: 7.932586673627517
            Source: IFUybmFQxR.exe.0.drStatic PE information: section name: .text entropy: 7.932586673627517
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, HbH9XqTNhwGE1rKn6A.csHigh entropy of concatenated method names: 'YNMU7wSln8', 'b1mUGSE8tr', 'zcwUyr5OwL', 'LZOUcWH6E0', 'tQFUHgTRMQ', 'aXtU5hvQgg', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, V6VewC7H71RbhwqpFE.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wlnJkErctw', 'YRpJTJOuN6', 'MN9JzBeRS3', 'wTSdXjB6sj', 'Gu5d3cpNn1', 'z9cdJle3xr', 'bI7dd4D9iZ', 'PxBY3SehRf4rChKCgAS'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, BlwTPnpyKlwDwdUW0I.csHigh entropy of concatenated method names: 'eAnHQFK0Fw', 'nmPHZeHwsA', 'CgKHHmCiW0', 'sTaH8vhrjG', 'R1hHNKSHiK', 'TwsHhd0K8R', 'Dispose', 'rkY1uTxutr', 'hV61Vgo0kG', 'SQN17hyloK'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, R71r4r3Y18vWdki2E1E.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EVgSHqdvVC', 'zoaSUvhRI2', 'mdgS8iEenn', 'gArSSXr5Bn', 'L2NSNMQACm', 'aiXSntKuWG', 'e7aShr0S2C'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, u0jvrvfyGJlUMibBD4.csHigh entropy of concatenated method names: 'gifylf3brE', 'wqeyVydyuZ', 'yopyGSRbmM', 'F1DycCZWnw', 'dXTy5fH4fp', 'B3yGoYqEhS', 'kbqGIpPB2U', 'cwnGpmxxUW', 'iCtGxaYABL', 'L6BGkr4jQk'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, g8XmTqJrMDAG9CXiF5.csHigh entropy of concatenated method names: 'lLTRbLKIe', 'vLli5d1aN', 'fCGqAkjd6', 'tuaDR7t6B', 'N15jUuYDj', 'zO3rRbsEI', 'nEWfTpaca77axQM28f', 'G7kvCfdtdOGIGAcC0M', 'Wtj1Urpvp', 'aEoU3LRkg'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, RH4ds333iUq75vggSKt.csHigh entropy of concatenated method names: 'kk7UT0ZJfn', 'q04UzwUSnF', 'iVS8XKcrhE', 'uXW83K62Ca', 'Wvx8JO34Wb', 'zl48dkklwx', 'CBT8Y6rRDg', 'OQA8la1ftL', 'YQv8upoJvf', 'BxQ8VVNrrw'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, H8lxXnL8St10QUyFKK.csHigh entropy of concatenated method names: 'IC6c6XP9di', 'sgAcKQ2oNR', 'yQccRQkLgX', 'R2EciB2wb8', 'XNIcEKo84N', 'pPacqv61Sl', 'DrJcDwAhia', 'jMjcaCgZn0', 'q5acjcTlA2', 'ADqcrEtBbB'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, OoCsDTIw5Kn6vEJUpO.csHigh entropy of concatenated method names: 'UukZxup4mJ', 'IasZT2N5J6', 'uPQ1XHWEt2', 'NBq13wEalb', 'K1EZCt4Wtl', 'QBoZ0oUTXh', 'nAwZANhZXT', 'xF9ZtLoUyV', 'JgmZ2DNTi0', 'PAvZFTiQla'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, hIthaYrUCuSoiAgjBQ.csHigh entropy of concatenated method names: 'iC1GEbYi4N', 'GeiGDRpiQI', 'C7K7ss084G', 'GWc74m4KiB', 'Be27bXWOOb', 's1v7P0Vb9m', 'RaX7W33IJn', 'eS97M6RsHk', 'e6A7LXScWT', 'JBA7eyeP8A'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, LvHQEWVsNW3vChL5aH.csHigh entropy of concatenated method names: 'Dispose', 'ewD3kwdUW0', 'w0BJB36AYN', 'msLSMcOTsI', 'VDq3TjiYmq', 'Sf43z8dfBK', 'ProcessDialogKey', 'tSnJX6fwck', 'HAmJ3Oqaxp', 'yrsJJsbH9X'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, SBb8EfYlauMeSLlgmG.csHigh entropy of concatenated method names: 'ugN3cxeJg4', 'ogv35bcMOD', 'VIW3m04mfc', 'lum3gc7Ith', 'Qgj3QBQS0j', 'prv3vyGJlU', 'LrW3sny5s5iv2BUQTV', 'dO7ZAUVtk5HLh9CUdw', 'hSI338MKw9', 'x6i3dSWioq'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, ldGS7Vt8a5FituBx1B.csHigh entropy of concatenated method names: 'IhRQej692q', 'qdeQ0kYXTG', 'QgaQt5iWfu', 'x1xQ2bcFdo', 'LaIQBB1Bk3', 'SIRQsL6PpG', 'p7dQ4m8B5r', 'e3EQbY0Em8', 'APsQPAC3Va', 'eaVQWnUA3v'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, ll96AKAtLQ0wX1Vbst.csHigh entropy of concatenated method names: 'zy8OaoA2b4', 'BGyOjHgWbj', 'OUlOfKu1oZ', 'fvtOBRQgv1', 'aoGO4RDfZP', 'OHnObseq9B', 'Et2OWooOFL', 'WlYOM50L1H', 'zZuOenWTTn', 'wenOCOgrXs'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, VTjcuIjIW04mfc9umc.csHigh entropy of concatenated method names: 'RON7iO8ydP', 'YHF7q3bTOa', 'INY7aJpH2X', 'p4l7j3hTM7', 'lGu7QclgcT', 'bmW7vHQZ2P', 'Tvs7Z47kG4', 'ID5710Llix', 'VrE7HkhZWx', 'dKp7UQUn8t'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, tFMqkkFvl9Bn8WttDJ.csHigh entropy of concatenated method names: 'ToString', 'JrCvCHEB9R', 'BjuvBifOnZ', 'ITovs1gJ5l', 'ftYv4VBwVd', 'J8uvbdZRqL', 'yVmvPK3yT1', 'aoAvWPd5s5', 'lqbvM3dmm7', 'Wi6vLnPVE9'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, bpC49bw29DOsSm6RNd.csHigh entropy of concatenated method names: 'xU7ZmE3blF', 'BgZZgoRiGG', 'ToString', 'rMXZuJHOSD', 'XW9ZV7KBhX', 'vn7Z7cCNem', 'U9HZGNDTL6', 'fHiZyyFNX5', 'eWaZcUGyW7', 'yj8Z5Opwse'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, vxeJg4aQgvbcMODx2c.csHigh entropy of concatenated method names: 'pshVtssygV', 'GNkV2KMahA', 'EiCVFquETx', 'FI0Vw7f7vj', 'GH1Vonq8up', 'te3VIp5E4U', 'LyXVpxW6vC', 'NbLVxmqyNA', 'UKlVkCNjp8', 'HxPVTqe6J1'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, n2yegX5y42BUUl1DTY.csHigh entropy of concatenated method names: 'DwbdlCNgaq', 'PiWdu2A2rW', 'gLTdVb6JJT', 's1Bd7LoTJ6', 'Mg5dGshMGa', 'DeRdyGqKQW', 'PnedcYg053', 'rMBd5vrZvr', 'd0Qd9673Zl', 'zmEdmiZ7BF'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, EvJDM9z76BaOI746FU.csHigh entropy of concatenated method names: 'DCnUq0SfZY', 'IICUaRsbR1', 'WhtUj3PEVT', 'SdEUfbZKNf', 'IkvUBqff5s', 'gjaU4kx1wu', 'SgnUbxiKNa', 'N9uUh920Z9', 'IWHU62CIfn', 'zeRUKH1pcy'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, w6fwckksAmOqaxp6rs.csHigh entropy of concatenated method names: 'RrAHfG2ItT', 'lRTHBhuplN', 'poAHsD7Ev7', 'EEyH4D7gFU', 'fVaHbJpPLm', 'vaYHPy2X1g', 'mOHHWv4Xpg', 'aSZHMojBiV', 'si3HLIWO4a', 'SDDHe6HZRU'
            Source: 0.2.MB267382625AE.exe.8870000.5.raw.unpack, BHw1FFWdO443njyZAI.csHigh entropy of concatenated method names: 'm3kcu2orsN', 'zPJc7dGrjp', 'z6Lcyif59D', 'fggyTpDNMY', 'XnnyzOWF3G', 'fjvcX3KLxb', 'zHvc3vHRy0', 'lUgcJH3KE2', 'SdrcdheSXm', 'GplcYmRMeJ'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, HbH9XqTNhwGE1rKn6A.csHigh entropy of concatenated method names: 'YNMU7wSln8', 'b1mUGSE8tr', 'zcwUyr5OwL', 'LZOUcWH6E0', 'tQFUHgTRMQ', 'aXtU5hvQgg', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, V6VewC7H71RbhwqpFE.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wlnJkErctw', 'YRpJTJOuN6', 'MN9JzBeRS3', 'wTSdXjB6sj', 'Gu5d3cpNn1', 'z9cdJle3xr', 'bI7dd4D9iZ', 'PxBY3SehRf4rChKCgAS'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, BlwTPnpyKlwDwdUW0I.csHigh entropy of concatenated method names: 'eAnHQFK0Fw', 'nmPHZeHwsA', 'CgKHHmCiW0', 'sTaH8vhrjG', 'R1hHNKSHiK', 'TwsHhd0K8R', 'Dispose', 'rkY1uTxutr', 'hV61Vgo0kG', 'SQN17hyloK'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, R71r4r3Y18vWdki2E1E.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EVgSHqdvVC', 'zoaSUvhRI2', 'mdgS8iEenn', 'gArSSXr5Bn', 'L2NSNMQACm', 'aiXSntKuWG', 'e7aShr0S2C'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, u0jvrvfyGJlUMibBD4.csHigh entropy of concatenated method names: 'gifylf3brE', 'wqeyVydyuZ', 'yopyGSRbmM', 'F1DycCZWnw', 'dXTy5fH4fp', 'B3yGoYqEhS', 'kbqGIpPB2U', 'cwnGpmxxUW', 'iCtGxaYABL', 'L6BGkr4jQk'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, g8XmTqJrMDAG9CXiF5.csHigh entropy of concatenated method names: 'lLTRbLKIe', 'vLli5d1aN', 'fCGqAkjd6', 'tuaDR7t6B', 'N15jUuYDj', 'zO3rRbsEI', 'nEWfTpaca77axQM28f', 'G7kvCfdtdOGIGAcC0M', 'Wtj1Urpvp', 'aEoU3LRkg'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, RH4ds333iUq75vggSKt.csHigh entropy of concatenated method names: 'kk7UT0ZJfn', 'q04UzwUSnF', 'iVS8XKcrhE', 'uXW83K62Ca', 'Wvx8JO34Wb', 'zl48dkklwx', 'CBT8Y6rRDg', 'OQA8la1ftL', 'YQv8upoJvf', 'BxQ8VVNrrw'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, H8lxXnL8St10QUyFKK.csHigh entropy of concatenated method names: 'IC6c6XP9di', 'sgAcKQ2oNR', 'yQccRQkLgX', 'R2EciB2wb8', 'XNIcEKo84N', 'pPacqv61Sl', 'DrJcDwAhia', 'jMjcaCgZn0', 'q5acjcTlA2', 'ADqcrEtBbB'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, OoCsDTIw5Kn6vEJUpO.csHigh entropy of concatenated method names: 'UukZxup4mJ', 'IasZT2N5J6', 'uPQ1XHWEt2', 'NBq13wEalb', 'K1EZCt4Wtl', 'QBoZ0oUTXh', 'nAwZANhZXT', 'xF9ZtLoUyV', 'JgmZ2DNTi0', 'PAvZFTiQla'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, hIthaYrUCuSoiAgjBQ.csHigh entropy of concatenated method names: 'iC1GEbYi4N', 'GeiGDRpiQI', 'C7K7ss084G', 'GWc74m4KiB', 'Be27bXWOOb', 's1v7P0Vb9m', 'RaX7W33IJn', 'eS97M6RsHk', 'e6A7LXScWT', 'JBA7eyeP8A'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, LvHQEWVsNW3vChL5aH.csHigh entropy of concatenated method names: 'Dispose', 'ewD3kwdUW0', 'w0BJB36AYN', 'msLSMcOTsI', 'VDq3TjiYmq', 'Sf43z8dfBK', 'ProcessDialogKey', 'tSnJX6fwck', 'HAmJ3Oqaxp', 'yrsJJsbH9X'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, SBb8EfYlauMeSLlgmG.csHigh entropy of concatenated method names: 'ugN3cxeJg4', 'ogv35bcMOD', 'VIW3m04mfc', 'lum3gc7Ith', 'Qgj3QBQS0j', 'prv3vyGJlU', 'LrW3sny5s5iv2BUQTV', 'dO7ZAUVtk5HLh9CUdw', 'hSI338MKw9', 'x6i3dSWioq'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, ldGS7Vt8a5FituBx1B.csHigh entropy of concatenated method names: 'IhRQej692q', 'qdeQ0kYXTG', 'QgaQt5iWfu', 'x1xQ2bcFdo', 'LaIQBB1Bk3', 'SIRQsL6PpG', 'p7dQ4m8B5r', 'e3EQbY0Em8', 'APsQPAC3Va', 'eaVQWnUA3v'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, ll96AKAtLQ0wX1Vbst.csHigh entropy of concatenated method names: 'zy8OaoA2b4', 'BGyOjHgWbj', 'OUlOfKu1oZ', 'fvtOBRQgv1', 'aoGO4RDfZP', 'OHnObseq9B', 'Et2OWooOFL', 'WlYOM50L1H', 'zZuOenWTTn', 'wenOCOgrXs'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, VTjcuIjIW04mfc9umc.csHigh entropy of concatenated method names: 'RON7iO8ydP', 'YHF7q3bTOa', 'INY7aJpH2X', 'p4l7j3hTM7', 'lGu7QclgcT', 'bmW7vHQZ2P', 'Tvs7Z47kG4', 'ID5710Llix', 'VrE7HkhZWx', 'dKp7UQUn8t'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, tFMqkkFvl9Bn8WttDJ.csHigh entropy of concatenated method names: 'ToString', 'JrCvCHEB9R', 'BjuvBifOnZ', 'ITovs1gJ5l', 'ftYv4VBwVd', 'J8uvbdZRqL', 'yVmvPK3yT1', 'aoAvWPd5s5', 'lqbvM3dmm7', 'Wi6vLnPVE9'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, bpC49bw29DOsSm6RNd.csHigh entropy of concatenated method names: 'xU7ZmE3blF', 'BgZZgoRiGG', 'ToString', 'rMXZuJHOSD', 'XW9ZV7KBhX', 'vn7Z7cCNem', 'U9HZGNDTL6', 'fHiZyyFNX5', 'eWaZcUGyW7', 'yj8Z5Opwse'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, vxeJg4aQgvbcMODx2c.csHigh entropy of concatenated method names: 'pshVtssygV', 'GNkV2KMahA', 'EiCVFquETx', 'FI0Vw7f7vj', 'GH1Vonq8up', 'te3VIp5E4U', 'LyXVpxW6vC', 'NbLVxmqyNA', 'UKlVkCNjp8', 'HxPVTqe6J1'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, n2yegX5y42BUUl1DTY.csHigh entropy of concatenated method names: 'DwbdlCNgaq', 'PiWdu2A2rW', 'gLTdVb6JJT', 's1Bd7LoTJ6', 'Mg5dGshMGa', 'DeRdyGqKQW', 'PnedcYg053', 'rMBd5vrZvr', 'd0Qd9673Zl', 'zmEdmiZ7BF'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, EvJDM9z76BaOI746FU.csHigh entropy of concatenated method names: 'DCnUq0SfZY', 'IICUaRsbR1', 'WhtUj3PEVT', 'SdEUfbZKNf', 'IkvUBqff5s', 'gjaU4kx1wu', 'SgnUbxiKNa', 'N9uUh920Z9', 'IWHU62CIfn', 'zeRUKH1pcy'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, w6fwckksAmOqaxp6rs.csHigh entropy of concatenated method names: 'RrAHfG2ItT', 'lRTHBhuplN', 'poAHsD7Ev7', 'EEyH4D7gFU', 'fVaHbJpPLm', 'vaYHPy2X1g', 'mOHHWv4Xpg', 'aSZHMojBiV', 'si3HLIWO4a', 'SDDHe6HZRU'
            Source: 0.2.MB267382625AE.exe.3bb3690.3.raw.unpack, BHw1FFWdO443njyZAI.csHigh entropy of concatenated method names: 'm3kcu2orsN', 'zPJc7dGrjp', 'z6Lcyif59D', 'fggyTpDNMY', 'XnnyzOWF3G', 'fjvcX3KLxb', 'zHvc3vHRy0', 'lUgcJH3KE2', 'SdrcdheSXm', 'GplcYmRMeJ'
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: IFUybmFQxR.exe PID: 7404, type: MEMORYSTR
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: EA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 89E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 99E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 9BE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: ABE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: 4D50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 8C70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 9C70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 9E60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: AE60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: DB0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 2860000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory allocated: 4860000 memory reserve | memory write watch
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599643Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599516Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599285Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599156Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599047Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598937Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598828Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598719Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598391Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598279Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598172Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598062Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597184Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596968Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596853Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596515Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596291Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595185Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594641Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599871
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599765
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599656
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599437
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599328
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599218
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599109
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599000
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598890
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598781
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598672
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598437
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598328
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598219
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598094
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597983
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597874
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597765
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597656
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597423
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597297
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597187
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597078
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596969
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596854
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596735
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596625
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596516
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596391
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596266
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596156
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596029
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595921
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595812
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595701
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595594
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595484
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595360
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595234
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595125
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595005
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594890
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594760
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594641
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594516
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594391
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7175Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 442Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6836Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeWindow / User API: threadDelayed 4528Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeWindow / User API: threadDelayed 5319Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeWindow / User API: threadDelayed 2536
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeWindow / User API: threadDelayed 7318
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 6504Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6204Thread sleep count: 7175 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep time: -7378697629483816s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7176Thread sleep count: 442 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7356Thread sleep time: -5534023222112862s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7308Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7456Thread sleep count: 4528 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7456Thread sleep count: 5319 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599643s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599285s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -599047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598279s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -598062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597184s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -597078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596968s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596853s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596291s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595185s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -594969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -594750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -594641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exe TID: 7440Thread sleep time: -594531s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7552Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep count: 33 > 30
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -30437127721620741s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -600000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599871s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7744Thread sleep count: 2536 > 30
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7744Thread sleep count: 7318 > 30
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599765s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599656s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599547s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599437s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599328s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599218s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599109s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -599000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598890s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598781s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598672s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598547s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598437s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598328s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598219s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -598094s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597983s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597874s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597765s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597656s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597547s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597423s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597297s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597187s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -597078s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596969s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596854s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596735s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596625s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596516s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596391s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596266s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596156s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -596029s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595921s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595812s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595701s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595594s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595484s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595360s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595234s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595125s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -595005s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -594890s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -594760s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -594641s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -594516s >= -30000s
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe TID: 7740Thread sleep time: -594391s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599643Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599516Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599285Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599156Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 599047Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598937Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598828Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598719Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598391Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598279Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598172Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 598062Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597184Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596968Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596853Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596515Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596291Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595185Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594641Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599871
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599765
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599656
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599437
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599328
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599218
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599109
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 599000
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598890
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598781
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598672
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598437
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598328
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598219
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 598094
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597983
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597874
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597765
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597656
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597547
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597423
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597297
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597187
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 597078
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596969
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596854
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596735
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596625
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596516
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596391
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596266
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596156
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 596029
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595921
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595812
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595701
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595594
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595484
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595360
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595234
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595125
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 595005
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594890
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594760
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594641
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594516
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeThread delayed: delay time: 594391
            Source: IFUybmFQxR.exe, 0000000E.00000002.4506562336.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
            Source: MB267382625AE.exe, 00000009.00000002.4506631789.0000000001236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeMemory written: C:\Users\user\Desktop\MB267382625AE.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeMemory written: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeProcess created: C:\Users\user\Desktop\MB267382625AE.exe "C:\Users\user\Desktop\MB267382625AE.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeProcess created: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Users\user\Desktop\MB267382625AE.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Users\user\Desktop\MB267382625AE.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\MB267382625AE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4509401972.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4508378480.0000000002F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: IFUybmFQxR.exe PID: 7656, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\MB267382625AE.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\MB267382625AE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
            Source: C:\Users\user\AppData\Roaming\IFUybmFQxR.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: IFUybmFQxR.exe PID: 7656, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b6f290.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MB267382625AE.exe.3b4e870.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4509401972.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4508378480.0000000002F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MB267382625AE.exe PID: 7268, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: IFUybmFQxR.exe PID: 7656, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Query Registry
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory11
            Security Software Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc Filesystem13
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559137 Sample: MB267382625AE.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 50 reallyfreegeoip.org 2->50 52 checkip.dyndns.org 2->52 54 checkip.dyndns.com 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Sigma detected: Scheduled temp file as task from temp location 2->60 64 8 other signatures 2->64 8 MB267382625AE.exe 7 2->8         started        12 IFUybmFQxR.exe 5 2->12         started        signatures3 62 Tries to detect the country of the analysis system (by using the IP) 50->62 process4 file5 38 C:\Users\user\AppData\...\IFUybmFQxR.exe, PE32 8->38 dropped 40 C:\Users\...\IFUybmFQxR.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp9D96.tmp, XML 8->42 dropped 44 C:\Users\user\...\MB267382625AE.exe.log, ASCII 8->44 dropped 66 Uses schtasks.exe or at.exe to add and modify task schedules 8->66 68 Adds a directory exclusion to Windows Defender 8->68 70 Injects a PE file into a foreign processes 8->70 14 powershell.exe 23 8->14         started        17 MB267382625AE.exe 15 2 8->17         started        20 powershell.exe 22 8->20         started        22 schtasks.exe 1 8->22         started        72 Multi AV Scanner detection for dropped file 12->72 74 Machine Learning detection for dropped file 12->74 24 IFUybmFQxR.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 76 Loading BitLocker PowerShell Module 14->76 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 checkip.dyndns.com 158.101.44.242, 49707, 49711, 49714 ORACLE-BMC-31898US United States 17->46 48 reallyfreegeoip.org 188.114.96.3, 443, 49708, 49710 CLOUDFLARENETUS European Union 17->48 32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        78 Tries to steal Mail credentials (via file / registry access) 24->78 80 Tries to harvest and steal browser information (history, passwords, etc) 24->80 36 conhost.exe 26->36         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MB267382625AE.exe66%ReversingLabsWin32.Trojan.SnakeStealer
            MB267382625AE.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\IFUybmFQxR.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\IFUybmFQxR.exe66%ReversingLabsWin32.Trojan.SnakeStealer
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            188.114.96.3
            truefalse
              high
              checkip.dyndns.com
              158.101.44.242
              truefalse
                high
                checkip.dyndns.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                    high
                    https://reallyfreegeoip.org/xml/8.46.123.75false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.orgMB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E57000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.orgMB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029F0000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000291B000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comMB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMB267382625AE.exe, 00000000.00000002.2078759240.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000A.00000002.2131633671.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.ResourcesMB267382625AE.exe, IFUybmFQxR.exe.0.drfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.75$MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E57000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000296A000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.org/qMB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgMB267382625AE.exe, 00000009.00000002.4508378480.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002F0F000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.000000000293F000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002A10000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/MB267382625AE.exe, 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MB267382625AE.exe, 00000009.00000002.4508378480.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, IFUybmFQxR.exe, 0000000E.00000002.4509401972.0000000002927000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        188.114.96.3
                                        reallyfreegeoip.orgEuropean Union
                                        13335CLOUDFLARENETUSfalse
                                        158.101.44.242
                                        checkip.dyndns.comUnited States
                                        31898ORACLE-BMC-31898USfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1559137
                                        Start date and time:2024-11-20 08:22:16 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 9m 7s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:17
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:MB267382625AE.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@19/15@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 453
                                        • Number of non-executed functions: 18
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target IFUybmFQxR.exe, PID 7656 because it is empty
                                        • Execution Graph export aborted for target MB267382625AE.exe, PID 7268 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        • VT rate limit hit for: MB267382625AE.exe
                                        TimeTypeDescription
                                        02:23:07API Interceptor8141293x Sleep call for process: MB267382625AE.exe modified
                                        02:23:10API Interceptor38x Sleep call for process: powershell.exe modified
                                        02:23:13API Interceptor5467877x Sleep call for process: IFUybmFQxR.exe modified
                                        08:23:12Task SchedulerRun new task: IFUybmFQxR path: C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        188.114.96.3QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • filetransfer.io/data-package/I7fmQg9d/download
                                        need quotations.exeGet hashmaliciousFormBookBrowse
                                        • www.rtpwslot888gol.sbs/jmkz/
                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • filetransfer.io/data-package/Bh1Kj4RD/download
                                        http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                        • kklk16.bsyo45ksda.top/favicon.ico
                                        QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/XrlEIxYp/download
                                        QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/XrlEIxYp/download
                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • filetransfer.io/data-package/7pdXjNKP/download
                                        gusetup.exeGet hashmaliciousUnknownBrowse
                                        • go.glarysoft.com/g/t/releasenotes/cn/10000/s/Glary%20Utilities/v/6.16.0.20
                                        BlgAsBdkiD.exeGet hashmaliciousFormBookBrowse
                                        • www.vrxlzluy.shop/d8g5/
                                        Facebook_Advertiser_Position_Description.lnkGet hashmaliciousDucktailBrowse
                                        • gmtagency.online/api/check
                                        158.101.44.242Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        PROFORMA + PENDENTES.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        PO-000041522.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Revised invoice.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 11-18-2024_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        PayeeAdvice_HK54912_R0038704_37504.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        CloudServices.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgQuote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                        • 188.114.96.3
                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        Kayla Dennis CV.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        checkip.dyndns.comQuote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                        • 132.226.247.73
                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                        • 132.226.247.73
                                        REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                        • 132.226.247.73
                                        Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Company catalog profile.exeGet hashmaliciousMassLogger RATBrowse
                                        • 132.226.247.73
                                        Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                        • 132.226.8.169
                                        Quote GVSE24-00815.exeGet hashmaliciousMassLogger RATBrowse
                                        • 132.226.247.73
                                        Payment_transaction.exeGet hashmaliciousMassLogger RATBrowse
                                        • 132.226.247.73
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSfile.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                        • 188.114.96.3
                                        Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                        • 188.114.96.3
                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        Delivery_Notification_00000875664.doc.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        MyInstaller_PDFGear.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.29
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 188.114.97.3
                                        Towered.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 188.114.96.3
                                        ce.vbsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        ORACLE-BMC-31898USQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        Company catalog profile.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        Quote GVSE24-00815.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        Payment_transaction.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        nowe zam#U00f3wienie.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        owari.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 129.146.156.151
                                        P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9adQuote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                        • 188.114.96.3
                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        Benefit Enrollment -wZ5nusm.pdfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        Kayla Dennis CV.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\Desktop\MB267382625AE.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.379633281639906
                                        Encrypted:false
                                        SSDEEP:48:BWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMugei/ZM0Uyus:BLHxvCZfIfSKRHmOugA1s
                                        MD5:CC5B50A5C09E0B5BC47423B60D7D0114
                                        SHA1:1E120D6B635A4B6F99AC093B997049284231A1EC
                                        SHA-256:AD6B260B29F3E753C3BC4E8298079016E2B630505AF57CDF1A9CE724642636D2
                                        SHA-512:7182C078758CDE37B860CF4EE1221C325D605F49C27F16F1102166143C1861F1BB03A38E7CAEB3B78460A38222374C2C75DFA157FB90F08CA0AA02CADB78F148
                                        Malicious:false
                                        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\MB267382625AE.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1583
                                        Entropy (8bit):5.1084165659008125
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtxxvn:cgergYrFdOFzOzN33ODOiDdKrsuT3v
                                        MD5:4C85953729F533151933CDEC6AB00D49
                                        SHA1:6A52700B5131740A4A165677A67F3C3F325FA3F6
                                        SHA-256:889838AED15F8C8585E6D35ACAA84273535CD0E1EE04B9A8C991C99D10D06A1C
                                        SHA-512:2CF3556FF89665C2568F3218973ACE270EA496CD65B80AC223786D3CF49E8BA0DD3202C4E69842BF43E42CE25409D387F505D436671EB1FF7C3FCD7C98626634
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                        Process:C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1583
                                        Entropy (8bit):5.1084165659008125
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtxxvn:cgergYrFdOFzOzN33ODOiDdKrsuT3v
                                        MD5:4C85953729F533151933CDEC6AB00D49
                                        SHA1:6A52700B5131740A4A165677A67F3C3F325FA3F6
                                        SHA-256:889838AED15F8C8585E6D35ACAA84273535CD0E1EE04B9A8C991C99D10D06A1C
                                        SHA-512:2CF3556FF89665C2568F3218973ACE270EA496CD65B80AC223786D3CF49E8BA0DD3202C4E69842BF43E42CE25409D387F505D436671EB1FF7C3FCD7C98626634
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                        Process:C:\Users\user\Desktop\MB267382625AE.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):555520
                                        Entropy (8bit):7.92172183843737
                                        Encrypted:false
                                        SSDEEP:12288:jao7oKJ3A0bKPXubDq+YRvHpkGN6l2lH4Wp0QEqvfjULr4nI:+o7oq3rbDqzBNNeq/LULr4
                                        MD5:30CFD90585ED8D00C8F6507409BEFF00
                                        SHA1:6AB2AA9CCA85D4CDA78DA92336D7C0C5939A44C2
                                        SHA-256:50603D9481C76AC7052A18320666F9206F6729C78FDB779C0E7010952EAEDE26
                                        SHA-512:492500EC44B30342E0B51089FFF9067C79DE7F835DB8B001D7ABC613A09BF367302509B2D35B457A9A493A9A12F06F4E7C59B34AD3C2BE3E7A403A965A5CF8E6
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 66%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W5<g..............0..n............... ........@.. ....................................@.................................@...O.......L...........................@l..T............................................ ............... ..H............text....m... ...n.................. ..`.rsrc...L............p..............@..@.reloc...............x..............@..B................t.......H........}...O......i.......8............................................0..$..........s......s.....s ......o!...&..+..*.0..)........s\....s.......o[...s......o".......+...*....0..+........s\....r...p.(#......o[...s......o$....+..*..0..0........s\....rC..p.r...p(%......o[...s......o$....+..*.0...........s\.......O...%.r...p.%...%.r...p.%...%.r...p.%....%.r!..p.%....%.r;..p.%.....%..rU..p.%.....%..ry..p.%....%..r...p.(&......o[...s.......o$...&r...p('...&......o(...('...&...*.
                                        Process:C:\Users\user\Desktop\MB267382625AE.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.92172183843737
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:MB267382625AE.exe
                                        File size:555'520 bytes
                                        MD5:30cfd90585ed8d00c8f6507409beff00
                                        SHA1:6ab2aa9cca85d4cda78da92336d7c0c5939a44c2
                                        SHA256:50603d9481c76ac7052a18320666f9206f6729c78fdb779c0e7010952eaede26
                                        SHA512:492500ec44b30342e0b51089fff9067c79de7f835db8b001d7abc613a09bf367302509b2d35b457a9a493a9a12f06f4e7c59b34ad3c2be3e7a403a965a5cf8e6
                                        SSDEEP:12288:jao7oKJ3A0bKPXubDq+YRvHpkGN6l2lH4Wp0QEqvfjULr4nI:+o7oq3rbDqzBNNeq/LULr4
                                        TLSH:A7C4125462D89FAAC07D6BF57136704123F23B6A2C30E79E1FC351EE192AF405A61B27
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W5<g..............0..n............... ........@.. ....................................@................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x488d92
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x673C3557 [Tue Nov 19 06:51:03 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x88d400x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x64c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x86c400x54.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x86d980x86e0083c20df7f42fdb5343020d32417a11a4False0.9469017898517146data7.932586673627517IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x8a0000x64c0x800414ea4e92cb7071d990ba6b5aff908f7False0.3427734375data3.5096726804895826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x8c0000xc0x20070bffe2a9dc99ea09667a38198e73799False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x8a0900x3bcdata0.4131799163179916
                                        RT_MANIFEST0x8a45c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-11-20T08:23:11.990318+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707158.101.44.24280TCP
                                        2024-11-20T08:23:13.291037+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707158.101.44.24280TCP
                                        2024-11-20T08:23:13.830995+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549710188.114.96.3443TCP
                                        2024-11-20T08:23:15.337913+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711158.101.44.24280TCP
                                        2024-11-20T08:23:15.940003+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549713188.114.96.3443TCP
                                        2024-11-20T08:23:17.087900+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549715158.101.44.24280TCP
                                        2024-11-20T08:23:17.145731+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549716188.114.96.3443TCP
                                        2024-11-20T08:23:17.962907+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549715158.101.44.24280TCP
                                        2024-11-20T08:23:18.704923+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549720188.114.96.3443TCP
                                        2024-11-20T08:23:19.337918+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549722158.101.44.24280TCP
                                        2024-11-20T08:23:19.533513+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549723188.114.96.3443TCP
                                        2024-11-20T08:23:19.887710+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549724188.114.96.3443TCP
                                        2024-11-20T08:23:20.767415+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549727188.114.96.3443TCP
                                        2024-11-20T08:23:21.059785+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549728188.114.96.3443TCP
                                        2024-11-20T08:23:23.420811+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549734188.114.96.3443TCP
                                        2024-11-20T08:23:24.619226+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549739188.114.96.3443TCP
                                        2024-11-20T08:23:25.848497+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549744188.114.96.3443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 20, 2024 08:23:11.132493019 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:11.137538910 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:11.137620926 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:11.137868881 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:11.142940998 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:11.702683926 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:11.708492994 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:11.713402987 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:11.862377882 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:11.990318060 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:12.089791059 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:12.089860916 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:12.287343025 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.287398100 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:12.287739038 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.372324944 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.372351885 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:12.833935976 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:12.834014893 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.840504885 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.840531111 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:12.840825081 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:12.902107000 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:12.943330050 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.010873079 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.011029005 CET44349708188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.011142969 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.018094063 CET49708443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.063291073 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.068500042 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:13.217792988 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:13.224630117 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.224673986 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.225002050 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.225002050 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.225044966 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.291037083 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.680429935 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.682988882 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.683018923 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.831018925 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.831075907 CET44349710188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:13.831219912 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.831675053 CET49710443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:13.835295916 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.836626053 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.840945005 CET8049707158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:13.841006041 CET4970780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.842214108 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:13.842319012 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.842459917 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:13.847354889 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.337470055 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.337860107 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.337913036 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.338268995 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.338413954 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.339181900 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.339231014 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.339358091 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.339401960 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.339601040 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.340321064 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.340332031 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.791778088 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.794220924 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.794239998 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.939984083 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.940043926 CET44349713188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:15.940294027 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.940952063 CET49713443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:15.946582079 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.951486111 CET8049714158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:15.951570034 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.951689959 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:15.956502914 CET8049714158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.274007082 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:16.279197931 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.279303074 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:16.279804945 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:16.284714937 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.543719053 CET8049714158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.545108080 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:16.545231104 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:16.545396090 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:16.545731068 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:16.545762062 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:16.681638956 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:16.861310959 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.889425993 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:16.894505024 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:16.999280930 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.001125097 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.001152992 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.047002077 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.087899923 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.093286991 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.093322992 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.094157934 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.098488092 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.098503113 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.145744085 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.145795107 CET44349716188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.146152973 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.146529913 CET49716443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.150264025 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.151104927 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.155540943 CET8049714158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.155615091 CET4971480192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.156384945 CET8049718158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.156461000 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.156553030 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.161356926 CET8049718158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.561703920 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.561784029 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.563689947 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.563699961 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.564076900 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.619136095 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.621956110 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.663337946 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.735683918 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.735841990 CET44349717188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.735922098 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.737833977 CET8049718158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.744266987 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.744317055 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.744384050 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.744714022 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.744725943 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.746380091 CET49717443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.749979973 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.754925966 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.790996075 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:17.908572912 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:17.910814047 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.910851002 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.910934925 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.911398888 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:17.911412954 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:17.962907076 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.213493109 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.215208054 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.215230942 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.341341972 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.341392040 CET44349719188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.341458082 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.342216969 CET49719443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.345701933 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.346975088 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.350897074 CET8049718158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.350960016 CET4971880192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.351939917 CET8049721158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.352015972 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.352102041 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.357096910 CET8049721158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.379710913 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.381436110 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.381457090 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.704957962 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.705033064 CET44349720188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.705080032 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.705549002 CET49720443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.709389925 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.711014986 CET4972280192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.714534044 CET8049715158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.714598894 CET4971580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.715931892 CET8049722158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.716000080 CET4972280192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.716248035 CET4972280192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:18.721051931 CET8049722158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.920943975 CET8049721158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:18.922547102 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.922590971 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.922671080 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.922943115 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:18.922951937 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:18.963354111 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.295169115 CET8049722158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:19.296490908 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.296540022 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.296612978 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.296885014 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.296895981 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.337918043 CET4972280192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.381683111 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.383548975 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.383564949 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.533520937 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.533574104 CET44349723188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.533626080 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.534276009 CET49723443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.538342953 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.539695978 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.543509960 CET8049721158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:19.543575048 CET4972180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.544540882 CET8049725158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:19.544615984 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.544729948 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.549554110 CET8049725158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:19.749931097 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.751710892 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.751739025 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.887712002 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.887769938 CET44349724188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:19.887813091 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.888705969 CET49724443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:19.894717932 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.899584055 CET8049726158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:19.899665117 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.899983883 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:19.904797077 CET8049726158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.151009083 CET8049725158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.152530909 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.152610064 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.152719975 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.153008938 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.153037071 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.197274923 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.467936039 CET8049726158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.477710962 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.477761984 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.477824926 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.478096962 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.478112936 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.509773970 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.635412931 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.637182951 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.637254953 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.767451048 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.767524958 CET44349727188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.767637968 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.768126011 CET49727443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.771595001 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.772830009 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.776971102 CET8049725158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.777308941 CET4972580192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.777638912 CET8049729158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.777915955 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.778014898 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:20.782829046 CET8049729158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:20.932714939 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:20.934665918 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:20.934684992 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.059828043 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.059902906 CET44349728188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.059974909 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.060657024 CET49728443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.064987898 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.066020012 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.070225000 CET8049726158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:21.070341110 CET4972680192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.070926905 CET8049730158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:21.071069002 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.071141958 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.075903893 CET8049730158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:21.353552103 CET8049729158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:21.354934931 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.354979992 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.355052948 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.355324984 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.355341911 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.400384903 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.654684067 CET8049730158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:21.656124115 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.656167030 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.656239033 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.656582117 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.656596899 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.697253942 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:21.821697950 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.824451923 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.824481964 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.971304893 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.971368074 CET44349731188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:21.971427917 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:21.972106934 CET49731443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.116209984 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.118359089 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.118395090 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.257827997 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.258348942 CET44349732188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.258436918 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.258742094 CET49732443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.263298988 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:22.264547110 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:22.268661976 CET8049730158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:22.268727064 CET4973080192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:22.269509077 CET8049733158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:22.269593000 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:22.269685030 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:22.274540901 CET8049733158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:22.833760977 CET8049733158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:22.836067915 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.836153030 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.836600065 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.836601019 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:22.836679935 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:22.884809971 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.293699980 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:23.298132896 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:23.298152924 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:23.420815945 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:23.420866013 CET44349734188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:23.421219110 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:23.422143936 CET49734443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:23.425190926 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.430151939 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.430561066 CET8049733158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:23.431011915 CET4973380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.435255051 CET8049737158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:23.435538054 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.435861111 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:23.440684080 CET8049737158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:23.999094009 CET8049737158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:24.002095938 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.002204895 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.002295017 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.003498077 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.003531933 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.041033030 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.473225117 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.475150108 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.475219011 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.619235039 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.619298935 CET44349739188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:24.619349003 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.619952917 CET49739443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:24.625894070 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.627001047 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.631861925 CET8049743158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:24.632011890 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.632060051 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.633147955 CET8049737158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:24.633289099 CET4973780192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:24.636893034 CET8049743158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:25.216583967 CET8049743158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:23:25.218508005 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:25.218599081 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.218843937 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:25.219332933 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:25.219362020 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.262130976 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:23:25.676739931 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.685127974 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:25.685184002 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.848581076 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.848736048 CET44349744188.114.96.3192.168.2.5
                                        Nov 20, 2024 08:23:25.848896980 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:23:25.849267960 CET49744443192.168.2.5188.114.96.3
                                        Nov 20, 2024 08:24:19.415525913 CET8049711158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:24:19.416146040 CET4971180192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:24:24.295393944 CET8049722158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:24:24.295516014 CET4972280192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:24:26.366740942 CET8049729158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:24:26.366878986 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:24:30.216253042 CET8049743158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:24:30.216990948 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:25:01.369621992 CET4972980192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:25:01.374566078 CET8049729158.101.44.242192.168.2.5
                                        Nov 20, 2024 08:25:05.728213072 CET4974380192.168.2.5158.101.44.242
                                        Nov 20, 2024 08:25:05.733131886 CET8049743158.101.44.242192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 20, 2024 08:23:11.079015017 CET5194953192.168.2.51.1.1.1
                                        Nov 20, 2024 08:23:11.086258888 CET53519491.1.1.1192.168.2.5
                                        Nov 20, 2024 08:23:12.038418055 CET5845153192.168.2.51.1.1.1
                                        Nov 20, 2024 08:23:12.284604073 CET53584511.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 20, 2024 08:23:11.079015017 CET192.168.2.51.1.1.10xbd7aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:12.038418055 CET192.168.2.51.1.1.10xabcStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:11.086258888 CET1.1.1.1192.168.2.50xbd7aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:12.284604073 CET1.1.1.1192.168.2.50xabcNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                        Nov 20, 2024 08:23:12.284604073 CET1.1.1.1192.168.2.50xabcNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549707158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:11.137868881 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:11.702683926 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:11 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: ff9c745c63aaf44a7694b6b23eb1da49
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:11.708492994 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:11.862377882 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:11 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: bbbab224a5a021ac8bfb5da820620bb8
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:12.089791059 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:11 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: bbbab224a5a021ac8bfb5da820620bb8
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:13.063291073 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:13.217792988 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:13 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 2202350157bd7098c4c929c94425bf88
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.549711158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:13.842459917 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:15.337470055 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:14 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0d3182a769b320841ee9e0533dadb9e9
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:15.337860107 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:14 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0d3182a769b320841ee9e0533dadb9e9
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:15.338268995 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:14 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0d3182a769b320841ee9e0533dadb9e9
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:15.339181900 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:14 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0d3182a769b320841ee9e0533dadb9e9
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.549714158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:15.951689959 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:16.543719053 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:16 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 3e305ea045145f514c76de0734ad6f3a
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.549715158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:16.279804945 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:16.861310959 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:16 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1ca978b0a2e9ce68103b326dbe53fdbe
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:16.889425993 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:17.047002077 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:16 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 81dec71d72ade13675a0a7cc67643462
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                        Nov 20, 2024 08:23:17.749979973 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:17.908572912 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:17 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 73d330776d1673340c1acc5b0d5f19fe
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.549718158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:17.156553030 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:17.737833977 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:17 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 69c2b55b02cb3a2e63fca8d39a3ae6bd
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.549721158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:18.352102041 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:18.920943975 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:18 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: dfbb147b00155528935dce28a2b87cd2
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.549722158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:18.716248035 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Nov 20, 2024 08:23:19.295169115 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:19 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 08b3434b7c31897815a5b367218c6e84
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.549725158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:19.544729948 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:20.151009083 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:20 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: c69ebab0ba7c2780b311bc9ab6fee023
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.549726158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:19.899983883 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:20.467936039 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:20 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1997a6d5cbc810aa61489debdb2483fc
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.549729158.101.44.242807268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:20.778014898 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:21.353552103 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:21 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: a57f48a250f2561ca4165a068ff8bf59
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        10192.168.2.549730158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:21.071141958 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:21.654684067 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:21 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: a70e16b3d1c3c6334ec4c317408623a5
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        11192.168.2.549733158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:22.269685030 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:22.833760977 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:22 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: acbafdc1fec6f8c271cdb705e8e56c8e
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        12192.168.2.549737158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:23.435861111 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:23.999094009 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:23 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 4b654be6f1930bd30e20ce8468a19fed
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        13192.168.2.549743158.101.44.242807656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        Nov 20, 2024 08:23:24.632060051 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Nov 20, 2024 08:23:25.216583967 CET320INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:25 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: ee78fc0f56714575c6d917e6c27686e0
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549708188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:12 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-11-20 07:23:13 UTC853INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:12 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51301
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IZd08s47182ByXypE1BYBeSpXZAiU4%2FrhyYHbcVtiG8f8BfZi7Tf%2Bn%2BR2shN3PT%2BjsvmRyuD5g71sNSm%2FvGzxPRWzEpRsxKnvMIwquv4Dtp5qGrF9j7PXlShkV7F0WYihXAhXOrp"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b17df8334332-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1572&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1833019&cwnd=97&unsent_bytes=0&cid=922f994576b10e80&ts=186&x=0"
                                        2024-11-20 07:23:13 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.549710188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:13 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:13 UTC852INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:13 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51302
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uHBSt6cZSJQLvuBxzNl1gahzLp487TCIelo9RXz0hvug%2FtJsS%2FmqqmF4ebEn5qOuHiCixll1fFapL3Q0iLa0bD18DPj31jn%2F0zNiobMy72H3WbhZH7iIUWmqGGcf%2BX9zjWGzHwYr"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b182fdd78c69-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1957&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1437715&cwnd=213&unsent_bytes=0&cid=3e725d147185e0ac&ts=154&x=0"
                                        2024-11-20 07:23:13 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.549713188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:15 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:15 UTC852INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:15 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51304
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=f0%2F6Zzz5Vo6tUb01oKKKJiWB9YQum0hdd6bCInfgn4bAKYb%2FQboK2MXoCWmCNEB5GySr3PN8TqYCnmgICSSGykP5vCY3syd5KLohf4jE2ui%2BT6f%2FzyX86BNdLYDsdspSVKlbFNym"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b190480f41e9-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1755&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1624026&cwnd=248&unsent_bytes=0&cid=592bbb4632fc96d1&ts=152&x=0"
                                        2024-11-20 07:23:15 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.549716188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:16 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:17 UTC848INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:17 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51306
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iDLYALGPszHpLnihu3cfCFONQFK%2FwlY4PqAute5DYhhyucKsEujSd2mL6FbBX13eUzCm8fMi5tV95BH9B0JCHKIQxnKC%2Fj6UNMQwdKmYEqxkCeeBCnPfoeSeilAkdCyDk8NgRUNT"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b197cc7c43f7-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1561&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1805813&cwnd=209&unsent_bytes=0&cid=ec73bacc90af7ef6&ts=150&x=0"
                                        2024-11-20 07:23:17 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.549717188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:17 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-11-20 07:23:17 UTC851INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:17 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51306
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Je50zNrdAJtrukimbBOKhDfIRB8AJJe6aW%2FAKQz2PcaC%2Bw0Dv2l%2FnIcG3uU0LkrFGeGDHheRFk6kgLjUAoK5XoS9BsjDPXM6ED4v6QKQG81xcAeTewb68p%2BlOSJKPPBGwCSbXy3a"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b19b7a605e72-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1966&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=602061&cwnd=186&unsent_bytes=0&cid=b05229ff5318e6ce&ts=183&x=0"
                                        2024-11-20 07:23:17 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.549719188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:18 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-11-20 07:23:18 UTC850INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:18 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51307
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wGoP95dD4IDKHoMs0g3rmwCGD6iQYlYM7unSd4qmZqDv%2FWTstknT11hackJ8WGkkIuZODgL9VYC4djbEmuQY0tTTjfln%2BpVfVhTcL8NMJ8c5Ti6htG9HBameqLfE%2BIDTvWZMrved"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b19f4de45e73-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1746&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1653454&cwnd=242&unsent_bytes=0&cid=a40298433b870560&ts=131&x=0"
                                        2024-11-20 07:23:18 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.549720188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:18 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:18 UTC848INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:18 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51307
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AIVcSbH8umQyG%2BmnVlButfXvvXNZBYWIsRSN9bFGRapgCiQB2HBAbBh8dFICIojB1IyG6NRvRrRvH4xwTVElKog3FocVfBFnwC0jjDUtfTjTKMMkWkY2qbx8mZGwzR4LDp%2F62QvL"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1a07a6c8ccd-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1777&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1596500&cwnd=204&unsent_bytes=0&cid=8a2f6674a46ecced&ts=159&x=0"
                                        2024-11-20 07:23:18 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.549723188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:19 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:19 UTC852INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:19 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51308
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KLWOFPHsEX%2BpQTZTDYq3ZT0KOaUmkgheRE2Auafitk6ftIiIBmLN7Iig7IT22o7hCgbYelcLFhyDnrJWdbdPN5xjUDHT43eds%2BVL5ihP%2BUQ9ETR1v4ng7wTvx2%2BLMmeI0Pmdoc4s"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1a6bf1d8c1d-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=2201&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1477732&cwnd=173&unsent_bytes=0&cid=90bfee7b2c87fd6b&ts=154&x=0"
                                        2024-11-20 07:23:19 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.549724188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:19 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:19 UTC848INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:19 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51308
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ieXygAefKfTTD3EiaCzqWalRAa6isYH4RB55sL0dbUriABMXHLRrub2foew8g2NYkePPuxyHz8145a01kcXhCfGsZG1%2B0rZCXZgrMt6t3gYvAlD13qA9iwlfeoAGbW%2B5juOF3b6D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1a8ec164261-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=2158&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1318879&cwnd=237&unsent_bytes=0&cid=f21ca96a1cebb5b4&ts=141&x=0"
                                        2024-11-20 07:23:19 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.549727188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:20 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:20 UTC858INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:20 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51309
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N79%2BUy9SgeJpMBN2EF6flpF0H3pYfFbHAquyL2teB5Z84j6R0jusgqRh14hisZhJa6j8%2BKFTloPxolzn6g3VIIATGmYtlh%2BX%2Fe17xOlXRnvTheu7zadnV6oFiAUEx%2Bk%2BN%2BJTfCTp"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1ae6f6780d9-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1465&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1918528&cwnd=252&unsent_bytes=0&cid=2dce9d09ef4df24c&ts=144&x=0"
                                        2024-11-20 07:23:20 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        10192.168.2.549728188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:20 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:21 UTC850INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:21 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51310
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wfev9OOdANzkCgpIIgPanqx72vAIoDZI6o2vtHflt1HVUOH8hWFVhYg%2Bogvsv32bZeHs0Byk4a6%2F4XCHGxHdYY1J2h2MqjTXRrMDxlDa4zBtn%2FVsdC5eVXCewkvjSpN8sKlTe4Z9"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1b04c994205-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1684&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1683967&cwnd=252&unsent_bytes=0&cid=598543db5f4cb2e5&ts=132&x=0"
                                        2024-11-20 07:23:21 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        11192.168.2.549731188.114.96.34437268C:\Users\user\Desktop\MB267382625AE.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:21 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-11-20 07:23:21 UTC848INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:21 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51310
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QjS0IsC4h1iMgpK6tuB8QXu2oPqFT%2F0JCDTbWW1jZ8qmAi5eDXf22sZi0e2lNkbiwVGYIYqdLbSTE69EeE2iobk7ixmkql2%2Beo1aofmPJ58FIWWYOepEWT7RvxJw001oLW9GYHn2"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1b5ec0d6a59-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1757&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1655328&cwnd=244&unsent_bytes=0&cid=456bccbb0f014ee2&ts=159&x=0"
                                        2024-11-20 07:23:21 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        12192.168.2.549732188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:22 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-11-20 07:23:22 UTC852INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:22 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51311
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sSdGcZP99jA2lJZSX0npCmEp3BAz4cJz%2F9LGvaxuPhGqYog9gULYP8nfJ2AjwZTEqiMUmIQxIjbBa0VeOZzTuV%2BRkJ4%2BFNCT4sdq1jBIvfB76%2FhkNDRkvrBB9WDEJSZGMoyiNt6N"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1b7a8350f7d-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1521&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1923583&cwnd=235&unsent_bytes=0&cid=e21722952b413033&ts=139&x=0"
                                        2024-11-20 07:23:22 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        13192.168.2.549734188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:23 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:23 UTC856INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:23 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51312
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hlzr48XoiT1L2UNGF6CdW%2B9bfW42GMf4qx%2Bi9n5lFd8vd76Oegq5leebgRjGLV4yoaFD%2FXCpiAvS6%2Fz5DXLZ%2FhEAfxSG%2FW5e6ng0WefrSUVTuJ868m11bHmrSJaErrCNU2TMYByN"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1bf0b6a8c59-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1995&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1441975&cwnd=190&unsent_bytes=0&cid=21cfe01dfd940cba&ts=130&x=0"
                                        2024-11-20 07:23:23 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        14192.168.2.549739188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:24 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:24 UTC850INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:24 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51313
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=T4yficoYTbIpptvUJapdwlHPJorwynPBxTcaSPu2PrPYcOzIt%2BY%2B3AzA95l6h5ULrOR845ZWoyOUcn38DEj40%2FEdFJxCiOclaFLPwCtC5NBCfXzkGlVHKbDTzBXRr7lnItndEY4M"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1c68f4f188d-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1507&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1946666&cwnd=156&unsent_bytes=0&cid=5cbe27d8a52462c4&ts=155&x=0"
                                        2024-11-20 07:23:24 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        15192.168.2.549744188.114.96.34437656C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-20 07:23:25 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-11-20 07:23:25 UTC848INHTTP/1.1 200 OK
                                        Date: Wed, 20 Nov 2024 07:23:25 GMT
                                        Content-Type: text/xml
                                        Content-Length: 361
                                        Connection: close
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 51314
                                        Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zq8U8CsVYHYy8P%2BKsz3uR1X5h01KGXqgjMgKks9XF8PvYKuvQKs5o4DhxnTR8cZmNMk8H%2FYOdhG6VsybmUlkrw2mcsFjwH7aM3R1zYXEVK4Xfd692ODYXQPVHT3fyIKsakaxgr0x"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8e56b1ce0c59428b-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1682&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1680092&cwnd=233&unsent_bytes=0&cid=ea0feb88bbb0cf62&ts=177&x=0"
                                        2024-11-20 07:23:25 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                        Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:02:23:06
                                        Start date:20/11/2024
                                        Path:C:\Users\user\Desktop\MB267382625AE.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\MB267382625AE.exe"
                                        Imagebase:0x4f0000
                                        File size:555'520 bytes
                                        MD5 hash:30CFD90585ED8D00C8F6507409BEFF00
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2079311754.00000000039A9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"
                                        Imagebase:0xbf0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
                                        Imagebase:0xbf0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"
                                        Imagebase:0xe80000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:02:23:09
                                        Start date:20/11/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:02:23:10
                                        Start date:20/11/2024
                                        Path:C:\Users\user\Desktop\MB267382625AE.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\MB267382625AE.exe"
                                        Imagebase:0xb10000
                                        File size:555'520 bytes
                                        MD5 hash:30CFD90585ED8D00C8F6507409BEFF00
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000009.00000002.4506260157.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4508378480.0000000002F1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4508378480.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:10
                                        Start time:02:23:12
                                        Start date:20/11/2024
                                        Path:C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        Imagebase:0xce0000
                                        File size:555'520 bytes
                                        MD5 hash:30CFD90585ED8D00C8F6507409BEFF00
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 66%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:02:23:12
                                        Start date:20/11/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff6ef0c0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:02:23:15
                                        Start date:20/11/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp"
                                        Imagebase:0xe80000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:13
                                        Start time:02:23:15
                                        Start date:20/11/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:14
                                        Start time:02:23:15
                                        Start date:20/11/2024
                                        Path:C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
                                        Imagebase:0x4c0000
                                        File size:555'520 bytes
                                        MD5 hash:30CFD90585ED8D00C8F6507409BEFF00
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.4509401972.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.4509401972.0000000002861000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:10.2%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:171
                                          Total number of Limit Nodes:9
                                          execution_graph 32355 ea4668 32356 ea467a 32355->32356 32357 ea4686 32356->32357 32361 ea4779 32356->32361 32366 ea3e34 32357->32366 32359 ea46a5 32362 ea479d 32361->32362 32370 ea4888 32362->32370 32374 ea4879 32362->32374 32367 ea3e3f 32366->32367 32382 ea5c44 32367->32382 32369 ea7018 32369->32359 32372 ea48af 32370->32372 32371 ea498c 32372->32371 32378 ea44b4 32372->32378 32375 ea48af 32374->32375 32376 ea498c 32375->32376 32377 ea44b4 CreateActCtxA 32375->32377 32376->32376 32377->32376 32379 ea5918 CreateActCtxA 32378->32379 32381 ea59db 32379->32381 32381->32381 32383 ea5c4f 32382->32383 32386 ea5c64 32383->32386 32385 ea70bd 32385->32369 32387 ea5c6f 32386->32387 32390 ea5c94 32387->32390 32389 ea719a 32389->32385 32391 ea5c9f 32390->32391 32394 ea5cc4 32391->32394 32393 ea728d 32393->32389 32395 ea5ccf 32394->32395 32396 ea858b 32395->32396 32400 eaac3a 32395->32400 32397 ea85c9 32396->32397 32404 eacd37 32396->32404 32397->32393 32409 eaac5f 32400->32409 32413 eaac70 32400->32413 32401 eaac4e 32401->32396 32405 eacd59 32404->32405 32406 eacd7d 32405->32406 32421 eacee8 32405->32421 32425 eacee7 32405->32425 32406->32397 32410 eaac70 32409->32410 32416 eaad68 32410->32416 32411 eaac7f 32411->32401 32415 eaad68 GetModuleHandleW 32413->32415 32414 eaac7f 32414->32401 32415->32414 32417 eaad9c 32416->32417 32418 eaad79 32416->32418 32417->32411 32418->32417 32419 eaafa0 GetModuleHandleW 32418->32419 32420 eaafcd 32419->32420 32420->32411 32422 eacef5 32421->32422 32423 eacf2f 32422->32423 32429 eabaa0 32422->32429 32423->32406 32426 eacef5 32425->32426 32427 eacf2f 32426->32427 32428 eabaa0 GetModuleHandleW 32426->32428 32427->32406 32428->32427 32430 eabaab 32429->32430 32431 eadc48 32430->32431 32433 ead29c 32430->32433 32434 ead2a7 32433->32434 32435 ea5cc4 GetModuleHandleW 32434->32435 32436 eadcb7 32435->32436 32436->32431 32437 6fc4d68 32438 6fc4d8e 32437->32438 32439 6fc4ef3 32437->32439 32438->32439 32441 6fc4fe8 PostMessageW 32438->32441 32442 6fc5054 32441->32442 32442->32438 32443 ead000 32444 ead046 GetCurrentProcess 32443->32444 32446 ead098 GetCurrentThread 32444->32446 32447 ead091 32444->32447 32448 ead0ce 32446->32448 32449 ead0d5 GetCurrentProcess 32446->32449 32447->32446 32448->32449 32452 ead10b 32449->32452 32450 ead133 GetCurrentThreadId 32451 ead164 32450->32451 32452->32450 32585 ead650 DuplicateHandle 32586 ead6e6 32585->32586 32453 6fc1713 32456 6fc3c00 32453->32456 32457 6fc3c1a 32456->32457 32473 6fc41bf 32457->32473 32478 6fc4323 32457->32478 32483 6fc416a 32457->32483 32487 6fc450f 32457->32487 32490 6fc44cf 32457->32490 32497 6fc45ec 32457->32497 32501 6fc410c 32457->32501 32509 6fc4091 32457->32509 32514 6fc4050 32457->32514 32518 6fc3ff7 32457->32518 32523 6fc40b7 32457->32523 32527 6fc4796 32457->32527 32532 6fc4356 32457->32532 32536 6fc411f 32457->32536 32458 6fc1722 32474 6fc41e8 32473->32474 32475 6fc49a2 32474->32475 32541 6fc0f38 32474->32541 32545 6fc0f30 32474->32545 32479 6fc41e8 32478->32479 32479->32478 32480 6fc49a2 32479->32480 32481 6fc0f38 WriteProcessMemory 32479->32481 32482 6fc0f30 WriteProcessMemory 32479->32482 32481->32479 32482->32479 32484 6fc4059 32483->32484 32485 6fc4242 32484->32485 32549 6fc1028 32484->32549 32485->32458 32489 6fc1028 ReadProcessMemory 32487->32489 32488 6fc4242 32488->32458 32489->32488 32553 6fc0d99 32490->32553 32557 6fc0da0 32490->32557 32491 6fc448f 32491->32490 32492 6fc4059 32491->32492 32493 6fc4242 32492->32493 32496 6fc1028 ReadProcessMemory 32492->32496 32493->32458 32496->32493 32561 6fc0e78 32497->32561 32565 6fc0e71 32497->32565 32498 6fc460a 32502 6fc4119 32501->32502 32504 6fc40b0 32501->32504 32502->32504 32505 6fc0d99 Wow64SetThreadContext 32502->32505 32506 6fc0da0 Wow64SetThreadContext 32502->32506 32503 6fc414b 32503->32458 32504->32503 32569 6fc0ce9 32504->32569 32573 6fc0cf0 32504->32573 32505->32504 32506->32504 32510 6fc40b0 32509->32510 32512 6fc0ce9 ResumeThread 32510->32512 32513 6fc0cf0 ResumeThread 32510->32513 32511 6fc414b 32511->32458 32512->32511 32513->32511 32515 6fc4059 32514->32515 32516 6fc4242 32515->32516 32517 6fc1028 ReadProcessMemory 32515->32517 32516->32458 32517->32516 32519 6fc3ffd 32518->32519 32577 6fc11b4 32519->32577 32581 6fc11c0 32519->32581 32525 6fc0f38 WriteProcessMemory 32523->32525 32526 6fc0f30 WriteProcessMemory 32523->32526 32524 6fc40de 32525->32524 32526->32524 32530 6fc0f38 WriteProcessMemory 32527->32530 32531 6fc0f30 WriteProcessMemory 32527->32531 32528 6fc44b9 32528->32527 32529 6fc4900 32528->32529 32530->32528 32531->32528 32533 6fc4059 32532->32533 32534 6fc4242 32533->32534 32535 6fc1028 ReadProcessMemory 32533->32535 32534->32458 32535->32534 32537 6fc4125 32536->32537 32539 6fc0ce9 ResumeThread 32537->32539 32540 6fc0cf0 ResumeThread 32537->32540 32538 6fc414b 32538->32458 32539->32538 32540->32538 32542 6fc0f80 WriteProcessMemory 32541->32542 32544 6fc0fd7 32542->32544 32544->32474 32546 6fc0f38 WriteProcessMemory 32545->32546 32548 6fc0fd7 32546->32548 32548->32474 32550 6fc1073 ReadProcessMemory 32549->32550 32552 6fc10b7 32550->32552 32552->32485 32554 6fc0de5 Wow64SetThreadContext 32553->32554 32556 6fc0e2d 32554->32556 32556->32491 32558 6fc0de5 Wow64SetThreadContext 32557->32558 32560 6fc0e2d 32558->32560 32560->32491 32562 6fc0eb8 VirtualAllocEx 32561->32562 32564 6fc0ef5 32562->32564 32564->32498 32566 6fc0e78 VirtualAllocEx 32565->32566 32568 6fc0ef5 32566->32568 32568->32498 32570 6fc0cf0 ResumeThread 32569->32570 32572 6fc0d61 32570->32572 32572->32503 32574 6fc0d30 ResumeThread 32573->32574 32576 6fc0d61 32574->32576 32576->32503 32578 6fc11c0 CreateProcessA 32577->32578 32580 6fc140b 32578->32580 32580->32580 32582 6fc1249 CreateProcessA 32581->32582 32584 6fc140b 32582->32584 32584->32584
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4|hq$4|hq$$cq
                                          • API String ID: 0-1037649440
                                          • Opcode ID: cfea4bf14d72a2e08f45cc716f06acd7293dcc3d732507e8a66b14b7d46f6cc5
                                          • Instruction ID: af07d350739155019e3995d3263894dd60e447492bda26590fbadd2f05fe9b41
                                          • Opcode Fuzzy Hash: cfea4bf14d72a2e08f45cc716f06acd7293dcc3d732507e8a66b14b7d46f6cc5
                                          • Instruction Fuzzy Hash: 7443F974A00219CFCB64DF68C898AEEB7B2BF49314F15A595E519AB361CB30ED81CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1108 6eb34b8-6eb34e0 1109 6eb34e2 1108->1109 1110 6eb34e7-6eb35a3 1108->1110 1109->1110 1113 6eb35a8-6eb35b5 1110->1113 1114 6eb35a5-6eb35a6 1110->1114 1113->1114 1115 6eb35c7-6eb35cb 1113->1115 1114->1115 1116 6eb3abb-6eb3afd 1115->1116 1117 6eb35d1-6eb35fb 1115->1117 1125 6eb3b00-6eb3b04 1116->1125 1120 6eb3cc8-6eb3cd4 1117->1120 1121 6eb3601-6eb3619 1117->1121 1123 6eb3cda-6eb3ce3 1120->1123 1121->1123 1124 6eb361f-6eb3620 1121->1124 1127 6eb3ce9-6eb3cf5 1123->1127 1126 6eb3cae-6eb3cba 1124->1126 1128 6eb3b0a-6eb3b10 1125->1128 1129 6eb36d6-6eb36da 1125->1129 1130 6eb3cc0-6eb3cc7 1126->1130 1131 6eb3625-6eb3631 1126->1131 1137 6eb3cfb-6eb3d07 1127->1137 1128->1116 1132 6eb3b12-6eb3b6d 1128->1132 1133 6eb36ec-6eb36f2 1129->1133 1134 6eb36dc-6eb36ea 1129->1134 1135 6eb3638-6eb3653 1131->1135 1136 6eb3633 1131->1136 1157 6eb3b6f-6eb3ba2 1132->1157 1158 6eb3ba4-6eb3bce 1132->1158 1139 6eb3737-6eb373b 1133->1139 1138 6eb374a-6eb377c 1134->1138 1135->1127 1140 6eb3659-6eb367e 1135->1140 1136->1135 1145 6eb3d0d-6eb3d14 1137->1145 1162 6eb377e-6eb378a 1138->1162 1163 6eb37a6 1138->1163 1141 6eb373d 1139->1141 1142 6eb36f4-6eb3700 1139->1142 1140->1137 1152 6eb3684-6eb3686 1140->1152 1146 6eb3740-6eb3744 1141->1146 1148 6eb3702 1142->1148 1149 6eb3707-6eb370f 1142->1149 1146->1138 1153 6eb36bc-6eb36d3 1146->1153 1148->1149 1150 6eb3711-6eb3725 1149->1150 1151 6eb3734 1149->1151 1155 6eb372b-6eb3732 1150->1155 1156 6eb3689-6eb3694 1150->1156 1151->1139 1152->1156 1153->1129 1155->1141 1156->1145 1160 6eb369a-6eb36b7 1156->1160 1171 6eb3bd7-6eb3c56 1157->1171 1158->1171 1160->1146 1166 6eb378c-6eb3792 1162->1166 1167 6eb3794-6eb379a 1162->1167 1164 6eb37ac-6eb37d9 1163->1164 1175 6eb37db-6eb3813 1164->1175 1176 6eb3828-6eb38bb 1164->1176 1172 6eb37a4 1166->1172 1167->1172 1183 6eb3c5d-6eb3c70 1171->1183 1172->1164 1184 6eb3c7f-6eb3c84 1175->1184 1191 6eb38bd 1176->1191 1192 6eb38c4-6eb38c5 1176->1192 1183->1184 1186 6eb3c9b-6eb3cab 1184->1186 1187 6eb3c86-6eb3c94 1184->1187 1186->1126 1187->1186 1191->1192 1193 6eb3916-6eb391c 1192->1193 1194 6eb391e-6eb39e0 1193->1194 1195 6eb38c7-6eb38e6 1193->1195 1206 6eb39e2-6eb3a1b 1194->1206 1207 6eb3a21-6eb3a25 1194->1207 1196 6eb38e8 1195->1196 1197 6eb38ed-6eb3913 1195->1197 1196->1197 1197->1193 1206->1207 1208 6eb3a27-6eb3a60 1207->1208 1209 6eb3a66-6eb3a6a 1207->1209 1208->1209 1210 6eb3aab-6eb3aaf 1209->1210 1211 6eb3a6c-6eb3aa5 1209->1211 1210->1132 1214 6eb3ab1-6eb3ab9 1210->1214 1211->1210 1214->1125
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'cq$:$pgq$~
                                          • API String ID: 0-1276774758
                                          • Opcode ID: cc5992f4b107cc632d88cc5b1dd35a0d0c3eeb2920365c7232de9877ce51dccb
                                          • Instruction ID: e2a1145fe315e6e08e61b2666440bb015cd236419bdcb8bb4709257f7bd35b58
                                          • Opcode Fuzzy Hash: cc5992f4b107cc632d88cc5b1dd35a0d0c3eeb2920365c7232de9877ce51dccb
                                          • Instruction Fuzzy Hash: A442E175A00228DFDB55CFA8C980BDABBB2FF48304F1590E9E509AB265D731AD91CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b28f6dc8c7b7a940791affa1a506cd16358278d99f3bd1963485c60ac9d3c96
                                          • Instruction ID: 4c31e25d64de7cd0185888f86332524f3b8646f8a0e5925d3903adbcd589c65d
                                          • Opcode Fuzzy Hash: 7b28f6dc8c7b7a940791affa1a506cd16358278d99f3bd1963485c60ac9d3c96
                                          • Instruction Fuzzy Hash: 5EC19A70B007028FDB99EB79C960BAE77F6AF8A710F14446DE146DB291DB35E801CB52

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1064 eacff1-ead08f GetCurrentProcess 1068 ead098-ead0cc GetCurrentThread 1064->1068 1069 ead091-ead097 1064->1069 1070 ead0ce-ead0d4 1068->1070 1071 ead0d5-ead109 GetCurrentProcess 1068->1071 1069->1068 1070->1071 1073 ead10b-ead111 1071->1073 1074 ead112-ead12d call ead5d9 1071->1074 1073->1074 1077 ead133-ead162 GetCurrentThreadId 1074->1077 1078 ead16b-ead1cd 1077->1078 1079 ead164-ead16a 1077->1079 1079->1078
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00EAD07E
                                          • GetCurrentThread.KERNEL32 ref: 00EAD0BB
                                          • GetCurrentProcess.KERNEL32 ref: 00EAD0F8
                                          • GetCurrentThreadId.KERNEL32 ref: 00EAD151
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 4d95e7500d930bd798b5f832cda81df5bdae61052e94b11738ef7ad159735a9d
                                          • Instruction ID: 341eb598e12780a17e0284db47b92a84b61344299e0633895ef5f2848b590fb7
                                          • Opcode Fuzzy Hash: 4d95e7500d930bd798b5f832cda81df5bdae61052e94b11738ef7ad159735a9d
                                          • Instruction Fuzzy Hash: B25168B0D042498FDB04DFA9D9487AEBBF1EF88314F20845DE409BB360D774A944CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1086 ead000-ead08f GetCurrentProcess 1090 ead098-ead0cc GetCurrentThread 1086->1090 1091 ead091-ead097 1086->1091 1092 ead0ce-ead0d4 1090->1092 1093 ead0d5-ead109 GetCurrentProcess 1090->1093 1091->1090 1092->1093 1095 ead10b-ead111 1093->1095 1096 ead112-ead12d call ead5d9 1093->1096 1095->1096 1099 ead133-ead162 GetCurrentThreadId 1096->1099 1100 ead16b-ead1cd 1099->1100 1101 ead164-ead16a 1099->1101 1101->1100
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00EAD07E
                                          • GetCurrentThread.KERNEL32 ref: 00EAD0BB
                                          • GetCurrentProcess.KERNEL32 ref: 00EAD0F8
                                          • GetCurrentThreadId.KERNEL32 ref: 00EAD151
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: c91f94fb975abe2dc3efd6f4ebb7089821c1f8078df8da7a7815d81d08b04a09
                                          • Instruction ID: 807618bb6c88732230756229cc9a20126f50edaa38438f4cdb59c9e9d827aa37
                                          • Opcode Fuzzy Hash: c91f94fb975abe2dc3efd6f4ebb7089821c1f8078df8da7a7815d81d08b04a09
                                          • Instruction Fuzzy Hash: FA5168B0D042498FDB14DFA9D948BAEBBF1EF89304F20845DE409B7350D775A944CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1238 6fc11b4-6fc1255 1241 6fc128e-6fc12ae 1238->1241 1242 6fc1257-6fc1261 1238->1242 1247 6fc12e7-6fc1316 1241->1247 1248 6fc12b0-6fc12ba 1241->1248 1242->1241 1243 6fc1263-6fc1265 1242->1243 1245 6fc1288-6fc128b 1243->1245 1246 6fc1267-6fc1271 1243->1246 1245->1241 1249 6fc1275-6fc1284 1246->1249 1250 6fc1273 1246->1250 1258 6fc134f-6fc1409 CreateProcessA 1247->1258 1259 6fc1318-6fc1322 1247->1259 1248->1247 1251 6fc12bc-6fc12be 1248->1251 1249->1249 1252 6fc1286 1249->1252 1250->1249 1253 6fc12c0-6fc12ca 1251->1253 1254 6fc12e1-6fc12e4 1251->1254 1252->1245 1256 6fc12cc 1253->1256 1257 6fc12ce-6fc12dd 1253->1257 1254->1247 1256->1257 1257->1257 1260 6fc12df 1257->1260 1270 6fc140b-6fc1411 1258->1270 1271 6fc1412-6fc1498 1258->1271 1259->1258 1261 6fc1324-6fc1326 1259->1261 1260->1254 1262 6fc1328-6fc1332 1261->1262 1263 6fc1349-6fc134c 1261->1263 1265 6fc1334 1262->1265 1266 6fc1336-6fc1345 1262->1266 1263->1258 1265->1266 1266->1266 1267 6fc1347 1266->1267 1267->1263 1270->1271 1281 6fc14a8-6fc14ac 1271->1281 1282 6fc149a-6fc149e 1271->1282 1283 6fc14bc-6fc14c0 1281->1283 1284 6fc14ae-6fc14b2 1281->1284 1282->1281 1285 6fc14a0 1282->1285 1287 6fc14d0-6fc14d4 1283->1287 1288 6fc14c2-6fc14c6 1283->1288 1284->1283 1286 6fc14b4 1284->1286 1285->1281 1286->1283 1290 6fc14e6-6fc14ed 1287->1290 1291 6fc14d6-6fc14dc 1287->1291 1288->1287 1289 6fc14c8 1288->1289 1289->1287 1292 6fc14ef-6fc14fe 1290->1292 1293 6fc1504 1290->1293 1291->1290 1292->1293 1294 6fc1505 1293->1294 1294->1294
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06FC13F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 46c9ee8e9495c6721705a8fbe35ec07c5c486715adcc1ff2abb340a6fd63d51c
                                          • Instruction ID: 7c373b2d0609caa08c4d5f01492c39be3df58bbb1847f4131142bcc769b4cfea
                                          • Opcode Fuzzy Hash: 46c9ee8e9495c6721705a8fbe35ec07c5c486715adcc1ff2abb340a6fd63d51c
                                          • Instruction Fuzzy Hash: 76A18E71D0021A8FEF60CFA8C941BDDBBB2BF49324F1485A9E809A7241DB749995CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1296 6fc11c0-6fc1255 1298 6fc128e-6fc12ae 1296->1298 1299 6fc1257-6fc1261 1296->1299 1304 6fc12e7-6fc1316 1298->1304 1305 6fc12b0-6fc12ba 1298->1305 1299->1298 1300 6fc1263-6fc1265 1299->1300 1302 6fc1288-6fc128b 1300->1302 1303 6fc1267-6fc1271 1300->1303 1302->1298 1306 6fc1275-6fc1284 1303->1306 1307 6fc1273 1303->1307 1315 6fc134f-6fc1409 CreateProcessA 1304->1315 1316 6fc1318-6fc1322 1304->1316 1305->1304 1308 6fc12bc-6fc12be 1305->1308 1306->1306 1309 6fc1286 1306->1309 1307->1306 1310 6fc12c0-6fc12ca 1308->1310 1311 6fc12e1-6fc12e4 1308->1311 1309->1302 1313 6fc12cc 1310->1313 1314 6fc12ce-6fc12dd 1310->1314 1311->1304 1313->1314 1314->1314 1317 6fc12df 1314->1317 1327 6fc140b-6fc1411 1315->1327 1328 6fc1412-6fc1498 1315->1328 1316->1315 1318 6fc1324-6fc1326 1316->1318 1317->1311 1319 6fc1328-6fc1332 1318->1319 1320 6fc1349-6fc134c 1318->1320 1322 6fc1334 1319->1322 1323 6fc1336-6fc1345 1319->1323 1320->1315 1322->1323 1323->1323 1324 6fc1347 1323->1324 1324->1320 1327->1328 1338 6fc14a8-6fc14ac 1328->1338 1339 6fc149a-6fc149e 1328->1339 1340 6fc14bc-6fc14c0 1338->1340 1341 6fc14ae-6fc14b2 1338->1341 1339->1338 1342 6fc14a0 1339->1342 1344 6fc14d0-6fc14d4 1340->1344 1345 6fc14c2-6fc14c6 1340->1345 1341->1340 1343 6fc14b4 1341->1343 1342->1338 1343->1340 1347 6fc14e6-6fc14ed 1344->1347 1348 6fc14d6-6fc14dc 1344->1348 1345->1344 1346 6fc14c8 1345->1346 1346->1344 1349 6fc14ef-6fc14fe 1347->1349 1350 6fc1504 1347->1350 1348->1347 1349->1350 1351 6fc1505 1350->1351 1351->1351
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06FC13F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: d976300c3e02372ad6c10518dedc66df63aad9ba5addaabf8f1d3e5d366e5a47
                                          • Instruction ID: 6a14f1d91225e64bebf7119b342d70b7ae5810260f272b9bebf380b60c50a5e8
                                          • Opcode Fuzzy Hash: d976300c3e02372ad6c10518dedc66df63aad9ba5addaabf8f1d3e5d366e5a47
                                          • Instruction Fuzzy Hash: EC916E71D0021A8FEB60CFA8C9417DDBBB2BF49324F1485A9E808A7241DB749995CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1353 eaad68-eaad77 1354 eaad79-eaad86 call eaa08c 1353->1354 1355 eaada3-eaada7 1353->1355 1361 eaad88 1354->1361 1362 eaad9c 1354->1362 1357 eaadbb-eaadfc 1355->1357 1358 eaada9-eaadb3 1355->1358 1364 eaae09-eaae17 1357->1364 1365 eaadfe-eaae06 1357->1365 1358->1357 1408 eaad8e call eaaff0 1361->1408 1409 eaad8e call eab000 1361->1409 1362->1355 1366 eaae3b-eaae3d 1364->1366 1367 eaae19-eaae1e 1364->1367 1365->1364 1372 eaae40-eaae47 1366->1372 1369 eaae29 1367->1369 1370 eaae20-eaae27 call eaa098 1367->1370 1368 eaad94-eaad96 1368->1362 1371 eaaed8-eaaf98 1368->1371 1374 eaae2b-eaae39 1369->1374 1370->1374 1403 eaaf9a-eaaf9d 1371->1403 1404 eaafa0-eaafcb GetModuleHandleW 1371->1404 1375 eaae49-eaae51 1372->1375 1376 eaae54-eaae5b 1372->1376 1374->1372 1375->1376 1379 eaae68-eaae71 call eaa0a8 1376->1379 1380 eaae5d-eaae65 1376->1380 1384 eaae7e-eaae83 1379->1384 1385 eaae73-eaae7b 1379->1385 1380->1379 1386 eaaea1-eaaea5 1384->1386 1387 eaae85-eaae8c 1384->1387 1385->1384 1392 eaaeab-eaaeae 1386->1392 1387->1386 1389 eaae8e-eaae9e call eaa0b8 call eaa0c8 1387->1389 1389->1386 1394 eaaeb0-eaaece 1392->1394 1395 eaaed1-eaaed7 1392->1395 1394->1395 1403->1404 1405 eaafcd-eaafd3 1404->1405 1406 eaafd4-eaafe8 1404->1406 1405->1406 1408->1368 1409->1368
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAAFBE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: d98f37ac69ed119458ddf3f91fe7956b7a914d3ab2b55e2348f5fff39b6eec7f
                                          • Instruction ID: c100f265fb0b06065c34bd27d1497ed26f8c618fd7a6a352b5cc6969d9621fbc
                                          • Opcode Fuzzy Hash: d98f37ac69ed119458ddf3f91fe7956b7a914d3ab2b55e2348f5fff39b6eec7f
                                          • Instruction Fuzzy Hash: 6D7114B0A00B058FD764DF29D05176ABBF1FF89304F14892DD486ABA40DB75F949CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1410 ea590c-ea59d9 CreateActCtxA 1412 ea59db-ea59e1 1410->1412 1413 ea59e2-ea5a3c 1410->1413 1412->1413 1420 ea5a4b-ea5a4f 1413->1420 1421 ea5a3e-ea5a41 1413->1421 1422 ea5a60 1420->1422 1423 ea5a51-ea5a5d 1420->1423 1421->1420 1425 ea5a61 1422->1425 1423->1422 1425->1425
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00EA59C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 4d303f1238ecdc7b39c7ebeff3f96b30b6235ef51499fea68869057839e09d24
                                          • Instruction ID: 3ded04d97c63f3937b716240e0e6660b7a9c96a25bb999922ab074d6dcf725f6
                                          • Opcode Fuzzy Hash: 4d303f1238ecdc7b39c7ebeff3f96b30b6235ef51499fea68869057839e09d24
                                          • Instruction Fuzzy Hash: 9641FEB1D00719CBDB24DFA9C8847DDBBB2BF49304F20816AD408BB251DB75694ACF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1426 ea44b4-ea59d9 CreateActCtxA 1429 ea59db-ea59e1 1426->1429 1430 ea59e2-ea5a3c 1426->1430 1429->1430 1437 ea5a4b-ea5a4f 1430->1437 1438 ea5a3e-ea5a41 1430->1438 1439 ea5a60 1437->1439 1440 ea5a51-ea5a5d 1437->1440 1438->1437 1442 ea5a61 1439->1442 1440->1439 1442->1442
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00EA59C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: a83aff6aed8cf97c8240a185e685b6b2c854555fc24ef4b7a2ecfa52a4d33d51
                                          • Instruction ID: 970288f211d5f508f08e8d7cfa96a7e34e54c7db264239f1a741e22de6d0efd2
                                          • Opcode Fuzzy Hash: a83aff6aed8cf97c8240a185e685b6b2c854555fc24ef4b7a2ecfa52a4d33d51
                                          • Instruction Fuzzy Hash: CE41E0B1D00719CBDB24DFA9C884BDEBBB5BF49314F20805AD408BB251DB716949CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1443 6fc0f30-6fc0f86 1446 6fc0f88-6fc0f94 1443->1446 1447 6fc0f96-6fc0fd5 WriteProcessMemory 1443->1447 1446->1447 1449 6fc0fde-6fc100e 1447->1449 1450 6fc0fd7-6fc0fdd 1447->1450 1450->1449
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06FC0FC8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: fff062dd0d5de73003e7d2a56092e3235f0cda08cc0273dfef48835602f31869
                                          • Instruction ID: 6f8f83fd44cee40fdf5509f5f78ab2b8b36f76495b39e48700c9713f2c068bce
                                          • Opcode Fuzzy Hash: fff062dd0d5de73003e7d2a56092e3235f0cda08cc0273dfef48835602f31869
                                          • Instruction Fuzzy Hash: 6B2126B1D003099FDB10DFA9C985BDEBBF5FF48324F108829E919A7240C7789955CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1454 6fc0f38-6fc0f86 1456 6fc0f88-6fc0f94 1454->1456 1457 6fc0f96-6fc0fd5 WriteProcessMemory 1454->1457 1456->1457 1459 6fc0fde-6fc100e 1457->1459 1460 6fc0fd7-6fc0fdd 1457->1460 1460->1459
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06FC0FC8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 638991b5914c49f9ca1435682572f798c9ba81fedcb98a793539c78a5df5fe2e
                                          • Instruction ID: e478ae61c9680daa9ad3bdddcdc8d965d55d2f2c19d535ff7417a767403cf9ee
                                          • Opcode Fuzzy Hash: 638991b5914c49f9ca1435682572f798c9ba81fedcb98a793539c78a5df5fe2e
                                          • Instruction Fuzzy Hash: 742157B1D0030A9FDB10DFA9C985BDEBBF5FF48320F108829E919A7240C7789945CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1464 6fc0d99-6fc0deb 1466 6fc0ded-6fc0df9 1464->1466 1467 6fc0dfb-6fc0e2b Wow64SetThreadContext 1464->1467 1466->1467 1469 6fc0e2d-6fc0e33 1467->1469 1470 6fc0e34-6fc0e64 1467->1470 1469->1470
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06FC0E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 0cfba504163f5bcae26e7d5d0c908598f1a5b89862783f1eb7bbcb3121ad1d63
                                          • Instruction ID: 0cf22541e658b1b5adf776d196a07773c1cdfa364e7d12d3f3a9d42f69cc02f1
                                          • Opcode Fuzzy Hash: 0cfba504163f5bcae26e7d5d0c908598f1a5b89862783f1eb7bbcb3121ad1d63
                                          • Instruction Fuzzy Hash: 072125B1D002098FDB10DFAAC485BEEBBF4EB88324F108429D459A7240CB78A945CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1474 6fc0da0-6fc0deb 1476 6fc0ded-6fc0df9 1474->1476 1477 6fc0dfb-6fc0e2b Wow64SetThreadContext 1474->1477 1476->1477 1479 6fc0e2d-6fc0e33 1477->1479 1480 6fc0e34-6fc0e64 1477->1480 1479->1480
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06FC0E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: e2fc92c07c12fb778bd1c4d18326c9fe6db30e44ed65c02d849e62c84764e51c
                                          • Instruction ID: fd451ca59bc19815bad5c11280b6fd25e06991e6dbb6ac56be5225923d1cd998
                                          • Opcode Fuzzy Hash: e2fc92c07c12fb778bd1c4d18326c9fe6db30e44ed65c02d849e62c84764e51c
                                          • Instruction Fuzzy Hash: 412104B1D103098FDB10DFAAC5857AEBBF5AB88324F14842AD459A7241CB78A945CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1484 6fc1028-6fc10b5 ReadProcessMemory 1487 6fc10be-6fc10ee 1484->1487 1488 6fc10b7-6fc10bd 1484->1488 1488->1487
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06FC10A8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: accf5ec4882331727d5cdc9b8c78faef13a051cc6e1f498e12b19d584dd845d2
                                          • Instruction ID: 109081f8287f88e4f25deace95fbb64a2184940e7c3d3de39274c081a58ad0c1
                                          • Opcode Fuzzy Hash: accf5ec4882331727d5cdc9b8c78faef13a051cc6e1f498e12b19d584dd845d2
                                          • Instruction Fuzzy Hash: 052128B1D003499FDB10DFAAC845ADEFBF5FF88320F108429E919A7240C7759955DBA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAD6D7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 74fefbf8d41b3cdb3774fabbb83e6e99bc491ee73831f38632a5a88605d257d2
                                          • Instruction ID: 5445f256d5360d95005765efe0befbe67564494b472909b3b8f13d52d54a3e71
                                          • Opcode Fuzzy Hash: 74fefbf8d41b3cdb3774fabbb83e6e99bc491ee73831f38632a5a88605d257d2
                                          • Instruction Fuzzy Hash: 7421E2B5D002099FDB10CFAAD884ADEBFF8EB48320F14841AE919B7310D374A944CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAD6D7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 8b1e252bd634098248d043b9d95c4796c3fd32a5709810c39e1d370e42d858dd
                                          • Instruction ID: 02916bea801d4f749d55f93ae930d0861bf081e09a9453dff933a778132c9f32
                                          • Opcode Fuzzy Hash: 8b1e252bd634098248d043b9d95c4796c3fd32a5709810c39e1d370e42d858dd
                                          • Instruction Fuzzy Hash: 3F2100B5D00209DFDB00CFAAD884ADEBBF5EB48324F10841AE918B7210C374A944CF64
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06FC0EE6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: c9c782c6d2b152a321f1352e7668048ec142edaed2538df03bb1772806369b25
                                          • Instruction ID: 7e9acbd8be309b6b261e018ac2b679001c8af89a9a4424564df83600aed7fc82
                                          • Opcode Fuzzy Hash: c9c782c6d2b152a321f1352e7668048ec142edaed2538df03bb1772806369b25
                                          • Instruction Fuzzy Hash: C5115972C002499FDB10DFA9C845ADFBFF5EB88324F208819E51AA7250CB75A945CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 96146979f9a36a34ac3f5cedcd0c8508dad0fad66f43f7f0fe8e3046dc080734
                                          • Instruction ID: 505f85f76327d3875ecd7b5293fb36913b6f2340f5c0ebc538a9c8313067db24
                                          • Opcode Fuzzy Hash: 96146979f9a36a34ac3f5cedcd0c8508dad0fad66f43f7f0fe8e3046dc080734
                                          • Instruction Fuzzy Hash: 40E18174E042189FDB50DFA8C881ADDBBF1BF49314F24A1AAD819EB345D7319A85CF50
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06FC0EE6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: a46bdda854f0fc8dc32c84fe73e14672df5753075476f4239a1815644f25faab
                                          • Instruction ID: 641e00b134bcbe4b261ef3a9ae80027055c3612db236a16f07ee2db4f018153e
                                          • Opcode Fuzzy Hash: a46bdda854f0fc8dc32c84fe73e14672df5753075476f4239a1815644f25faab
                                          • Instruction Fuzzy Hash: 1A116A72C002498FDB10DFA9C845ADFBFF5EF88320F108419D519A7250CB759944CFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 89442358c8df626ded1b2a7b02fea98b24c541a4f43442cee7ba7103c34b5946
                                          • Instruction ID: e0c3dae44080603e22f78e48acd2d8c997e660f254035418feea2b76b5446fec
                                          • Opcode Fuzzy Hash: 89442358c8df626ded1b2a7b02fea98b24c541a4f43442cee7ba7103c34b5946
                                          • Instruction Fuzzy Hash: F51119B1D002498BDB20DFAAC4457DFFBF9EB88325F208819D41AA7240CB756945CB95
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: dea0538ea004d86fbe14c7fc9a1cd31f3f74d2e62f07918c9be16a90d993bade
                                          • Instruction ID: 8c62778daa6689c39a3cd08bd8939d596f284f7e299fcd7ba5dbc8234887a47a
                                          • Opcode Fuzzy Hash: dea0538ea004d86fbe14c7fc9a1cd31f3f74d2e62f07918c9be16a90d993bade
                                          • Instruction Fuzzy Hash: 941125B1D003498BDB20DFAAC84579EFFF5AB88324F208819D419A7240CB75A945CBA1
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAAFBE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 824f29e1b994d151b9ad2588e5169a6dca2ee947f05b1b2374a8384ee8d96d10
                                          • Instruction ID: 98f161c561f768c4343bf2fcfaf8d5c5e561be7e884b8b5a35a30b0e7af71092
                                          • Opcode Fuzzy Hash: 824f29e1b994d151b9ad2588e5169a6dca2ee947f05b1b2374a8384ee8d96d10
                                          • Instruction Fuzzy Hash: 40110FB5D003498FDB14CF9AD444ADEFBF4AB88328F14842AD819B7600C379A945CFA1
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 06FC5045
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 3803803c34aa623c9396ecda0258a011aa406246c0e476cffb0693a0b892e251
                                          • Instruction ID: 230d5c26dc3c50d3ad0375bd6d5a9feda4ab07c9d9ffb038f704a63969e63fa8
                                          • Opcode Fuzzy Hash: 3803803c34aa623c9396ecda0258a011aa406246c0e476cffb0693a0b892e251
                                          • Instruction Fuzzy Hash: 4211D3B5C003499FDB10DF9AD945BDEBBF8EB48324F108419D519A7240C375A954CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: b0e714ac1d9ad3c2eddd24f5e03bd8d1197815169895442c22b53361657304b1
                                          • Instruction ID: 3326ec27821797c51afa7bb93f77f853c5f6cdf31945ae038665c64df08ba4d3
                                          • Opcode Fuzzy Hash: b0e714ac1d9ad3c2eddd24f5e03bd8d1197815169895442c22b53361657304b1
                                          • Instruction Fuzzy Hash: 8091E774E042189FDB44DFA9D4816EEBBF2EF48314F20A56AE819EB345E7359942CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 0e50b884a3819248988aa94cb231016973cf5296ac36df85e83191db8999a9e9
                                          • Instruction ID: c5f7e49bd78dad308c0d5b5a982a7d6d4871909c8f9d7ac94e0394cbe7742c53
                                          • Opcode Fuzzy Hash: 0e50b884a3819248988aa94cb231016973cf5296ac36df85e83191db8999a9e9
                                          • Instruction Fuzzy Hash: A951C031B003068FCB11DF799C948AFBBF6EFC5224714996AE415DB395DB349D068B90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8gq
                                          • API String ID: 0-1984363304
                                          • Opcode ID: 8bf708279e0e9cc84b47ef1f33cd7103f7b4de1da87143b0e156a942c6500a2c
                                          • Instruction ID: e9808ba33d1a019a38fee90ca83f9d4f5cb79c3556cce71b24ea1f9fbebb087a
                                          • Opcode Fuzzy Hash: 8bf708279e0e9cc84b47ef1f33cd7103f7b4de1da87143b0e156a942c6500a2c
                                          • Instruction Fuzzy Hash: C7410874E01209DFDB44DFA8D5819EEBBF2FB89310F10A429E819AB355DB319D42CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8gq
                                          • API String ID: 0-1984363304
                                          • Opcode ID: c95da3c3e7648bea69cacaffe3d1a7f19dffdf89a228da0c36942a5bb65e4e17
                                          • Instruction ID: 668b6c4473dceeb5b8e0deec4d678a01e6afc154b0912ada2755b35c612ff483
                                          • Opcode Fuzzy Hash: c95da3c3e7648bea69cacaffe3d1a7f19dffdf89a228da0c36942a5bb65e4e17
                                          • Instruction Fuzzy Hash: 6E415D34E01208DFCB44DFA8D5815EEBBF1EF89304F10946AE815AB355DB319D02CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: ba708fc918f3a5617c1def6556976a7261feb7f67ec03a03773979af908008a7
                                          • Instruction ID: e9cb2ad982d4b694d9ea75accba0c0cb98f98b4a6539ef01495c20e4f4363d90
                                          • Opcode Fuzzy Hash: ba708fc918f3a5617c1def6556976a7261feb7f67ec03a03773979af908008a7
                                          • Instruction Fuzzy Hash: CA31A274E04209CFDF44CFE9D5809EEBBB5EB89305F20A12AE919AB255C7315945CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: f225c3549eeddf9f5ec89af4648810168d2ee9361769c4d2293510cd93345129
                                          • Instruction ID: 95bc410eb0bceb6c86d55818dcc44d9ab0a51a1c32f03569b458f234bbb01d6e
                                          • Opcode Fuzzy Hash: f225c3549eeddf9f5ec89af4648810168d2ee9361769c4d2293510cd93345129
                                          • Instruction Fuzzy Hash: 7831BF74E11208CFDF44DFA9D8849EEBBB6FB88305F20A12AE909AB254D7319945CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 5b122d45d1da717edb44cb0d074f57349c27cf7e8cc794b9b8773f369bae1812
                                          • Instruction ID: 004e7187b17c077f128d787c2809b5050ff8c509408a7e07ebe73696b2ae7fbc
                                          • Opcode Fuzzy Hash: 5b122d45d1da717edb44cb0d074f57349c27cf7e8cc794b9b8773f369bae1812
                                          • Instruction Fuzzy Hash: 4A31E774E043488FEB44CFAAC8446EEBBB6EF89304F14A02AD409AB358DB705905CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: bf477ad67a443bfd70a04493621a071bde09e44bdd23571dfed3aad7a4248348
                                          • Instruction ID: e0cfcfa19587d307c31dd4345a122c0bb73d3a1a78fbff4f254df59d3f4ccdc4
                                          • Opcode Fuzzy Hash: bf477ad67a443bfd70a04493621a071bde09e44bdd23571dfed3aad7a4248348
                                          • Instruction Fuzzy Hash: 7C21B474E043488BDB44DFAAC8446DEBBF6EF89304F10A02AD819AB358DB705945CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: abb6a7a5e8fbae81bbd5857e74dc3269ab5c389825ded002590bfdfe16a24484
                                          • Instruction ID: a56c2aaba09a00a55cc4693a449a958c4ce054213f68ec17746dcd374428d73e
                                          • Opcode Fuzzy Hash: abb6a7a5e8fbae81bbd5857e74dc3269ab5c389825ded002590bfdfe16a24484
                                          • Instruction Fuzzy Hash: 1D113A71F1020A8BDB44EFA999015EFB6F6AB88214B205029C505A7388EF318E02CBE1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ;
                                          • API String ID: 0-1661535913
                                          • Opcode ID: 99cb05f4c8dbf527d738313940d8b3ffd40b70c62b1d4f5f0b745483fe5b40b3
                                          • Instruction ID: 9e145759d2783b196a99ac186beafb36851f0ce322744fb4effa25d2003d6e83
                                          • Opcode Fuzzy Hash: 99cb05f4c8dbf527d738313940d8b3ffd40b70c62b1d4f5f0b745483fe5b40b3
                                          • Instruction Fuzzy Hash: BF01CC74D053098FCF01CFB8C9456EFBFB5AB85308F21A9A6E804D7640E7308A01CB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: G
                                          • API String ID: 0-985283518
                                          • Opcode ID: 6f4f88a0437ae97d59716a2dfaa4d3d564170440e8c40694a5d515791b216684
                                          • Instruction ID: ed09868ba73df38bcb51112e75a74281a822c1a3896359e8350efa5b6092711e
                                          • Opcode Fuzzy Hash: 6f4f88a0437ae97d59716a2dfaa4d3d564170440e8c40694a5d515791b216684
                                          • Instruction Fuzzy Hash: 00018F74A20204DFCB11DFA4D841BDFBBB0EB85319F10659AE904EB784D7365E06CB41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: r
                                          • API String ID: 0-1812594589
                                          • Opcode ID: 864a0a9f042d46b06d1e12b972d8ebb31cfc45bd08ef95449f6781cbbca56161
                                          • Instruction ID: 425ed9d98f4db045036b92e23420d0078157820f4ee261afa1a23432cebe821b
                                          • Opcode Fuzzy Hash: 864a0a9f042d46b06d1e12b972d8ebb31cfc45bd08ef95449f6781cbbca56161
                                          • Instruction Fuzzy Hash: 2DF05E3092D305DFD794CF98C1808FAB779FB0AB11731B496D4095A156C734AC81CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: m
                                          • API String ID: 0-3775001192
                                          • Opcode ID: 9ac9cc9cdf9e3d518f61f2e75f7ae96fa8027271f95a542efd44cefdc6a8977b
                                          • Instruction ID: 70f2e8db452aabd370088e4764239f4be67e0ffadab0d23547e10dac5b812b20
                                          • Opcode Fuzzy Hash: 9ac9cc9cdf9e3d518f61f2e75f7ae96fa8027271f95a542efd44cefdc6a8977b
                                          • Instruction Fuzzy Hash: 64E0C230D053089BCF44EFB4D4052EFBFB89744306F003595D84593640E7315A45DBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 6
                                          • API String ID: 0-498629140
                                          • Opcode ID: da5ce351ef8f2962a77fb281c0765e4b6358be4945134f0e28fb42a69b6cec99
                                          • Instruction ID: 19c5e1de5272db4df537c41a48141561dc429d1e8d01aee3cab509be50febbe4
                                          • Opcode Fuzzy Hash: da5ce351ef8f2962a77fb281c0765e4b6358be4945134f0e28fb42a69b6cec99
                                          • Instruction Fuzzy Hash: B8E08C30805308EBDB10EFA4D50E6EFBFB8A705305F106595E80593240EB314A40D681
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 7
                                          • API String ID: 0-1790921346
                                          • Opcode ID: 9f43dd91c64abf2499da79f96a317b8af20f7d56381c6bbd14e8a810e85fac2f
                                          • Instruction ID: 5d146db33f43696baa31b6c7b527026134e9009a38c619dfe168c84f4152d0a0
                                          • Opcode Fuzzy Hash: 9f43dd91c64abf2499da79f96a317b8af20f7d56381c6bbd14e8a810e85fac2f
                                          • Instruction Fuzzy Hash: 6AE08C3080530CDBCB50EAE4A4056EEBBF8AB04204F403195D80693281E7301A45D682
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ugKr
                                          • API String ID: 0-2646332617
                                          • Opcode ID: f27345ffb298cca4d32ccfdd9c61f6ec6bb8794a346675f569fb47af34cd51a0
                                          • Instruction ID: 4c54b84422da17f0fa03b6725fe9974cdf57263a17b2c1a251d0c20b15afcbca
                                          • Opcode Fuzzy Hash: f27345ffb298cca4d32ccfdd9c61f6ec6bb8794a346675f569fb47af34cd51a0
                                          • Instruction Fuzzy Hash: 8AE09A74A052499FDB80DFD8D455A9DBBB6FF44310F209215E812AF39CDA3459458F40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: r
                                          • API String ID: 0-1812594589
                                          • Opcode ID: 839599a6022d5836d46d315812d6e61e0613ab4e7db1f460b94d4a6ce3e22c3c
                                          • Instruction ID: 4f52db35669f11f30854cfb1f9c3ffb3f953023e387389db4870a348c3bedc1c
                                          • Opcode Fuzzy Hash: 839599a6022d5836d46d315812d6e61e0613ab4e7db1f460b94d4a6ce3e22c3c
                                          • Instruction Fuzzy Hash: 12D05E3082E304EFD7858F20C1008FA7779EB4FB027307496D01A16166C3308902CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: r
                                          • API String ID: 0-1812594589
                                          • Opcode ID: 98ad39b4259d223f20b0a903ff17d9c53d371c03df01ceb857eb0f195bdb6f4c
                                          • Instruction ID: 8f92e97f2f2f23ac2149d2dc3da517c8b0e465d65cc5b5e0010e17a24fa4d093
                                          • Opcode Fuzzy Hash: 98ad39b4259d223f20b0a903ff17d9c53d371c03df01ceb857eb0f195bdb6f4c
                                          • Instruction Fuzzy Hash: 6ED0523082E304DFE3898E20D1008FA372AAA4BB02330348AD00A1A266C3318801CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26396daab495ed8731c295527778a87336ce08219d99f81a546f7077f24e0b6e
                                          • Instruction ID: 1a562805e3636448903080d8b15c28b6cb504d88978bbbb7073e4833e6b29c46
                                          • Opcode Fuzzy Hash: 26396daab495ed8731c295527778a87336ce08219d99f81a546f7077f24e0b6e
                                          • Instruction Fuzzy Hash: 64A11074E11319CFDB44DFA8D881AEEBBB6FF48300F20A665E419AB355DB306945CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa4d4d22ce37cfb4201be539f56d9a1467d97a1a83f9a99671f8f5ddaa2a0066
                                          • Instruction ID: b7f58b47ca4c2f0ef58e96c0d9db3c460d3ec148c1eaf8d13eed08d47af7d653
                                          • Opcode Fuzzy Hash: aa4d4d22ce37cfb4201be539f56d9a1467d97a1a83f9a99671f8f5ddaa2a0066
                                          • Instruction Fuzzy Hash: 28A11D70E15319CFDB44DFA8D881AEEBBB6FF88300F20A665E419AB255DB345945CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1231cc4485491332b3a50e98cc5ce57e22bc48fe3b46478f3db64da059f7a1bc
                                          • Instruction ID: e2767adfd4211fd8a6d7831f27eb8a37e8e8123f52b17c646cbab6e35dcad255
                                          • Opcode Fuzzy Hash: 1231cc4485491332b3a50e98cc5ce57e22bc48fe3b46478f3db64da059f7a1bc
                                          • Instruction Fuzzy Hash: 76910D74E11319CFDB44DFA8D981AEEBBB6FF48300F20A625E419AB355DB349945CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1eda88660ebf2fb97cbc68f9cf3d890ee251e35b239f7761fe72d0aeeb716998
                                          • Instruction ID: d605059867d1473541f44e2c0b7460dc2decd07579e459c72c8590819d575ecc
                                          • Opcode Fuzzy Hash: 1eda88660ebf2fb97cbc68f9cf3d890ee251e35b239f7761fe72d0aeeb716998
                                          • Instruction Fuzzy Hash: 64A19378918318CFDB50CF64C584AEEBBB9BF49305F61B595E80AAB351CB70A981CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c394401e767592b8cc4a798b569a4a1506bf30a7b0beb7791a427296cc402508
                                          • Instruction ID: 8678892333340a3e5c4f585df2499483235fcbdd2cd4e282ef5e58273b86be1a
                                          • Opcode Fuzzy Hash: c394401e767592b8cc4a798b569a4a1506bf30a7b0beb7791a427296cc402508
                                          • Instruction Fuzzy Hash: 1C819175E142198FDF51CFA8C880AEEBBB1EF49314F10A4A9E819EB311D7319A46CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34a783e07277574d84534ac151cd87533f784179ee272639ae366f8d67d03268
                                          • Instruction ID: 8424e7d253537cbc701b31a9f49899363cc5e79b01171dc763d4a84722fd8358
                                          • Opcode Fuzzy Hash: 34a783e07277574d84534ac151cd87533f784179ee272639ae366f8d67d03268
                                          • Instruction Fuzzy Hash: C6513974A01319CFDB94DF65D855BAEBBB2FF88300F21A595E90AAB305DB305D818F50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e260a4d348e592f7350fbe858fde51827b36060ee18e9b9b7ae42b694e703a28
                                          • Instruction ID: 7ee90f6b54c342d63f7514c552d8406a1570da60d14426d43c763b7111f144b4
                                          • Opcode Fuzzy Hash: e260a4d348e592f7350fbe858fde51827b36060ee18e9b9b7ae42b694e703a28
                                          • Instruction Fuzzy Hash: 19312071A0D388AFCB46DB748C148EF3FB89F8621471954E7E401CB653F5319D0A8360
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: faa91b1acb8ae4e2df5adfa73d34bd32c0c467fe3fbc18acd9cd3bdd7d4f8068
                                          • Instruction ID: 9252e68c16f4bfc7c4460f5626f93b95e6df90e01782a21b59f4ebf7cb294b79
                                          • Opcode Fuzzy Hash: faa91b1acb8ae4e2df5adfa73d34bd32c0c467fe3fbc18acd9cd3bdd7d4f8068
                                          • Instruction Fuzzy Hash: E541F474E202089FDB44DFA8C480AEFBBF5EB89314F10A56AE815E7344DB319A41CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5b26d3fbb506a2c50b0cdf895a8c39576661a399d39f91b4f67458902769861
                                          • Instruction ID: 3d6968021c4b57e62cbb04e30f53eb1c9f4dc0faab576d056c66774b5aaf5e55
                                          • Opcode Fuzzy Hash: e5b26d3fbb506a2c50b0cdf895a8c39576661a399d39f91b4f67458902769861
                                          • Instruction Fuzzy Hash: 98413870A06318CFD794DF65D845BADBBB6FF88300F20A695E80AAB314DB305D818F50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5518ee2964d07a0d7bce81ee9c1395cb154d2902a6fcfca8b8da7d6736ef948
                                          • Instruction ID: a5d5a261b9ba7002ced3132b64e7f78c445cddd755512e77bce0bdbe56a660e2
                                          • Opcode Fuzzy Hash: c5518ee2964d07a0d7bce81ee9c1395cb154d2902a6fcfca8b8da7d6736ef948
                                          • Instruction Fuzzy Hash: 79415B74E102089FDB44DFA8C490A9FBBF1EB89314F14A56AE815EB390DB319D41CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ced862643653e8ecddd8c71d8a93047e0d64f3443b7b3c4bf1478ed71010634
                                          • Instruction ID: b1a7925f117769c58e8e83bc69e5f29d6818b9e4dae976607e69722095f4855e
                                          • Opcode Fuzzy Hash: 4ced862643653e8ecddd8c71d8a93047e0d64f3443b7b3c4bf1478ed71010634
                                          • Instruction Fuzzy Hash: BF41F374E2030A8FCB55DFB9D85A5EEBFF5AF89305F14A426E802E7250EB309940CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38b38fa36b70921b69962ceaecf9f3db259dbc47554f7ad84f61e82bc9efdac5
                                          • Instruction ID: cf97943ff7752843b10681a50ceedb4739f2fb35b5f1ea0f74f4e415c9466527
                                          • Opcode Fuzzy Hash: 38b38fa36b70921b69962ceaecf9f3db259dbc47554f7ad84f61e82bc9efdac5
                                          • Instruction Fuzzy Hash: 2D31E174E2030A9FCB45DFB9D85A5EEBBF9AF49305F10A429E802E7250EB309900CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d6f3e71095527976dd1aed730f9b0e65724b89657f557e8211d52f3e340fdeb
                                          • Instruction ID: a960068af0fce3624d868da3c2a03a54719c3de88dd1c48e6b7d997559cfac48
                                          • Opcode Fuzzy Hash: 4d6f3e71095527976dd1aed730f9b0e65724b89657f557e8211d52f3e340fdeb
                                          • Instruction Fuzzy Hash: B23148B19103099FCF50DFA9D885ADEBFF9EF88324F14942AE818A7610D3359944CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef84a5a9d57b748a41a6863399899da572654fbe79e9afe56fddc3d76eccdbc8
                                          • Instruction ID: bc771c2a430986f609b0136172952d80c2b3db20b01d8757acbc86babdd203a5
                                          • Opcode Fuzzy Hash: ef84a5a9d57b748a41a6863399899da572654fbe79e9afe56fddc3d76eccdbc8
                                          • Instruction Fuzzy Hash: FE41E634909318CFDB54CF94C984AEEB7BAFB09304F60B595E40AAB215CB30AE81CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 285f3eda710545ff88d6de821ccbbbef1136f204e667060fec669d01bac2e44b
                                          • Instruction ID: de82e246dbf731b45b309c0d0be80ecc928264a2b46dacd15fe7d3b52b7aad91
                                          • Opcode Fuzzy Hash: 285f3eda710545ff88d6de821ccbbbef1136f204e667060fec669d01bac2e44b
                                          • Instruction Fuzzy Hash: C0414970A06319CFD794DB54D855BE9BBB6FF88300F20A695E90AAB205DB305D818FA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c7e33e12ca2c88f9ce4b486aa2e7c17b34d750d7a107cf61340e7ebe99cb9ff
                                          • Instruction ID: 6a38548a592c76dd5a4b30f611b1d54afb3a423d2e7e2797a83721e31a504740
                                          • Opcode Fuzzy Hash: 9c7e33e12ca2c88f9ce4b486aa2e7c17b34d750d7a107cf61340e7ebe99cb9ff
                                          • Instruction Fuzzy Hash: A731C334909318CFDB54CB64C980AEEB7BAFB49305F607595E40ABB215CB71AE81CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 516d9b56d44462dfb67dab80b694c5149ed0c88c138a28e9890bb3efcee25edd
                                          • Instruction ID: 4f8c9ff026af965f86396374c002d0236f41ddd2632bd2829bb0e62962ff396d
                                          • Opcode Fuzzy Hash: 516d9b56d44462dfb67dab80b694c5149ed0c88c138a28e9890bb3efcee25edd
                                          • Instruction Fuzzy Hash: 00311670D19209DFDB84DBA9C5415FFFBFABB48B00F74B1A5D419A6201D7309A41CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bbdab1277c7005cd9333b748b99d976ae67b09b3c0bbe56a851eb46f94797410
                                          • Instruction ID: 569c2d1af94dca6db3e030b4eea56f0cb7d685d8012faac6c6cb4e71a7952115
                                          • Opcode Fuzzy Hash: bbdab1277c7005cd9333b748b99d976ae67b09b3c0bbe56a851eb46f94797410
                                          • Instruction Fuzzy Hash: 7B31C234A09318CFDB54CB54C984AEEB7BAFB49345F607594E40ABB251CB30AE81CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a99a330ef74352ae273ad4c482792f20046dc0eedc8709d54651267bc5bff935
                                          • Instruction ID: ef84bc44871b69f68106e2e55dcf9b9dcf99459088c713e5340860a3087f1548
                                          • Opcode Fuzzy Hash: a99a330ef74352ae273ad4c482792f20046dc0eedc8709d54651267bc5bff935
                                          • Instruction Fuzzy Hash: 2F315070905305CFD798DF68CC49AE97BB6BF45344F11B695E40A9B315D7305941CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1945f46cece9d0b4c40c0c06d0e1b5ab6c4c41d7debab947d359ff865f4adec
                                          • Instruction ID: 208ff3c24e0c1475b4358886b2861e283c682a47de14f7d947b06ffaa3f3da86
                                          • Opcode Fuzzy Hash: d1945f46cece9d0b4c40c0c06d0e1b5ab6c4c41d7debab947d359ff865f4adec
                                          • Instruction Fuzzy Hash: 4A213775A003254FD752DF789C905EFBBFAEFC4260B25552AD458CB341EA308906C7A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2076661835.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b3d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa5445970b8e6f52e055485e43d6ed9bd42de182b336a54bdfefe681eda7d18a
                                          • Instruction ID: 2c8e7344a21d2cc4a2e1f1c581c03723a349b763df4299ab19e2627875faf5e7
                                          • Opcode Fuzzy Hash: aa5445970b8e6f52e055485e43d6ed9bd42de182b336a54bdfefe681eda7d18a
                                          • Instruction Fuzzy Hash: 9021F8B5504244EFDB05DF14E9C0B16BFA5FB94314F34C5A9D9090B356C336E856C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e6abd15bbb8a01fc64f0454cfc9bccdf87efa298941d672824bc75c3b72662e4
                                          • Instruction ID: b075ff948166dd50c2e359372bfeb90c114acb17095608caebb76b45b019307b
                                          • Opcode Fuzzy Hash: e6abd15bbb8a01fc64f0454cfc9bccdf87efa298941d672824bc75c3b72662e4
                                          • Instruction Fuzzy Hash: 2A314FB4E1021ADFDF40DFA9D5856EEBBF4AB08214F24A46AE814F7345E7349A40CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2077824036.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d4d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cae2a5011a5dacaad4239f38651f839255f48734ccc27f9df01d8d76f36f3f20
                                          • Instruction ID: 6f80205efec37240587f235c98248eb226a1aba0a0e583aac8fc160f03d30aff
                                          • Opcode Fuzzy Hash: cae2a5011a5dacaad4239f38651f839255f48734ccc27f9df01d8d76f36f3f20
                                          • Instruction Fuzzy Hash: CE2126B1604200EFDB05DF14D9C0B26BBA6FB84314F38C66DE9494B396C3B6D806CA75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2077824036.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d4d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 626a8fccb0a5fa2630fef6bcb072a1f522e0cd4ffd01287e543325300d5734fd
                                          • Instruction ID: 222eca1125c7f7d83b009fb8d74e206973dd625ae52a4dfc4af276c8edb967f4
                                          • Opcode Fuzzy Hash: 626a8fccb0a5fa2630fef6bcb072a1f522e0cd4ffd01287e543325300d5734fd
                                          • Instruction Fuzzy Hash: C121F2B1604240DFDB14DF14D9C4B26BBA6EB84314F38C56DE84A4B286C33AD807CA71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5454791fb3d1f72eef5dca3e2abc9f4b93588fdd44ea0997d97075958ea1d1f8
                                          • Instruction ID: 40f2810e941b3e17ce13b03b32c0a72f38a5cb08f2e4c7ab138f1386c6f42267
                                          • Opcode Fuzzy Hash: 5454791fb3d1f72eef5dca3e2abc9f4b93588fdd44ea0997d97075958ea1d1f8
                                          • Instruction Fuzzy Hash: 6431B4B4D1024ACFCF51CFB9C5456EEBBF0AB48214F20A56AE814F7295E7349A41CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ed42737970677bad0fdf4c38c7ebdce1c232bf3838b61f6dd50904f22727f21
                                          • Instruction ID: 9a7306c23913c3d591aebff072c7f692dea9f7a072f449259edfff5ee9de0346
                                          • Opcode Fuzzy Hash: 6ed42737970677bad0fdf4c38c7ebdce1c232bf3838b61f6dd50904f22727f21
                                          • Instruction Fuzzy Hash: D0313C74E05309CFDB94DF65D9856EDBBB6BF84300F24A195E80AAB305EB3059418F60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f0fad41234d7ca039e9db26ae86527ef0e1f42d75d87f56a838749a8f72faa7
                                          • Instruction ID: d1b6fc41dbb3fe5dcf6784f67891496a681a1828f0bb51f676da79a268ecaa9a
                                          • Opcode Fuzzy Hash: 1f0fad41234d7ca039e9db26ae86527ef0e1f42d75d87f56a838749a8f72faa7
                                          • Instruction Fuzzy Hash: 4921D634909308CFDB54CB64C584AEEB7BAFB49345F607594E40ABB251CB31AD82CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86acca6f0ee861586f2d7e3e1c1db5f24763e059aaa81ea836a06316fd30bbc3
                                          • Instruction ID: d8ab157d733ac216c24530c8272f819c9311410119f7c0eb64f6590f34a8e4ec
                                          • Opcode Fuzzy Hash: 86acca6f0ee861586f2d7e3e1c1db5f24763e059aaa81ea836a06316fd30bbc3
                                          • Instruction Fuzzy Hash: D9215070D1431A8FDB44DBA8C9106FFBBB6FF89300F20A565E815BB251DA345E45CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 11f9e3c8410ba5b1197fccddd89b3c4953612aa40481b37798a2f1abf5929b24
                                          • Instruction ID: 4a9ef7016dc33fd5595dc7703343a8582dcfa256c215d60b344298cb5cbda442
                                          • Opcode Fuzzy Hash: 11f9e3c8410ba5b1197fccddd89b3c4953612aa40481b37798a2f1abf5929b24
                                          • Instruction Fuzzy Hash: 6E31CDB0C11218DFDB60CF99D989BCEBFB5AB48314F24A51AE408BB250C7B55885CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db8e0b8710d16a60f4b54567cca0e02298bc8f3a43f1003456d4545c772ee5ff
                                          • Instruction ID: 92d1e18389d7add795c0169adbf6a4acb709250ed8a48c40f6c5680bf9c11ad7
                                          • Opcode Fuzzy Hash: db8e0b8710d16a60f4b54567cca0e02298bc8f3a43f1003456d4545c772ee5ff
                                          • Instruction Fuzzy Hash: A0117971E19308DFDB80DBA9D9446EEBFB4EB8A310F10B0A6C419A7252DA705A05CB81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d57b831487a0af0b061e6f08c0ba2f9c7f0fdef0d5abbf523059607fd660b849
                                          • Instruction ID: 323978069ceeaa3cd16456db0b4ab13004f7c3bdf2a54f4b16ee15c701837093
                                          • Opcode Fuzzy Hash: d57b831487a0af0b061e6f08c0ba2f9c7f0fdef0d5abbf523059607fd660b849
                                          • Instruction Fuzzy Hash: A031CEB0C003189FDB60DF99D989BCEBBF4AB48314F24A51AE408BB240C7B55845CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 374067b31b3800ee03f272128438e75ead642d1aba6011f77950230ced15e364
                                          • Instruction ID: 39165245a4ff5b9d963021941e631fa1f6d5a3db93387936ee052fd00cc68b96
                                          • Opcode Fuzzy Hash: 374067b31b3800ee03f272128438e75ead642d1aba6011f77950230ced15e364
                                          • Instruction Fuzzy Hash: 47216070D1421A8BDB40DFA9C9416EFBBB9FF89300F20A625E4157B241DA346E45CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a5522cb39aeeb5bcac9d35f92f69a930bd7d140b74089c84322f869b9526c620
                                          • Instruction ID: bb7de1007f47bf1b3fd71f0029568df5bd8ca702043266c7b137ab5410fca2ab
                                          • Opcode Fuzzy Hash: a5522cb39aeeb5bcac9d35f92f69a930bd7d140b74089c84322f869b9526c620
                                          • Instruction Fuzzy Hash: 4F212CB4919304CFDB90EFA8D5969EABFF9BB08345F14B165E406AB316DB309840CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2077824036.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d4d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 974415937076139334dc5d3fc7081881e62ea5318493c0d48837a2412cc01ba4
                                          • Instruction ID: 11581153e9e9d912597b7efd1811a49c8cdbde0068ff0990f0af28beefa37544
                                          • Opcode Fuzzy Hash: 974415937076139334dc5d3fc7081881e62ea5318493c0d48837a2412cc01ba4
                                          • Instruction Fuzzy Hash: 9B2192755093C08FCB02CF24D994715BF72EB46314F28C5EAD8498F6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 026309d2b291d9c3adb10c0edaf3f88301d5aa34908384b95e22ab95c45f6968
                                          • Instruction ID: 93910999f018b31a8add1def0c3c545f720ab1a140a52dea610358c7c28b5d56
                                          • Opcode Fuzzy Hash: 026309d2b291d9c3adb10c0edaf3f88301d5aa34908384b95e22ab95c45f6968
                                          • Instruction Fuzzy Hash: 4E114C35E0A318DFD749CFA6C9448EFBBBAAF89704F14A069E405A7251DB309905CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e44d87501219fcf76091de007eeecd67e41c18ed4d298a7f1fc8f30c2ba29f6d
                                          • Instruction ID: db128ea27c77732a3961d9fa2b58fafb077acd8edca55e9afc50f3264f350d6b
                                          • Opcode Fuzzy Hash: e44d87501219fcf76091de007eeecd67e41c18ed4d298a7f1fc8f30c2ba29f6d
                                          • Instruction Fuzzy Hash: AE117330F143199FDB6C9A79DC106FF7AA6AF84B54F14A929E905D7381EB3489408FD0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c9a3badaf341f97832095619a3805783bb11f331fdb73f4fe369dad6bffd28c4
                                          • Instruction ID: 9dcf8b350b6f2b37fcb64a6cfd67eaf61c61a882046e5a2a5c1c527be19f6e77
                                          • Opcode Fuzzy Hash: c9a3badaf341f97832095619a3805783bb11f331fdb73f4fe369dad6bffd28c4
                                          • Instruction Fuzzy Hash: 15113D3590A314DFD749CF66D5448EEBBB6AF89700F24B06AE405A7650DB304941CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e80dfe35657410d83c6f9cfaf436117090c4c98e2d264ac32885b1d4f0bbf9b
                                          • Instruction ID: 42c5403756edb650130e7305061555401e7ef79c068c23a9a08e241b933ef549
                                          • Opcode Fuzzy Hash: 3e80dfe35657410d83c6f9cfaf436117090c4c98e2d264ac32885b1d4f0bbf9b
                                          • Instruction Fuzzy Hash: 92115E31E0A318DFD749CF66C9448EFBBB7AF89700F24B06AE406A7251DB308905CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75c6fb87db717fc32aef91d1d5e7bb53fed62d8c07294305117cae8bcc505a7d
                                          • Instruction ID: 99aabc66bc06dace4aa3cd1c617550d9228f12e125a4182c6cdd44e7e14eaf05
                                          • Opcode Fuzzy Hash: 75c6fb87db717fc32aef91d1d5e7bb53fed62d8c07294305117cae8bcc505a7d
                                          • Instruction Fuzzy Hash: 6311EAB4E19318CFDB44DF9DD8406EFBABAEB89300F10F1B9D109A6215D73059458F91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d729fde871efe4b95b99855c0d51634c0361220c5bc157560383be5fac351ff1
                                          • Instruction ID: f8cb1a2cc9d501f54df0eed5768d35f4f6c00cc9e498e96fcd85045b682aa731
                                          • Opcode Fuzzy Hash: d729fde871efe4b95b99855c0d51634c0361220c5bc157560383be5fac351ff1
                                          • Instruction Fuzzy Hash: 1F2108B1D056588FEB18CF67C9943DEBFB2AFC9304F04D06AD409A6268DB7409498F90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3366ba274f884fe685eaaeb0dcce71a575a5442d4ff2c601a8a9c189ea126a45
                                          • Instruction ID: 3fd67bffdd9a5a13801db7c3896e34da0bfc64ad8f767dcc755684088186ae5c
                                          • Opcode Fuzzy Hash: 3366ba274f884fe685eaaeb0dcce71a575a5442d4ff2c601a8a9c189ea126a45
                                          • Instruction Fuzzy Hash: AD112B75E09318DFD749CF66DA448EEBBB7AFC9700F14A06AE405AB355DB309906CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2076661835.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b3d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                          • Instruction ID: fb0aefc66b5f18a43d0e696122975680a0ab2fc6dc31986ee02bb0eca132a67c
                                          • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                          • Instruction Fuzzy Hash: DB11E176504240CFCB02CF10E5C4B16BFB1FB94324F24C2A9D8490B756C33AE85ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2006723af2834df7a37fa88400bad227bc2bb4708c9ab6488a40ab61b0025713
                                          • Instruction ID: a40e949ecd03f9808fd5f8dec0cbfe88fde0ef9cb858726d2f55a0d06682c549
                                          • Opcode Fuzzy Hash: 2006723af2834df7a37fa88400bad227bc2bb4708c9ab6488a40ab61b0025713
                                          • Instruction Fuzzy Hash: 1321F2B5C003499FDB10DF9AD844ADEBBF4EB88310F10841AE919A7210C375A954CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2077824036.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d4d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction ID: 18b0f622136dbfb81ec2d5f1fea3e065a8bce43c4df8a20dbcc3101529d4bb86
                                          • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction Fuzzy Hash: AB11DD75904280DFCB02CF10D5C4B15FBB2FB84314F28C6ADD8494B696C37AD80ACB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9cfc3a92d020ee4e0b36e2313b955504bd5dfe1c77ebede189b416e08f5f7b4
                                          • Instruction ID: e874d4b5740343bf6c4698a9a91443f660febea2ad4afb837afe973676719c7b
                                          • Opcode Fuzzy Hash: f9cfc3a92d020ee4e0b36e2313b955504bd5dfe1c77ebede189b416e08f5f7b4
                                          • Instruction Fuzzy Hash: 4A11E875E09318DFDB48CFAAD5449EEBBFBAF89700F10A069E405A7254DB709941CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e237d8701868f887045e939b1d08804f0b437a5d20f2c9d21b3ab5a9cd4ff69
                                          • Instruction ID: 5b7de14641761f1951c66bd2f4160b38cf816e2b72a13f887f2d528af182bc26
                                          • Opcode Fuzzy Hash: 9e237d8701868f887045e939b1d08804f0b437a5d20f2c9d21b3ab5a9cd4ff69
                                          • Instruction Fuzzy Hash: 9211B0B1D006188BEB18CFABC9557DEFAF6AFC8300F14D06AD509BA268DB7509458F90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15c1d2b035778777c652575d3caf141fa3e627442c3e503be4a4b67217fef542
                                          • Instruction ID: 665d8bf62088171e14fd53ff0e70de2d8f58e5a7a203620ee695cadd88f71090
                                          • Opcode Fuzzy Hash: 15c1d2b035778777c652575d3caf141fa3e627442c3e503be4a4b67217fef542
                                          • Instruction Fuzzy Hash: 8801D47290D3C5AFCF469B749D914DB7FB59F8611470A90D7D050CB163F2219905C760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 91e2a3f6e52112add1c7d27689bb369a557a3a95b93cad6fa4ad7a100848cfef
                                          • Instruction ID: 870adcfaf34a8b2e8855718e4947f79685a87812c3cc9521bc23f809961d386c
                                          • Opcode Fuzzy Hash: 91e2a3f6e52112add1c7d27689bb369a557a3a95b93cad6fa4ad7a100848cfef
                                          • Instruction Fuzzy Hash: 68015E35A19208DFD744DFA9CA54AEABFF5AF49700F25A0D5E50A9B361D630DE00DF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1399518466e5ee9bef8512d2bb998080a582c3a05cef3ba9467d446d714df8c
                                          • Instruction ID: d03d0a4422cd3e1bfecea8a10eba8dde729b61573fbf20a1e4f6a6ec0c6a97b0
                                          • Opcode Fuzzy Hash: a1399518466e5ee9bef8512d2bb998080a582c3a05cef3ba9467d446d714df8c
                                          • Instruction Fuzzy Hash: 1F01B13091C344CEE744CB65D1405EABFB99B8A748F24F5A6E00AAB112D7304E04DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2076661835.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b3d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb66117c68366ade04077c2999dcb2f7f4c84ccc49c8f2f762af4ff777a83e02
                                          • Instruction ID: 61b5c541ee91e8985c0bf165a311747f1aed682fa95841bc67fb95d07d237578
                                          • Opcode Fuzzy Hash: bb66117c68366ade04077c2999dcb2f7f4c84ccc49c8f2f762af4ff777a83e02
                                          • Instruction Fuzzy Hash: B401A2B1108340DAE7109B29ECC4B66BFE8DF51364F38C99AED090A286C7799C44C6B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 160046719af20ec0020d3d8b63d949dbc204a3277eb45246c48955a9c30da86c
                                          • Instruction ID: 780de39dc3c4942b9cea6df3bcbef504d1467ce1e2a402991eb0655682003c8a
                                          • Opcode Fuzzy Hash: 160046719af20ec0020d3d8b63d949dbc204a3277eb45246c48955a9c30da86c
                                          • Instruction Fuzzy Hash: 3A01ED34909308CFD758CB54C980AEDB7B6FB4D345F647498E40AAB252CB719D81CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9da85bb6eac486e634096502b4994a58517a2f2551c740cae5f0405a92c11378
                                          • Instruction ID: 0305d78b66fdda3e579ab5339292ebd92c39f467dafec1e555e188b8831bf28f
                                          • Opcode Fuzzy Hash: 9da85bb6eac486e634096502b4994a58517a2f2551c740cae5f0405a92c11378
                                          • Instruction Fuzzy Hash: 81012C74A18208DFD744DFA9C644AEABBF9AB49700F24E095A5099B351DA309E40DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 95d7252c14eebfe67a38adaeda1240c127d4f0856720725ec0a63396c9c0d312
                                          • Instruction ID: 0c0cd709eb99e97945f13c305a590a9b831071fff470412c6673591455d8b360
                                          • Opcode Fuzzy Hash: 95d7252c14eebfe67a38adaeda1240c127d4f0856720725ec0a63396c9c0d312
                                          • Instruction Fuzzy Hash: 5701EC74E042199FCB50DFA8C5416EFBBF9EB48300F10A5AA9818E7340E7319A01CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 895c0d40f1a9ee941484508084d779f3c5f066370bde47578865cac9baac758b
                                          • Instruction ID: 4030cc3833e82dfdaa5a162e9bf5672beca845b422df86a9ad3914ee9d909e45
                                          • Opcode Fuzzy Hash: 895c0d40f1a9ee941484508084d779f3c5f066370bde47578865cac9baac758b
                                          • Instruction Fuzzy Hash: 9A0108B4D0530A9FCB41DFA999056EEBFF4AB45300F0195AAA805E7341EB308A14CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0057edd21e99b46ba8337998bd9eefd99a1129f6ba416edca70807ff8ee0941a
                                          • Instruction ID: 158e48cccc5fcbbd9a6fb0bf5b6d5be75f2ba2c4a6a9766d750bb16e3b3c3d1c
                                          • Opcode Fuzzy Hash: 0057edd21e99b46ba8337998bd9eefd99a1129f6ba416edca70807ff8ee0941a
                                          • Instruction Fuzzy Hash: 63F08C7090C309DFE744CF56D5409EAFBB9AB4A744F20F5A5A40AAB211DB309A44DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 11abb490bb695cb25a28214b8f596de1ce304f9593c933f613b3622c1d30da3a
                                          • Instruction ID: 8bd59ca9d8af95f334353d8e1d801bfa2e5515199b10f52c3d69f47c4cbaf257
                                          • Opcode Fuzzy Hash: 11abb490bb695cb25a28214b8f596de1ce304f9593c933f613b3622c1d30da3a
                                          • Instruction Fuzzy Hash: 85012874E052099FCB41DFA8C9416AFBBF9EF49300F1094AE9818E7341E7308A01CB92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1d3d123ddd4094ad3c8043d20f7b118ca62805f36fdd0a39034295d3b2ddd7c
                                          • Instruction ID: d193538084901e81f96ece0c3c0e58af76bd37c266e52e5557408d88e32b7ddf
                                          • Opcode Fuzzy Hash: e1d3d123ddd4094ad3c8043d20f7b118ca62805f36fdd0a39034295d3b2ddd7c
                                          • Instruction Fuzzy Hash: 01010834905308CFD754CF14C985ADDBBBAFB49345F607498E40AAB226CF31A981CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fed7eac8e67bd5910308c3b33461118ef526c78d00a0c24d38eb69dde70a75e5
                                          • Instruction ID: e3deeece85e146ba45a0bc079d257e96bd5c71009889f623744025e247f84b4a
                                          • Opcode Fuzzy Hash: fed7eac8e67bd5910308c3b33461118ef526c78d00a0c24d38eb69dde70a75e5
                                          • Instruction Fuzzy Hash: EFF019B4D09309DFCB41DFA886041AEBFB1AB89300F21A5AAE844E3710E7308A04CB55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1a26e1b561aa47408d8d8914e3fe5dc8e7527156728c215e2c692e295057327
                                          • Instruction ID: 74be626094d1f89bc8a3f2883b67227c4cb8665f8756860bebb0e926168d1701
                                          • Opcode Fuzzy Hash: d1a26e1b561aa47408d8d8914e3fe5dc8e7527156728c215e2c692e295057327
                                          • Instruction Fuzzy Hash: 6701F6B4D143099FCB54DFA9C5052EEBBF8EB08300F10A56A9809E7340EB308A00CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2076661835.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b3d000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e64eb78104ec0635b6d4c210cba10f96167c61fe8c2096379542772407596d2
                                          • Instruction ID: d45a5f309306707dd204ac11a6ffba1a4d7291de620eed7abd79c5cdb3592a96
                                          • Opcode Fuzzy Hash: 4e64eb78104ec0635b6d4c210cba10f96167c61fe8c2096379542772407596d2
                                          • Instruction Fuzzy Hash: 18F0C2714043409EE7108A0ADC84B62FFE8EF50734F28C59AED080B286C3799C44CAB0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 331a75d5e570b9fab7493bab03b989f8144b04147f29523dbc4046662dc4a9e0
                                          • Instruction ID: 725b71a0f5e23e9a833e3cc2e3941bcd98b4f561e71d7dde9c824903b6a1c4be
                                          • Opcode Fuzzy Hash: 331a75d5e570b9fab7493bab03b989f8144b04147f29523dbc4046662dc4a9e0
                                          • Instruction Fuzzy Hash: 78F0FF74E042189FCB41EFA8C5456AFFBF4EB45314F10A5AAD815E7341DB759A05CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6b2529ef46783f24d916befb599ac0c57857bf00da5f9bac87779a5f157a4d9
                                          • Instruction ID: 64e004d8211fb34d1bd3bf7f1736d5626e94601c6cc681f4fe60ffb4ce7d3a61
                                          • Opcode Fuzzy Hash: b6b2529ef46783f24d916befb599ac0c57857bf00da5f9bac87779a5f157a4d9
                                          • Instruction Fuzzy Hash: 48F0FF74D14308DECB84EFB886151DFBFB9AB99204F00B5A6E414E3311E7704544CB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 28661b548fc6f152e35b982e03785c1fab630c50332f6fb2a4605cd09aef6fa9
                                          • Instruction ID: 1647bbcdefd4b8695d580a0c3216e2222b3550e6b2835a3b1db2f21a0f3705f0
                                          • Opcode Fuzzy Hash: 28661b548fc6f152e35b982e03785c1fab630c50332f6fb2a4605cd09aef6fa9
                                          • Instruction Fuzzy Hash: 4DF037B4D05309DFCB45DFA999411AFBFF4AB49304F14A5AAE814E3351E7308A15CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c6be83b111e887ea99b8eae562cb4ac6480e98b42c1f62eede3c55152daa99a
                                          • Instruction ID: 7706fa5417cc027c422b7012149e0fd1b94a96fe628e285d3fdd2442e3d0118e
                                          • Opcode Fuzzy Hash: 9c6be83b111e887ea99b8eae562cb4ac6480e98b42c1f62eede3c55152daa99a
                                          • Instruction Fuzzy Hash: 8BF04974D19248DFCB41DFB8D5061EEBFB5EB0A204F00A9AAE814E3221E7344A14CB41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a06607762978b2c96c8f7b498c07eb49c3113f5c4b99b7b997151edcfce2b0c
                                          • Instruction ID: 412f731e0acf9155dec06c955523ed35addd5e602e3871f98391ae0c01743e7b
                                          • Opcode Fuzzy Hash: 6a06607762978b2c96c8f7b498c07eb49c3113f5c4b99b7b997151edcfce2b0c
                                          • Instruction Fuzzy Hash: 34F0E7B4D0530ADFCB41DFA9D5455EEBBF8BB48300F10A56A9818E3345EB309A11CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 980bfdca03753080954206b625ef46ee2c17669ed28f23ec93303d765efddfc7
                                          • Instruction ID: 8d2ef758070e6ea4042686c257e03e94ecd796be8887813e99fe2610b8cfa473
                                          • Opcode Fuzzy Hash: 980bfdca03753080954206b625ef46ee2c17669ed28f23ec93303d765efddfc7
                                          • Instruction Fuzzy Hash: B8F097B4D053099FCF44DFA9D5455EEBBF9BB88300F20A56AD819E3700EB309A00DB95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15543e6d0596c4439f956d674c89b3b77b324f261d7078997b26a5276cafd43d
                                          • Instruction ID: 2db621ea485ae865cabb08ca6d0fc348206164fd076ec1d982db2848232b3e24
                                          • Opcode Fuzzy Hash: 15543e6d0596c4439f956d674c89b3b77b324f261d7078997b26a5276cafd43d
                                          • Instruction Fuzzy Hash: 6DF0EC34515314CFD754CB14C9849EEB7BAFF0A345F607494E40AAB221CF31AD81CE40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fdba207f56e2fb70e1f7953ebbec88ab611872f5bacf7dad99a46f99caf3372d
                                          • Instruction ID: 0a0e6e8fb9181fb069ad600e0c962f1fce9314d8a5306162bc41f179cb930c60
                                          • Opcode Fuzzy Hash: fdba207f56e2fb70e1f7953ebbec88ab611872f5bacf7dad99a46f99caf3372d
                                          • Instruction Fuzzy Hash: F401E4B4915705CFC750EFA8E5899EABBF9BB08345B11A514E4069B215DB309840CF94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5056b30f2bc39b613cfc8fc4e5eb51017cd3d437b662fa20a1d268ab43c9542b
                                          • Instruction ID: f2ab4256fc0961065b2d495b00de917ec906481bc12f4c93715afc63b5bbfcd6
                                          • Opcode Fuzzy Hash: 5056b30f2bc39b613cfc8fc4e5eb51017cd3d437b662fa20a1d268ab43c9542b
                                          • Instruction Fuzzy Hash: 8FF0A4B4D14218DFCB44EFA9D5456EEBBF8EB08304F00A9AAD818E3300E7705A41CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08ce3a0aee6958e913a5afd4754434bd8ffb76c16fcbd9d4fbe99b6323e70eee
                                          • Instruction ID: b6f634844e10e98ae1c147e58511b6359f7f3e2a3d1da4a50be71a1812924977
                                          • Opcode Fuzzy Hash: 08ce3a0aee6958e913a5afd4754434bd8ffb76c16fcbd9d4fbe99b6323e70eee
                                          • Instruction Fuzzy Hash: 2CF0B7B4D14218EFCB80DFB9D5465EEBBF8AB08300F10A9AAD818E3310E7705640CF41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94f0ccee8ebea10ffb917d3d78b395227a4cdc32c01ff33142cdd250f8ad2ae5
                                          • Instruction ID: 1a0e16235f4dedb9e801661309689a9cc00233369c4d35245b254ec93ee078da
                                          • Opcode Fuzzy Hash: 94f0ccee8ebea10ffb917d3d78b395227a4cdc32c01ff33142cdd250f8ad2ae5
                                          • Instruction Fuzzy Hash: 92F0DAB0D0430A9FDB44DFA9C841AAFBBF4EB48600F1095AAD918EB201D7749500CFD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e889cdf998e44fa11f92d9d13f7d8e683d3ff0e5ffb23a54d689faf9676ef3bb
                                          • Instruction ID: 5c092c71a1dc5245981dd79d9ae1f182b570fb38cec36e5b00776df4adf7f688
                                          • Opcode Fuzzy Hash: e889cdf998e44fa11f92d9d13f7d8e683d3ff0e5ffb23a54d689faf9676ef3bb
                                          • Instruction Fuzzy Hash: 19F0DAB0D0430A9FDB44DFA9C842AAFBBF4EB48600F109969D514EB241E7748605CFD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8683febeb0c032a26a84bba4de14996d09e3100909f78ce7b302adc62d2464a0
                                          • Instruction ID: fa984249529c7783043eeccb2dfa6ceb5d1f36fe2f414b8ce30fb639e257eb69
                                          • Opcode Fuzzy Hash: 8683febeb0c032a26a84bba4de14996d09e3100909f78ce7b302adc62d2464a0
                                          • Instruction Fuzzy Hash: C0F0C474915304CFDB54DFA4D5495ADBBB6FB48301B21A528E80A9B355DB309841CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9c9b14b74e82e5ae5ce824de2eac08fffdf7058878ffc2702f03d244cdf069d
                                          • Instruction ID: de4b119ac242af363502223c76b60ade87c6998085b26fe373ee5307cb22b97d
                                          • Opcode Fuzzy Hash: a9c9b14b74e82e5ae5ce824de2eac08fffdf7058878ffc2702f03d244cdf069d
                                          • Instruction Fuzzy Hash: ABF09234915318CFD758CB24C985AEEB7BAFB4A345F607498E40A6B221CF71A981CE40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58026bd63786e7d00b3d0533a5a1202b6f33dd4261d15fc60e32f8c2722c2289
                                          • Instruction ID: edb8b2261118443f23f8b9e648dfa7511ace4c434cdda3af9a497f0c9e149a7f
                                          • Opcode Fuzzy Hash: 58026bd63786e7d00b3d0533a5a1202b6f33dd4261d15fc60e32f8c2722c2289
                                          • Instruction Fuzzy Hash: CEF0A574D15308AFCB90DFB895456AEBBF8AB09200F10A5A9944AE3300E7305A40CB45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad24159841dd9930daf6d90f31bd52fb0c67bdcd1225ab67cad06affebe800f2
                                          • Instruction ID: a624d708b197d75aacff306408d06831ad5baf94fa187b5edb180adb479c3b95
                                          • Opcode Fuzzy Hash: ad24159841dd9930daf6d90f31bd52fb0c67bdcd1225ab67cad06affebe800f2
                                          • Instruction Fuzzy Hash: 61F0BE70A0A355CFEB94CBACC986AEA7BBAEB05200F5076B9D0059B566DA200940CB10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06d0a59966e2a8d7cc108865b9a8a9109ed9c0e02bd1201a254bb0b23ec59fa8
                                          • Instruction ID: 41d2d7058c882d00c2a4d8f8347427b4b45660c8a88eaefc3451ac01fa7b92c8
                                          • Opcode Fuzzy Hash: 06d0a59966e2a8d7cc108865b9a8a9109ed9c0e02bd1201a254bb0b23ec59fa8
                                          • Instruction Fuzzy Hash: E6E06570A4A315CFEF80CF5CDD866EA77BAFB09204F1176B8D40A97115DA305980CE50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8883ab10bf2bf5332b3d09c739b537a1c9ae00faa7152ec0ed27beb337c421f9
                                          • Instruction ID: 1c7382a9ed598778835524ab9b019a6af191cdfba124f07bc28137d3ba72b0ff
                                          • Opcode Fuzzy Hash: 8883ab10bf2bf5332b3d09c739b537a1c9ae00faa7152ec0ed27beb337c421f9
                                          • Instruction Fuzzy Hash: 1AE0D8B08193468FEBE1B7EAD815BEA7FBDDF44340F00B520D5065A285DE745849CBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eac43f45687fbd8279603be5199574979ff2469e5ee3410a21542a3329db48a1
                                          • Instruction ID: 5c76913d33d859285b8e8534eff3b5fd31fb76a9f4cb4d3c0bcb5035f8cad0a9
                                          • Opcode Fuzzy Hash: eac43f45687fbd8279603be5199574979ff2469e5ee3410a21542a3329db48a1
                                          • Instruction Fuzzy Hash: 17F01C35D10208EBCB44EFA9E504ADDFBB5EB88311F10D1BAA819A7350E6745A50DF41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc6ec4958308ae8376c5bd521d8fb6bedd6f5075d3bab376174eda85ea5e4d31
                                          • Instruction ID: 288668c5a7ca5ad3933f74eaecc4559b9a8721c186d5ea8e11fce2f6f894833d
                                          • Opcode Fuzzy Hash: bc6ec4958308ae8376c5bd521d8fb6bedd6f5075d3bab376174eda85ea5e4d31
                                          • Instruction Fuzzy Hash: C3F07F34A0A318DFD745CBA5D1848EEBBBABF49705B206064E409AB211D731ED42CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66151a0ddcbbd4cb9c0f13898ae406470b263d5227ae10b2454c90cbf2b9afba
                                          • Instruction ID: 2930567b8e9c36169671db26a9e05f437c8954d84bd426ca7cf3fdcd07935886
                                          • Opcode Fuzzy Hash: 66151a0ddcbbd4cb9c0f13898ae406470b263d5227ae10b2454c90cbf2b9afba
                                          • Instruction Fuzzy Hash: F6E065B0D46305CFEF80CB5CC9846EE777AEB05200F107574D006A7115CA300940CE50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4f9422076be2ae59bcfeeb882d31d1aed999e25f9b2036ad05a866a8642f46c
                                          • Instruction ID: 74c8bae31975dc5824a92e857aa533834ff465b292c1e9c9092eb6b7956598e3
                                          • Opcode Fuzzy Hash: e4f9422076be2ae59bcfeeb882d31d1aed999e25f9b2036ad05a866a8642f46c
                                          • Instruction Fuzzy Hash: 0DF01534D10208EBCB44EFA9D405A9DFBB5EB48310F10C0AAA818A7340DA345A50DF41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40abab00255d48ee124f3f5b78e5e162de7d2a1df5bf8d6892be7055ddacdcde
                                          • Instruction ID: 246ce4f979db36b2259de0c8a43ed00e30db288cd2441f8f9fb62035fb570c6b
                                          • Opcode Fuzzy Hash: 40abab00255d48ee124f3f5b78e5e162de7d2a1df5bf8d6892be7055ddacdcde
                                          • Instruction Fuzzy Hash: 4AD02B3001A3044FCA1667AEA90D1E27F28C783309F0931E3B44C8755245530828C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62f7e3c1ee0501283d1fba71a476774d723cff963c6a6e403f2ef0205fafa148
                                          • Instruction ID: 2eca5574e2c3374ac2c937e2ba403d762b852ceeda3344b3db39cb7cb2d227bf
                                          • Opcode Fuzzy Hash: 62f7e3c1ee0501283d1fba71a476774d723cff963c6a6e403f2ef0205fafa148
                                          • Instruction Fuzzy Hash: 58E01AB4A4A316CFEF90DB9CDD85AEA77BAEB09204F1076B8E01A97115CA301980CE51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b49f2626bea8e492e4aa925940f2398d4f15e140c2c48658a3af087912667b20
                                          • Instruction ID: 76024eb360d81bbb642f536fdf13355767d92984589d8cba415a17f0b87e411e
                                          • Opcode Fuzzy Hash: b49f2626bea8e492e4aa925940f2398d4f15e140c2c48658a3af087912667b20
                                          • Instruction Fuzzy Hash: 4EE0C276C00229DB8B209FF8AA084DFFF35AF45200B114516F815AB600F3300B74CBE1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abeced29f29fcf582868111890e241efac0be0c2365bbb6ccf8555680a47ab08
                                          • Instruction ID: 4c03115df198225152f2932b508f55aeb90f8b096ec9499ec3d6466e06361715
                                          • Opcode Fuzzy Hash: abeced29f29fcf582868111890e241efac0be0c2365bbb6ccf8555680a47ab08
                                          • Instruction Fuzzy Hash: 77E01AB0D04209DFD780EF78C946A9EBFF0AB08600F2089A6D429E7251EB7486018F91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19cbac8b54627737aee31502430113892f150f657bdbf9e471939a16a98bba33
                                          • Instruction ID: 119a18fa7bdece10cc93b274517d4c68daa3179b156d2990f1c3246bbf8e9663
                                          • Opcode Fuzzy Hash: 19cbac8b54627737aee31502430113892f150f657bdbf9e471939a16a98bba33
                                          • Instruction Fuzzy Hash: 5BE08C30801308DBCB80EBA484456EEBBF8AB05204F507599D80597281EB301A44D692
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a5db658857ab21c4220641ce423cfdd245966b4b9f18cb1c2994a1a78a40b372
                                          • Instruction ID: 0e83ecfe60305457a82765a5f90b55aadd778838e6ee52bc5db6c9da01fe7442
                                          • Opcode Fuzzy Hash: a5db658857ab21c4220641ce423cfdd245966b4b9f18cb1c2994a1a78a40b372
                                          • Instruction Fuzzy Hash: 25E04FB0D04209DFD780DF79C544A9EBBF0BF08600F2088A6C015E7311E77086008F80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aac907ac9922a06a156457112ec5814040d7f6c8a0c3d6d4f8e3c09e9a21d175
                                          • Instruction ID: 2a02539db5f05f2a43a3a1e12651451842aa0165a88761d8a3becabbb465ed8f
                                          • Opcode Fuzzy Hash: aac907ac9922a06a156457112ec5814040d7f6c8a0c3d6d4f8e3c09e9a21d175
                                          • Instruction Fuzzy Hash: 61E0B674909218DFDB44CF69C5408EEBBFABF4D701B10A055E409A7211D731DD41CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4269ae66e77adb3af80f1321fd0fdcb1a2fea834f192d5f8d7c541cc2e331c13
                                          • Instruction ID: b293edebf9047deee279edc35a830f261b990ca5be152b3c975e34d8e1a32b2e
                                          • Opcode Fuzzy Hash: 4269ae66e77adb3af80f1321fd0fdcb1a2fea834f192d5f8d7c541cc2e331c13
                                          • Instruction Fuzzy Hash: 5DD0222A0053849DF3833B2088088833F6AFBEB109321F883B8C3CA0B3A8000C19971E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                          • Instruction ID: 3a880819372c63f0848380d6267c4cca63720bacfb64dac012958799ed5007ec
                                          • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                          • Instruction Fuzzy Hash: 7AD09E72D001399B8B10AFE9DC054DFFF79EF05650B518126E915A7100D3715A21DBD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6373a75a6169ec7c0eb4a6681ed62b5f5e4971b38ebc1af003ea614085b5632a
                                          • Instruction ID: 8ce12c92ae5eac22aa0cfab1198a3924d7a4d17e86cbdc629f84800291b5b8e8
                                          • Opcode Fuzzy Hash: 6373a75a6169ec7c0eb4a6681ed62b5f5e4971b38ebc1af003ea614085b5632a
                                          • Instruction Fuzzy Hash: C7D012322143085E5BC1FFA5E840C9377DDFB246407449432E508CB120E621E528DB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc380112b9f97405fbddb733c8bdd2ace58a80756718215841e00fb77135349a
                                          • Instruction ID: fee613f1f911fa338b43623a2a31f45b814928f241f47ca9c9a95bfafd55948c
                                          • Opcode Fuzzy Hash: cc380112b9f97405fbddb733c8bdd2ace58a80756718215841e00fb77135349a
                                          • Instruction Fuzzy Hash: D4C08C300127088BC608379BE50E3A8FBAC9B0130AF003021B10E014105EA10440CAA6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 255f8269ee8a5d8279cf7322f766a8f03de229ff1e985cb3abff155986c728a7
                                          • Instruction ID: 6bd99ccc1a45e8ccb66211615e757e00564b5e492b8f92679146ec3915fdc8ff
                                          • Opcode Fuzzy Hash: 255f8269ee8a5d8279cf7322f766a8f03de229ff1e985cb3abff155986c728a7
                                          • Instruction Fuzzy Hash: 13B012B9165341B6558467B44D81FFF6411EBF6720B90BC023AA80100085724428D3AB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f10502eacbea19cc0bd4fdda72e1f33b9ad6ce88c6bd5d152bc6c2f62d9f7786
                                          • Instruction ID: 9b5169ace31643cba335d0ff5f481a986d473bee19afda144a5f2d3f09549e2c
                                          • Opcode Fuzzy Hash: f10502eacbea19cc0bd4fdda72e1f33b9ad6ce88c6bd5d152bc6c2f62d9f7786
                                          • Instruction Fuzzy Hash: F9C09BB501C3C3B8D785A7B45D40BEF69859BE7740F167C1E76A81004294950019D76B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f9b1746966f0a1ff15746f7024deeb1582902ac606416d5b716cfc270323fd4
                                          • Instruction ID: d05ac2f616a4f38005450c8b51314fd3a8fd9b0fbd5e6b31ac874489c3613ef2
                                          • Opcode Fuzzy Hash: 3f9b1746966f0a1ff15746f7024deeb1582902ac606416d5b716cfc270323fd4
                                          • Instruction Fuzzy Hash: DBE11B74E0411ACFCB54DFA9C5809AEFBB2FF89314F248169D414AB355DB31A982CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc7c2cdd99dd692abc112fb6c6b32730a47f3b36906ad8911c4ab5a680473716
                                          • Instruction ID: c823f111b9deab329e855363ecbff98b60bff6bf2c40d5a5025ca6bdf9fb35f9
                                          • Opcode Fuzzy Hash: cc7c2cdd99dd692abc112fb6c6b32730a47f3b36906ad8911c4ab5a680473716
                                          • Instruction Fuzzy Hash: 54E11A74E0411ACFCB54DF98C5809AEFBB2BF89314F248169E419AB355DB31A942CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e98e73e84087ac7deb813b797c079cb871b977f858a74e9e5300b8113627d8ee
                                          • Instruction ID: 158c3b6f387573fdbcdb28a119eae7fd12878d72ab5afd7b9098644a2f6298ac
                                          • Opcode Fuzzy Hash: e98e73e84087ac7deb813b797c079cb871b977f858a74e9e5300b8113627d8ee
                                          • Instruction Fuzzy Hash: D1E13974E102199FCB54DFA9C9809AEFBF2FF89304F249169D418AB355DB30A941CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa6270630c9afaec9f1037d4e421bb12daa44bd880082559a79e3428da9dbfdd
                                          • Instruction ID: 5b82642af53a644d417362d440abefc1cd044c8e905ea0c115958a12d53b5fb0
                                          • Opcode Fuzzy Hash: aa6270630c9afaec9f1037d4e421bb12daa44bd880082559a79e3428da9dbfdd
                                          • Instruction Fuzzy Hash: 81E10874E042198FCB54DFA9C9809AEFBF2BF89304F249169E419AB355D730AD41CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6755b3022e4fe07e86a761b218a68d1bfff2b623b147ec9228dca6d5d653fbb
                                          • Instruction ID: 6419bcebaecdadb85f0fffcc5810fcb56867b735585d10bd476e0d199574603a
                                          • Opcode Fuzzy Hash: f6755b3022e4fe07e86a761b218a68d1bfff2b623b147ec9228dca6d5d653fbb
                                          • Instruction Fuzzy Hash: DEE10974E102198FCB54DFA8C5809AEFBF2FF89304F249169E419AB356D730A941CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bde3dd03509803aca8ae5baa38e352d737ec1312e4cb5924fe6886b161278a4f
                                          • Instruction ID: b9011590ffbdc90d9a70c59ae2f7d8698b2c4ecf53eae013b00ca8151f759711
                                          • Opcode Fuzzy Hash: bde3dd03509803aca8ae5baa38e352d737ec1312e4cb5924fe6886b161278a4f
                                          • Instruction Fuzzy Hash: 99E10835D20B5A8ACB10EF64D990A9DB7B1FFD5300F60979AE5097B214EF706AC5CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2078340518.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_ea0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac53b435e05619836912155e084a01f393ed7d5d14ccae77d0bbc7d17f65766e
                                          • Instruction ID: 5b6d16a9fae8ac2a09d28911cf5b30de8e5d800b996273f4b5be97b4ed92c883
                                          • Opcode Fuzzy Hash: ac53b435e05619836912155e084a01f393ed7d5d14ccae77d0bbc7d17f65766e
                                          • Instruction Fuzzy Hash: 47A13A32E002158FCF15DFA4C8405AEB7B2FF8A304B15957AE805BF266DB75E956CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0083b5541dffd38336a9b315957037f029d5bf3345c52adb390f0ec049df8c3d
                                          • Instruction ID: d56a4164dea4c7591556707e11ad4197316789ffab19be175c3f7346fe8b4a18
                                          • Opcode Fuzzy Hash: 0083b5541dffd38336a9b315957037f029d5bf3345c52adb390f0ec049df8c3d
                                          • Instruction Fuzzy Hash: C3D1D835D20B5A8ACB10EF64D990A9DB7B1FF95300F60D79AE5093B214EF706AC5CB81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9ff162ccbfb14e4aec0126f3d17e5fb23c5fcb531a8ac161034aa90c7102c291
                                          • Instruction ID: 36f39327b0ce89ec69b8306d7d7394b8e5c242d05e262f5b511d14781511a0fa
                                          • Opcode Fuzzy Hash: 9ff162ccbfb14e4aec0126f3d17e5fb23c5fcb531a8ac161034aa90c7102c291
                                          • Instruction Fuzzy Hash: 84512874E0421A8BDB54DFA9C9815EEFBF2BF89304F24D16AD418AB315D7309941CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17bd480091098fa788509606c290c8142215e05d2db40115d367f9252471b704
                                          • Instruction ID: 8d11ed4932d000f77c2308d4a08480df8d1eb50f5203fdbbaf1d1dee6185a628
                                          • Opcode Fuzzy Hash: 17bd480091098fa788509606c290c8142215e05d2db40115d367f9252471b704
                                          • Instruction Fuzzy Hash: 7741E474D09308CFDB48CFAAD5446EEBBF6AB8D300F14F06AE419A6251EB344941CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094691803.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6eb0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cf1c37cb44579eb0ac6a47a34f8f680fa16523b0f638393a51745f9e991b7e0b
                                          • Instruction ID: d37c236b0d36390671c2f3c8b506115ad1b9d822132614e1261548af99ada82f
                                          • Opcode Fuzzy Hash: cf1c37cb44579eb0ac6a47a34f8f680fa16523b0f638393a51745f9e991b7e0b
                                          • Instruction Fuzzy Hash: E941BA75E016288BEB68CF6ACD417DABBF3AFC9304F14D1A9D408AB254EB305985CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e39143f9979e3678a29693bc9c15a60353327a0e9d57f28d9c1dd5b0d71f05c
                                          • Instruction ID: 3ea783d7874db0fc7c0ee0c96330d0920787989fa5d8a1be65b782dddeee4149
                                          • Opcode Fuzzy Hash: 9e39143f9979e3678a29693bc9c15a60353327a0e9d57f28d9c1dd5b0d71f05c
                                          • Instruction Fuzzy Hash: 20F03A3A959115DFD7908F94D5594F4F7FCFB4A321F0020EA950E97221CB300945CE84
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2094813741.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6fc0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac1c2216f48503c05203d1d56dbb267f023677ec1304c81c4fd3f9fb01645a30
                                          • Instruction ID: 45a8a08b1c161a0c08e99c92eff6293ac9e1b546247b3978bbe3c2c5ab1a70a5
                                          • Opcode Fuzzy Hash: ac1c2216f48503c05203d1d56dbb267f023677ec1304c81c4fd3f9fb01645a30
                                          • Instruction Fuzzy Hash: 08E01A7695A154CFDB90AFA4E5591F8FBBCEB4B322F1030A5E50E97121C63049148F94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 4f5905efdd0188af3f3cbda8102d935434bdf97fc0341e4dda41470ee423556c
                                          • Instruction ID: 8b866e3e60ea984ec19b61e26f0d8480283a339d878dab3c31bfe64e3afb4eeb
                                          • Opcode Fuzzy Hash: 4f5905efdd0188af3f3cbda8102d935434bdf97fc0341e4dda41470ee423556c
                                          • Instruction Fuzzy Hash: 70E11775E00218DFDB54DFA9C984A9DBBB2FF49314F1980A9E909AB361DB30E845CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 735f89e7d444db4d7693a6f50eda5691532bd67ffeaefef439ce2acc5b1b31b1
                                          • Instruction ID: e05f10c836a05b3eadd0e0a459fa07772a9c4ef006942ee86c3177856f9c186a
                                          • Opcode Fuzzy Hash: 735f89e7d444db4d7693a6f50eda5691532bd67ffeaefef439ce2acc5b1b31b1
                                          • Instruction Fuzzy Hash: 3E81A674E002189FDB54DFAAD984A9DBBF2BF88300F1480AAD509AB355DB349985CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 238859a74f7850ce86fe31d2ea68dfef5af5914c97031785135aba32c75ba2ca
                                          • Instruction ID: 7c744dff31900ee45a8bd91fcd61ffbe340e039dbd685747a2d07a4e6cb5296d
                                          • Opcode Fuzzy Hash: 238859a74f7850ce86fe31d2ea68dfef5af5914c97031785135aba32c75ba2ca
                                          • Instruction Fuzzy Hash: F781B775E002189FDB54DFAAD884A9DBBF2FF88300F14C0AAE509A7365DB349985CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 3b609907bf730e8d06d9c3cb57d0fa5d5efc2b32d3fe87eba46edbfda184b3c6
                                          • Instruction ID: b36354f5764880ba7df6e7b03867ed049bdde7687c1849b28bd0df7385489ab7
                                          • Opcode Fuzzy Hash: 3b609907bf730e8d06d9c3cb57d0fa5d5efc2b32d3fe87eba46edbfda184b3c6
                                          • Instruction Fuzzy Hash: 7581B774E00218DFDB54DFA9D884A9DBBF2BF88300F14C4AAE909AB355DB349985CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: a4189048766c5df634b1c71f4bfc63586da4f48644b698758ecab4f7a5a3032d
                                          • Instruction ID: 0e7d456df54be4cc19a108a885d18d88f3616449c2b72c0a91330ec14253a33d
                                          • Opcode Fuzzy Hash: a4189048766c5df634b1c71f4bfc63586da4f48644b698758ecab4f7a5a3032d
                                          • Instruction Fuzzy Hash: 4781B674E002189FDB54DFAAD984A9DBBF2BF88300F14D0AAE509AB365DB345985CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 06b4c712ac0856a24d79068f9aca792080d1fdec45591b4bbbdccbd6a043c7a9
                                          • Instruction ID: e1f8581c4597c537f6b107e5717f2c260841cb33e374d7870f3ff7f5fab51668
                                          • Opcode Fuzzy Hash: 06b4c712ac0856a24d79068f9aca792080d1fdec45591b4bbbdccbd6a043c7a9
                                          • Instruction Fuzzy Hash: EC81B474E00218DFDB54DFAAD884A9EBBF2FF88300F1490A9E519AB365DB349945CF10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 9d3b48de6fe35a2f841fd167646784a4afbdb92a444d7b2458a6b95989a84a6a
                                          • Instruction ID: 76d99043642de241399b4e17d4b636aa23c436b2755ec5720f4f10a65a35f4ef
                                          • Opcode Fuzzy Hash: 9d3b48de6fe35a2f841fd167646784a4afbdb92a444d7b2458a6b95989a84a6a
                                          • Instruction Fuzzy Hash: 6581A774E002189FDB54DFAAD994A9DBBF2FF88300F14C0AAE509AB365DB345985CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: ae660c6300c666ca142ac9ab8aa136fe2f008db32cd257e452ce04cb03d0292a
                                          • Instruction ID: 4d5e0517bc614b0ff46b1f176ede8a0ecddae3cad3709c0c66d751f7dec88bdc
                                          • Opcode Fuzzy Hash: ae660c6300c666ca142ac9ab8aa136fe2f008db32cd257e452ce04cb03d0292a
                                          • Instruction Fuzzy Hash: 5281C174E00218DFDB58DFAAD884A9DBBF2BF88304F1480A9E509AB365DB309945CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$(ocq$,gq$,gq
                                          • API String ID: 0-2401767512
                                          • Opcode ID: 43b807cf223e32cc0ff3b75c3cfe84a311e4c7edc9e8b5bcd019dca67a668ffa
                                          • Instruction ID: 6323ac6facc8dcd42d1c37949d2fa711074fb21da2953bb4e0a31fa8745c0673
                                          • Opcode Fuzzy Hash: 43b807cf223e32cc0ff3b75c3cfe84a311e4c7edc9e8b5bcd019dca67a668ffa
                                          • Instruction Fuzzy Hash: 23D15F71A00109DFCB54CF69D984AADBBBAFF88304F1581A5EA65EB2A1D730DC45CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$PHcq$PHcq
                                          • API String ID: 0-775545523
                                          • Opcode ID: ca449dd3b4575bb99e5d978d107e9c1313193ca488db1bbcbbf938e6284c4dd9
                                          • Instruction ID: 97d151de324e7a17bb1dad3133ecfcd465c0474298826b438f7e31617040cb22
                                          • Opcode Fuzzy Hash: ca449dd3b4575bb99e5d978d107e9c1313193ca488db1bbcbbf938e6284c4dd9
                                          • Instruction Fuzzy Hash: 0F61B4B4E002089FDB58DFAAD984A9DBBF2FF88300F148069E505AB365DB349945CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$4'cq
                                          • API String ID: 0-3004416391
                                          • Opcode ID: 7500004108ccbb566b402bf5ee4fe94086e242fadd044b4bbc2f3f69f1d53362
                                          • Instruction ID: b83c046de273eabebb84b1226a9697966276669090f78d94495cd19187154f50
                                          • Opcode Fuzzy Hash: 7500004108ccbb566b402bf5ee4fe94086e242fadd044b4bbc2f3f69f1d53362
                                          • Instruction Fuzzy Hash: 4C72A375A00609CFCB59CF68C984BAEBBF2FF48310F158595E9199B3A1D730E989CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$Hgq
                                          • API String ID: 0-2239030825
                                          • Opcode ID: 6cc24be51b5ff44c41770ee0f03e6a6e4d50cadc321b2528f0900c3cbc168285
                                          • Instruction ID: 1df8494c5af29e4cc50f9d4e10e5e89947479a409c8b63f8a5adbf721ff131e3
                                          • Opcode Fuzzy Hash: 6cc24be51b5ff44c41770ee0f03e6a6e4d50cadc321b2528f0900c3cbc168285
                                          • Instruction Fuzzy Hash: B3129C70A002199FDB54DF69C894BAEBBFAFF88300F148569E9159B394EF309D45CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHcq$PHcq
                                          • API String ID: 0-4229179212
                                          • Opcode ID: acda1fda5a1e3c229828d4d7a175935095e460aa5eec143f03d184616fbdd61f
                                          • Instruction ID: 78bc546191eefcca61cb1bebc6a66a2e77a0461ce71e35cbf1ffc1be5dc1a250
                                          • Opcode Fuzzy Hash: acda1fda5a1e3c229828d4d7a175935095e460aa5eec143f03d184616fbdd61f
                                          • Instruction Fuzzy Hash: 2591F6B4E00228CFDB58CFAAC9446DDFBB2BF89300F10856AE459AB354DB745945CFA0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58d4f4a54c7aebc44bffba5e0aa7252f758cf3ddee4a50f0ff1577cb6fd81da9
                                          • Instruction ID: 838bf8b3f6f3d7b591ec3ef9024fc4ca62ef02870b7b234570818f7eab8c4d5b
                                          • Opcode Fuzzy Hash: 58d4f4a54c7aebc44bffba5e0aa7252f758cf3ddee4a50f0ff1577cb6fd81da9
                                          • Instruction Fuzzy Hash: 29826074E012299FDB64DF69D998BDDBBB2BF89300F1081EAA40DA7254DB315E81CF41
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8f9682ba4d23b3edf3b613bf6cefed343d86d0068b68edb6b1e62a399196cd5
                                          • Instruction ID: 52f49e37ba4abe993294e69d585fcc5ce4ef3d3d12d3c56bf29afb1402e90656
                                          • Opcode Fuzzy Hash: e8f9682ba4d23b3edf3b613bf6cefed343d86d0068b68edb6b1e62a399196cd5
                                          • Instruction Fuzzy Hash: 1072C174E01229CFDB64DF69C984BE9BBB2BB49300F5481EAD548A7395DB309E85CF40
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 36dac3fd503f2d3d4bbe1a6a4045b6b45f14fe4029f905014b0103eea987dd1d
                                          • Instruction ID: 33df88fc0f969e7db679cf152e14ad97609b89176febab831349b937712d27be
                                          • Opcode Fuzzy Hash: 36dac3fd503f2d3d4bbe1a6a4045b6b45f14fe4029f905014b0103eea987dd1d
                                          • Instruction Fuzzy Hash: 67E1D3B4E01218CFEB64DFA5C954B9DBBB2BF88304F2081AAD408A7394DB755E85CF54
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35e30fb521ba1d5bb1b6dcc87cf8506935c376c5fb05e811ef6d28b9c3933bcc
                                          • Instruction ID: 7896d3f3ec9cbc8ab808afd7a476806bab55a010566f84a173327972084f96d0
                                          • Opcode Fuzzy Hash: 35e30fb521ba1d5bb1b6dcc87cf8506935c376c5fb05e811ef6d28b9c3933bcc
                                          • Instruction Fuzzy Hash: CAA1A4B5E012188FEB68CF6AC944B9DBAF2BF89300F14D0AAD409A7255DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1348227fa51a6c143e97b0573a79b6f55c18d81606b45ed2329f17bc6739fa88
                                          • Instruction ID: b5e5538f8a45a57b368ef82aac496e9b953acb7ee97bad335039412167f09388
                                          • Opcode Fuzzy Hash: 1348227fa51a6c143e97b0573a79b6f55c18d81606b45ed2329f17bc6739fa88
                                          • Instruction Fuzzy Hash: 5EA1A3B0E012188FEB68CF6AC944B9DBBF2BF89300F14D0AAD40DA7255DB345A85CF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9bc2edc9df4130802d0c9300385de9140748535f98b9bd3b46e49c536659951
                                          • Instruction ID: 7d4d89c8cfddc797a2c224156b0a1f060f154362af6c8d4c0648a3cffb91fffd
                                          • Opcode Fuzzy Hash: f9bc2edc9df4130802d0c9300385de9140748535f98b9bd3b46e49c536659951
                                          • Instruction Fuzzy Hash: CDA1C2B0E012188FEB68CF6AC945B9DBAF2BF89300F14D0EAD54CA7254DB345A85CF10
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2f5afbdb3ba11e3d0001c5bb0472613a366d1b9a900a74f759ec82a7f0fc680
                                          • Instruction ID: b5b953a56f2aab089062be4be0a3c5e8ad8452442f9dbca0876097b85efb27b8
                                          • Opcode Fuzzy Hash: b2f5afbdb3ba11e3d0001c5bb0472613a366d1b9a900a74f759ec82a7f0fc680
                                          • Instruction Fuzzy Hash: 3DA1B2B4E012188FEB68DF6AC944B9DBBF2AF89300F14D0EAD509B7254DB345A85CF11
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: caa275c23c29a3d31a364a75fae508f90f044a650b4b92c2047448b6706ea339
                                          • Instruction ID: 54f18ca005c7c7cb13b09194c21f67ebb25c3f5064677c6798cc7abe5733412f
                                          • Opcode Fuzzy Hash: caa275c23c29a3d31a364a75fae508f90f044a650b4b92c2047448b6706ea339
                                          • Instruction Fuzzy Hash: E9A1A2B0E012188FEB68CF6AC944B9DBBF2BF89300F14D0AAD44DA7254DB345A85CF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a79d600b0cfa5ecf37c7cfd1300e45812d506c133222e766e9cfb97eda31399a
                                          • Instruction ID: 59a7b0cf0c7bec97d824ce00095a0153d175e13e6cd373783cd93bd88bcfab5b
                                          • Opcode Fuzzy Hash: a79d600b0cfa5ecf37c7cfd1300e45812d506c133222e766e9cfb97eda31399a
                                          • Instruction Fuzzy Hash: 58A1A2B4E012188FEB68CF6AC944B9DBBF2BF89300F14D0EAD509A7255DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ddd989516888d8570ef7ded4487348f66728b6a4fe74f44c85eeafba62e1d38
                                          • Instruction ID: 0ad62853a662765a31baf1b3e0af349d32326aaaa41f225e1d1b18932a4f8b0f
                                          • Opcode Fuzzy Hash: 8ddd989516888d8570ef7ded4487348f66728b6a4fe74f44c85eeafba62e1d38
                                          • Instruction Fuzzy Hash: F2A192B5E012188FEB68CF6AC944B9DFBF2AF89300F14D0AAD509B7254DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c61f045c43bc14ef2a45a078242fa7effb662696abf752bec8ccb51a5adca5d
                                          • Instruction ID: 7c5d54669f19491a507b5e5f1f9e980247512d8ffb6e4af0a0e3430b9ca00c69
                                          • Opcode Fuzzy Hash: 0c61f045c43bc14ef2a45a078242fa7effb662696abf752bec8ccb51a5adca5d
                                          • Instruction Fuzzy Hash: 41A1A2B1E012188FEB68DF6AC944B9DFBF2BF89300F14D1AAD408A7254DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa94ce53c2e023e0a4cd09dabe3f6c02c083e917da2f72630c7cd5da8fee983f
                                          • Instruction ID: db876b97026184e5c0f0580660e5f6e77900fb154bcaa95858208674e6c67241
                                          • Opcode Fuzzy Hash: aa94ce53c2e023e0a4cd09dabe3f6c02c083e917da2f72630c7cd5da8fee983f
                                          • Instruction Fuzzy Hash: 8FA194B1E012188FEB68DF6AC944B9DFBF2BF89300F14D0AAD408A7254DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c60feb9ea027c70a1a1be38ab5f54ba3b562ef77964024daecf83e0891019a1f
                                          • Instruction ID: 70b98e8d45c4777af99c2628a9caba7a7613061f0b7cb3aef90f7a381d646f17
                                          • Opcode Fuzzy Hash: c60feb9ea027c70a1a1be38ab5f54ba3b562ef77964024daecf83e0891019a1f
                                          • Instruction Fuzzy Hash: 428196B1E006188FEB68CF6AC945B9DBBF2AF89300F14C1EAD50DA7254DB345A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a86e94e8918095d24585b74759b83ab7cdaca94a70d4469f8c67c8954520cb5f
                                          • Instruction ID: bdb1f1a50080639c41e0b873f1130c35c8adae972af340af06ff38841cec9112
                                          • Opcode Fuzzy Hash: a86e94e8918095d24585b74759b83ab7cdaca94a70d4469f8c67c8954520cb5f
                                          • Instruction Fuzzy Hash: 2B819274E012299FDB65DF69D995BDDBBB2BF89300F1080EAE809A7354DB305E818F40
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16d5e0a8e84cf3ca4f59435dff38dd593f01d132cd03ab82eee782fb3dfb3806
                                          • Instruction ID: c7e74ad14ca1026a125862af74c58797b3444db0da1241c7b6e322b9e91ce8d9
                                          • Opcode Fuzzy Hash: 16d5e0a8e84cf3ca4f59435dff38dd593f01d132cd03ab82eee782fb3dfb3806
                                          • Instruction Fuzzy Hash: FD7175B1E016188FEB68CF6AC94579DFAF2AF89300F14C0EAD50DA7254DB344A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87e7b1458c7eadb3d07628adb9250204ec36cdeb165eeb5a087ef78e7a535b37
                                          • Instruction ID: a2bec9e1c12be8df75bf2de3828ff907d53b26f1960b4a277a4c61f9b77218c2
                                          • Opcode Fuzzy Hash: 87e7b1458c7eadb3d07628adb9250204ec36cdeb165eeb5a087ef78e7a535b37
                                          • Instruction Fuzzy Hash: 367173B1E006188FEB68CF6AC945B99BAF2AF89300F14C0EAD50DB7254DB345A85CF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 64adc51cf2d084664aa42b805e27e414b6ec9982e391753f6f08d3e0c26e3c79
                                          • Instruction ID: f511cb6ae80bb644030eaa3306bc04bcd9d99724aebe0f6588a06919740fcf7e
                                          • Opcode Fuzzy Hash: 64adc51cf2d084664aa42b805e27e414b6ec9982e391753f6f08d3e0c26e3c79
                                          • Instruction Fuzzy Hash: 074167B1E016288BEB58CF6BD9457D9FAF3AFC8314F04C0AAD50CA6265DB740A858F51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e1e519b2ff1cc871f210f0a1a68974751ce528f6b8a729361514572fdc16387
                                          • Instruction ID: 28093ab4a011e30b8b99fee1aef99ecef0939558671d1f14669f4cf11bd1f054
                                          • Opcode Fuzzy Hash: 0e1e519b2ff1cc871f210f0a1a68974751ce528f6b8a729361514572fdc16387
                                          • Instruction Fuzzy Hash: 0041B2B1D00208CBEB58DFAAC9547DDBBF2AF88300F14D16AD418BB254DB755946CF64
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7ecccb6fcf81fe96c4282acaffdbdf63c3ee257257764d9e172780d99220511
                                          • Instruction ID: 64d325ba4482e8722f0682a4073faac02cda9b7066ddbbefc58238f1e283c1a5
                                          • Opcode Fuzzy Hash: a7ecccb6fcf81fe96c4282acaffdbdf63c3ee257257764d9e172780d99220511
                                          • Instruction Fuzzy Hash: 6D4148B1E016188BEB58CF6BD9457D9FAF3AFC8304F14C1AAD50CA6264EB740A858F51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fea69533693bc22df99551353f155b9c5de86da727be6e971d53316a6653fcee
                                          • Instruction ID: b6ef9ebcf186ae3dcb9a517a50bdb15e61672877f9d19d7dae2a3f6ff2f216ed
                                          • Opcode Fuzzy Hash: fea69533693bc22df99551353f155b9c5de86da727be6e971d53316a6653fcee
                                          • Instruction Fuzzy Hash: 2F4166B1E016188BEB58CF6BDD45789FAF3AFC8310F04C1AAC50CA6264EB740A858F51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 752f11c6bb4a002f628659d544b167cfbdc310ecb72ff6148eae9fc15095fdcb
                                          • Instruction ID: ef76733a4afb2fa789d91a0b949fceffe28464d647973b2849079354cae6ffe7
                                          • Opcode Fuzzy Hash: 752f11c6bb4a002f628659d544b167cfbdc310ecb72ff6148eae9fc15095fdcb
                                          • Instruction Fuzzy Hash: A74148B1E016188FEB58CF6BCD45799FAF3AFC8310F14C1AAD50CA6265EB740A858F51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 30e13e60980685af3c7ae54b561daf45ed00874ed0cb817e00872d3389c79a49
                                          • Instruction ID: c3b528c193b52ccb62eb5de4419142138d55f29598b5c1ebe609ba00282a0be0
                                          • Opcode Fuzzy Hash: 30e13e60980685af3c7ae54b561daf45ed00874ed0cb817e00872d3389c79a49
                                          • Instruction Fuzzy Hash: 0F4159B1E016188BEB58CF6BDD5578AFAF3AFC8314F04C1AAD50CA6264DB740A85CF51
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5934a73167410ef8f99717606b19ee81fba34ddc3d2c73cac5ad77f69e3576c8
                                          • Instruction ID: aeb9cca4ec042ea5dcfc8956662046d1f6c8dffb9fc6e0756f5fe16116e74563
                                          • Opcode Fuzzy Hash: 5934a73167410ef8f99717606b19ee81fba34ddc3d2c73cac5ad77f69e3576c8
                                          • Instruction Fuzzy Hash: B4415AB1E016188BEB58CF6BDD45789FAF3AFC8304F14C1AAD50CA6264DB740A858F51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$(ocq$(ocq$(ocq$(ocq$(ocq$,gq$,gq
                                          • API String ID: 0-3338910979
                                          • Opcode ID: af6cba23854289ef2428a133a9ec602919d4929bdd182264493e1daaecb521c6
                                          • Instruction ID: 86c2c9f2b816e125f8aed91d7a98af83556698031da7c3e9680687839c754047
                                          • Opcode Fuzzy Hash: af6cba23854289ef2428a133a9ec602919d4929bdd182264493e1daaecb521c6
                                          • Instruction Fuzzy Hash: 7E126930A002099FCB54CF69D884A9EBBF2FF89314F2585D9F9599B2A1DB30ED45CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xgq$Xgq$Xgq$Xgq
                                          • API String ID: 0-1951159037
                                          • Opcode ID: 783c39e7d006ead33fd955608fae1c66c1538595041dafb3ee2cfe75a435fa3d
                                          • Instruction ID: ab6738f15a950c78b169d6f4d0d2f3529ffa127367c93a99ac2d8d8b47b23361
                                          • Opcode Fuzzy Hash: 783c39e7d006ead33fd955608fae1c66c1538595041dafb3ee2cfe75a435fa3d
                                          • Instruction Fuzzy Hash: 2C220AD7C067860BC3810EB400DA5A47FE3DFB5231BBA42889984677C6E639DD8BDB41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $cq$$cq
                                          • API String ID: 0-2695052418
                                          • Opcode ID: 58e01d7b24cd8a48eddeca5e4cfbb6fbd06ddb5f00f21d0502f056cc56901feb
                                          • Instruction ID: 946cdd64e47f1e399ff0c5e156c650e9e9057f18914dcffe9669cb145ebdaad6
                                          • Opcode Fuzzy Hash: 58e01d7b24cd8a48eddeca5e4cfbb6fbd06ddb5f00f21d0502f056cc56901feb
                                          • Instruction Fuzzy Hash: 0D525474A10219CFDB54DBA5C8A0BAEBB72FF94300F1080AAD50A6B3A4DF345D85DF65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'cq$4'cq
                                          • API String ID: 0-60795322
                                          • Opcode ID: dcc8a5dbcac65fce0d5738c6c0211c15ab2e5270fa2fe410310e070f230bc4b6
                                          • Instruction ID: 16987571bd63d85fcd5ceedab510bae11385702fffc2f5096fb686288c12b07c
                                          • Opcode Fuzzy Hash: dcc8a5dbcac65fce0d5738c6c0211c15ab2e5270fa2fe410310e070f230bc4b6
                                          • Instruction Fuzzy Hash: 8AB161703106018FDB959B29C959B397796EF85B04F1444EAEB12CF3A2EF25DC4AC742
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hgq$Hgq
                                          • API String ID: 0-3391890871
                                          • Opcode ID: 30bc3d70f10ec8c970034eb377e468a80b8be02b7f09b5bf13dadcb91e675c6a
                                          • Instruction ID: c0841ce5511e5f275ea206fd62472015cecb9d12b452e5086a678556733db809
                                          • Opcode Fuzzy Hash: 30bc3d70f10ec8c970034eb377e468a80b8be02b7f09b5bf13dadcb91e675c6a
                                          • Instruction Fuzzy Hash: 10B1EE717042199FDB659F68D898B3E7BA2FF89310F5484A9E606CB390DF34D849CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,gq$,gq
                                          • API String ID: 0-2533611571
                                          • Opcode ID: 4023c5989165fc0c23aa5ab1adaa5a624c49788e25f99f491e2c442cfdadddbc
                                          • Instruction ID: 87b732b287e062f44d763d019ca222a046660ac2c956c204a93e66d6774081cf
                                          • Opcode Fuzzy Hash: 4023c5989165fc0c23aa5ab1adaa5a624c49788e25f99f491e2c442cfdadddbc
                                          • Instruction Fuzzy Hash: 4C81C435B01105CFCB64DF69C888AAABBF2FF89304B9581A9D606DB364D731E845CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq$LRcq
                                          • API String ID: 0-1357215051
                                          • Opcode ID: 80bdeaa328610b73251f0e9a508ab2a64e2603b79d3e6b72a097c64d6e6e7e0e
                                          • Instruction ID: a6b2ccf8fa68e434e49cb34b04559a443fde93575408ab4906f8848139c3acf9
                                          • Opcode Fuzzy Hash: 80bdeaa328610b73251f0e9a508ab2a64e2603b79d3e6b72a097c64d6e6e7e0e
                                          • Instruction Fuzzy Hash: DF81D5B1B101058FDB54EF79C858A6E77B6FF88600B1181A9E505DB3B5DB34DD02CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (&cq$(gq
                                          • API String ID: 0-4012885273
                                          • Opcode ID: a2bcc8bfcc90f6bd1f0382c205e63a680e7beb80871bbf05373c1a92d8ea2f66
                                          • Instruction ID: 2232068e6dc0da0e05786ecd9ab881436e83b6067151f5732dbea71d29719b32
                                          • Opcode Fuzzy Hash: a2bcc8bfcc90f6bd1f0382c205e63a680e7beb80871bbf05373c1a92d8ea2f66
                                          • Instruction Fuzzy Hash: DF719271F0421A9FDB59EFAAC8506EEBBB2AF98700F144429E405AB394DF349D05C7D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xgq$Xgq
                                          • API String ID: 0-2113765878
                                          • Opcode ID: 383d669df255b387bf422496126e176e6ffe40f95e9b1c46c66f5d1201a6f2b3
                                          • Instruction ID: 439d08d0b7a6b39bfe125785c582d650c26e89e9edd2c40a6381a3cc134fc057
                                          • Opcode Fuzzy Hash: 383d669df255b387bf422496126e176e6ffe40f95e9b1c46c66f5d1201a6f2b3
                                          • Instruction Fuzzy Hash: 2531D772B003658BDF99896A999827E79DAEBC4350F1C44F9DA06C7380DF74CC4986A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: 6ee4b903df35436404aff9323c4f00386c158a22d594435c4cfe24535f819a35
                                          • Instruction ID: d01dc2a77e82a3fc329ee0d0830fc90bfc0976096431af42fa180cbfb34600a7
                                          • Opcode Fuzzy Hash: 6ee4b903df35436404aff9323c4f00386c158a22d594435c4cfe24535f819a35
                                          • Instruction Fuzzy Hash: DE22CA75A10219CFCB94EF64E898B9DBBB2FF58311F1085A9E809A7358DB706D85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: 1b5b2ad194a7231088ad82084c91aa4ab5032da9084ad101b9c35f6da5c4c72c
                                          • Instruction ID: 4911761cb3b6fcb1b20f9aa0a5cf8014a8581cba984dc7f162bc66309cac76f0
                                          • Opcode Fuzzy Hash: 1b5b2ad194a7231088ad82084c91aa4ab5032da9084ad101b9c35f6da5c4c72c
                                          • Instruction Fuzzy Hash: CA22CA75A10219CFCB94EF64E898B9DBBB2FF58311F1085A9E809A7358DB706D85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq
                                          • API String ID: 0-1855696158
                                          • Opcode ID: 0df642c87e8266e86a8086254633b6a5ff7e9a04fcd593e151444dcf32374aef
                                          • Instruction ID: 5ea329b682a16682f2f5d7ca1ae52579dc8477445cea5f5585168838f2c5b014
                                          • Opcode Fuzzy Hash: 0df642c87e8266e86a8086254633b6a5ff7e9a04fcd593e151444dcf32374aef
                                          • Instruction Fuzzy Hash: B341F235B002089FCB099F78E969AAE7BF6BFC8211F1484A9E516D73D0DE309C05CB91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67f77d0525a7136b73e4635917ca430677481e95916f23f8aba5aedde64fea81
                                          • Instruction ID: 4cc22b70c95b16628ae7a9d2859287ef9075210532369c3b498733673f9e0267
                                          • Opcode Fuzzy Hash: 67f77d0525a7136b73e4635917ca430677481e95916f23f8aba5aedde64fea81
                                          • Instruction Fuzzy Hash: CFF15375A001158FCB48DF6DD984A9DBBF2FF88314B1A81A9E619AB361CB31EC45CB50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a60acb9c51deabcc1793a16c97bcf41e461114d746d341ad3bcf54de99b629a
                                          • Instruction ID: 826e9e802d57a8c8b683a9f63ba4631905b645b2ba7d9d7b9902ba01fb0687d0
                                          • Opcode Fuzzy Hash: 5a60acb9c51deabcc1793a16c97bcf41e461114d746d341ad3bcf54de99b629a
                                          • Instruction Fuzzy Hash: F771F7347102058FCB95DF28C898AA9BBE6EF49614F1940E9EA06CB3B1DF70DC55DB90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 475af7c156ee2db6d62e096929427ff9e1c9369b32cd7728a7c2440f9737e6d6
                                          • Instruction ID: 68aa55eb3a580634f0f086f97e96a1f332f0360087a0b3089bc1220e7d418f81
                                          • Opcode Fuzzy Hash: 475af7c156ee2db6d62e096929427ff9e1c9369b32cd7728a7c2440f9737e6d6
                                          • Instruction Fuzzy Hash: 1851AD3413124A8FD368AB20F5AE16FBFA5FF5F327B446D44B10E990A99F7060958F24
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 69692878a745d97c2bca3f526993560c5ebef8047069a0ec88eed983a7bb1065
                                          • Instruction ID: 8043e6d2279f2a38b7f034d1997418138b25337df0fb63b867e2fb222ca5140b
                                          • Opcode Fuzzy Hash: 69692878a745d97c2bca3f526993560c5ebef8047069a0ec88eed983a7bb1065
                                          • Instruction Fuzzy Hash: D5519B3413124A8FD2A8AB20F6BE12FBEA5FF5F3277446D44B10E990A99F3064558F24
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83ec7137512d987ee539b68a29d8ede1e9897b7f5e18e323a45c1bdb63ddfbda
                                          • Instruction ID: d37825a311ab36b6825521e1e34b5864984173debb5e9f9bac2ae7c86e235c44
                                          • Opcode Fuzzy Hash: 83ec7137512d987ee539b68a29d8ede1e9897b7f5e18e323a45c1bdb63ddfbda
                                          • Instruction Fuzzy Hash: E1511274D0121DCFDB15DFA5D998AADBBB2FF88300F208569E805AB3A8DB345945CF40
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98c8a7f716c9109050293497611e5bf4185dc6a8351fa563a73ecd217749c91a
                                          • Instruction ID: 5ba683acaeee087c1530d45eb09412895255f86db5b401b4549c4f27626cb898
                                          • Opcode Fuzzy Hash: 98c8a7f716c9109050293497611e5bf4185dc6a8351fa563a73ecd217749c91a
                                          • Instruction Fuzzy Hash: 2B518574E012189FDB58DFAAD9849DDBBF2FF89300F24816AE415AB364DB30A845CF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2332e630dae32f4b6dd19df7f12fc6cb7820c5840ea5c5d6c978b2d4bf706fe
                                          • Instruction ID: 721655f0515b226213459f3a803960fadf26ab3c7615a1b52ff4a04ce7deb4a5
                                          • Opcode Fuzzy Hash: e2332e630dae32f4b6dd19df7f12fc6cb7820c5840ea5c5d6c978b2d4bf706fe
                                          • Instruction Fuzzy Hash: D1417172A0131ACFDB54AF71D05C7FE7BB1EB4A315F105899D202672A4CBB81A48CF91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ef54e2ec406a034033fd2b92e71baf4fccd59a53635a3f76e3cb4012a292918
                                          • Instruction ID: ce05b826598407fdc567ae29da2f38c16d741dcc65dae8b3685463828ad08e98
                                          • Opcode Fuzzy Hash: 8ef54e2ec406a034033fd2b92e71baf4fccd59a53635a3f76e3cb4012a292918
                                          • Instruction Fuzzy Hash: F351A275E01308CFDB48DFA9D99499DBBF2FF89310B209469E905AB328DB31A845CF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef1e6bbd14a65061d7f7e5b68cdde4e9a657c401e449755433dab27bfc2f3e12
                                          • Instruction ID: cf0f45d2684ca5cc712cb9529585a694c08acea54d09f522b79c1917f289e6c8
                                          • Opcode Fuzzy Hash: ef1e6bbd14a65061d7f7e5b68cdde4e9a657c401e449755433dab27bfc2f3e12
                                          • Instruction Fuzzy Hash: 4E51AC75E01228CFCB64DF68D984BEDBBB2BB49301F1054EAD409A7394DB35AA85CF40
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d395af92955266de3ec0333b802f0fe0d0c4f6bf96f89d6490a61c1c3422fda2
                                          • Instruction ID: ee1ffd183745aef7228b951a6ed0ae4d5621784f692d7d6918b117228ce160e0
                                          • Opcode Fuzzy Hash: d395af92955266de3ec0333b802f0fe0d0c4f6bf96f89d6490a61c1c3422fda2
                                          • Instruction Fuzzy Hash: A941B231A04649DFCF51CFA8C844B9DBFB2FF49314F048595EA25AB2A1D335E918CB90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bda873e2ad401285bb8323fa1de926d40a70bd9b0a899f96625f9cdf36380063
                                          • Instruction ID: 6e9d4db67e7dc705e47df5825635d7716fa2be437fc11b3719fb5b1da262f06d
                                          • Opcode Fuzzy Hash: bda873e2ad401285bb8323fa1de926d40a70bd9b0a899f96625f9cdf36380063
                                          • Instruction Fuzzy Hash: 49417171E0031A9BDF14DFA6C980ADEBBF5EF88710F148169E415B7294EB70A945CBD0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 664de77a06d110de639281ea70aaddb9b343815c39e5302b0b37f6576743842f
                                          • Instruction ID: 88a67920a0f52b8278561be11c10f5bc430a60442dc1292083bdb607f32a6075
                                          • Opcode Fuzzy Hash: 664de77a06d110de639281ea70aaddb9b343815c39e5302b0b37f6576743842f
                                          • Instruction Fuzzy Hash: D1414875D04209CFCB44EFA8D4886EDBBB2FF49301F609599E509AB284D735A845CF54
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1a84099e58eeaad262da918ce37119484bbc5deace3396fc79e95075479b66a0
                                          • Instruction ID: fcdf1767d48b04c073680e1b07c33594306491f19f22b6305d4e066429252847
                                          • Opcode Fuzzy Hash: 1a84099e58eeaad262da918ce37119484bbc5deace3396fc79e95075479b66a0
                                          • Instruction Fuzzy Hash: 7641C275D00219CFDB54DFA5D5847EDBBF2AF88300F14902AE819A7394EB74594ACF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 405179b8293b8eef6a2ca95278378ded436bf599999c19de68a895c8bbf73cc6
                                          • Instruction ID: e76201aae559b0154c29c6bc32f5a4358360fcffb559b32039c12a148565cda9
                                          • Opcode Fuzzy Hash: 405179b8293b8eef6a2ca95278378ded436bf599999c19de68a895c8bbf73cc6
                                          • Instruction Fuzzy Hash: A941D231A00248DFCB10CF65C804BAA7BBAEF44314F0484AEE96597241DB74ED49CF91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 99dff371f543cee601ed41f6c94b0f92cb888d5efc6c1f0d60b45796ad274be4
                                          • Instruction ID: 45f4e4c83f122831a461bec3fcdfd5bb068c40ddacc5526d3952e4d90e9406e3
                                          • Opcode Fuzzy Hash: 99dff371f543cee601ed41f6c94b0f92cb888d5efc6c1f0d60b45796ad274be4
                                          • Instruction Fuzzy Hash: E841B275D01219CFDB44DFA9D5847EDBBF2AF48300F14902AE815A7394EB74594ACF50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bc12a0cf2ea61ee14052948c9a0ea56daafa458826bd2cadbb9c8253f54a124
                                          • Instruction ID: 3af93f0f47389136244de53efff9a9f11b5b2f6af58b2137265608aa8264aaee
                                          • Opcode Fuzzy Hash: 4bc12a0cf2ea61ee14052948c9a0ea56daafa458826bd2cadbb9c8253f54a124
                                          • Instruction Fuzzy Hash: 4A412871D01209CFCB40EFA8D4846EDBBB2FF49305F60A599E505AB384D735A885CF54
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 919744aa95eff99c5abb0ed620c45b5d6a430ea520dec17a841137e63017cf55
                                          • Instruction ID: 7dde889811bb2336cf13db9046a5c82cb7a76d2d7f041e57d2ea11eabba9ff65
                                          • Opcode Fuzzy Hash: 919744aa95eff99c5abb0ed620c45b5d6a430ea520dec17a841137e63017cf55
                                          • Instruction Fuzzy Hash: 55412471E01209CBCB44EFA9D448AEEFBB2FF89301F54D169D504AB294DB359849CF64
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fee734fc9e9d76ef99bc4b473596dbfb5da4d9bd80ddb3e5061bddbe2779cbb
                                          • Instruction ID: 28657d652a504f3a5f7a2a2349c1e610c614944c2064a3d29aad64291e90fe2a
                                          • Opcode Fuzzy Hash: 2fee734fc9e9d76ef99bc4b473596dbfb5da4d9bd80ddb3e5061bddbe2779cbb
                                          • Instruction Fuzzy Hash: ED31803120420AAFCB09DF65E494AAF3BB2FF48310F144469FA1587290DB74CD65CBA0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b16e28eaea70ce25e0522ef508125e0ae1a41bcb7416f4957d48da4f68f805f0
                                          • Instruction ID: 7d52440c256f603c9c7e561953115644351db0b8379f8c9a7e9d71897d21ad1c
                                          • Opcode Fuzzy Hash: b16e28eaea70ce25e0522ef508125e0ae1a41bcb7416f4957d48da4f68f805f0
                                          • Instruction Fuzzy Hash: CB317C72A0131ADFDB54AFA5D05C3EEBBB1FF4A315F009899D50266294CBB81A45CF90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa3775d8cb059b8b27e2815d51638cb2200515c4cff0d4a79a72429ea9aecfd1
                                          • Instruction ID: f06393d97f16859763b1e23888b9f19260b4149b5192e8d658a691b9309de89a
                                          • Opcode Fuzzy Hash: aa3775d8cb059b8b27e2815d51638cb2200515c4cff0d4a79a72429ea9aecfd1
                                          • Instruction Fuzzy Hash: 6B2168B1A001528FEBA9D72EC8A453E7B72EF8035070489D6F495D7266CB39DE80C791
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b43b38b718b1de22b0ad966d6c1e57700a7e536691287b9aab3176094edcc613
                                          • Instruction ID: 3785247aefde99a2a90aeedfafcc733b148780d53a1aa3d23d653c7f8d01eef0
                                          • Opcode Fuzzy Hash: b43b38b718b1de22b0ad966d6c1e57700a7e536691287b9aab3176094edcc613
                                          • Instruction Fuzzy Hash: EA21C2393202054BEB555639D898B7EB697EFC8718F1440F9E606CB794EF25CC8AE381
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ddba6351262d92572d0d541fde637981f331f8e71ccbd10cf90c55096c768ffe
                                          • Instruction ID: 83975b990cc01182abea7dbdb088acc3f9df3f463911a278d8ccceea21d6b6a9
                                          • Opcode Fuzzy Hash: ddba6351262d92572d0d541fde637981f331f8e71ccbd10cf90c55096c768ffe
                                          • Instruction Fuzzy Hash: 9C318970E005098FCB08DF7DC8849AEBBB6FF88354B15C165E659973A5CB34AC46CB90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 338b10607d6dfbd3b9394b430d0803f48d834db95af4013ef9b527dadb47215e
                                          • Instruction ID: 9b8af5bfb514497bdee358cc158ad0628de7a8035939bed73064bc6fa85b9f96
                                          • Opcode Fuzzy Hash: 338b10607d6dfbd3b9394b430d0803f48d834db95af4013ef9b527dadb47215e
                                          • Instruction Fuzzy Hash: D521AC71E002098BDB48DFAAD9086EEFBB6EFC9300F04D465D604A72A4DB709549CB65
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507392478.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_14cd000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd3ed843c4ff30415b9145f7879f0e3d05b7443ab99931918348efa2c47c3bfc
                                          • Instruction ID: a91ac18ef1c546a3e3140b96726b0e3d5e56a5c95d2f470462d40045cc40056d
                                          • Opcode Fuzzy Hash: cd3ed843c4ff30415b9145f7879f0e3d05b7443ab99931918348efa2c47c3bfc
                                          • Instruction Fuzzy Hash: 0D312D7550D3C09FD7038B64D994612BF71AB47214F1985EBD8898F2A3C23A981ACB62
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05b956239d8bf77eebfae5e5291f45477ef872784dcfd30bc3b71760214e6df8
                                          • Instruction ID: 262313747453631efa74d89cdfc26434d2dd9490374745c9a60d43cee4f1ce08
                                          • Opcode Fuzzy Hash: 05b956239d8bf77eebfae5e5291f45477ef872784dcfd30bc3b71760214e6df8
                                          • Instruction Fuzzy Hash: 1221B232A00206AFCB54DF34D5409AE77B6EF9C360B10C459D9199B358EB31EE49CBD1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a84c57ce95dae868699551902fc86e397e3c00f69e123924e160bb36a58e237c
                                          • Instruction ID: 36fca9c7400c40d1799527d64b9074db709d21bd594afb48f98bbc6428dc02cf
                                          • Opcode Fuzzy Hash: a84c57ce95dae868699551902fc86e397e3c00f69e123924e160bb36a58e237c
                                          • Instruction Fuzzy Hash: C721C3357016169BC7299A25D49852EB7A6FF8476075441A9EA16CB394CF30DC0ACBC0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507392478.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_14cd000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a481137b90da28c42d284f1a76be1131d9f7df78b3d4cf0409b04c3964ebbdf6
                                          • Instruction ID: 39d621b08bd662758fdbabd5770a37b1e4f34f5ff3181915a04c590dea5b7319
                                          • Opcode Fuzzy Hash: a481137b90da28c42d284f1a76be1131d9f7df78b3d4cf0409b04c3964ebbdf6
                                          • Instruction Fuzzy Hash: A32167B9904204DFCB45CF58C8C0B26BB65FB84718F20C57EE8490B362C736D447CAA1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45e3b2a889129e8aa6c7067a528b7ad7173b43f390c4602e0de920558dcf2442
                                          • Instruction ID: 8c6ab4053c3b7fe6c67b84184541a383a95b6c507db887c0fe97f987319e160b
                                          • Opcode Fuzzy Hash: 45e3b2a889129e8aa6c7067a528b7ad7173b43f390c4602e0de920558dcf2442
                                          • Instruction Fuzzy Hash: 7B319675E11309CFCB44EFA8E59489DBBB2FF49311B2044AAE815AB368D731AD49CF40
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7846e7f03211c7ce0ea54ae6f30c24f4d9109e5153526bd650cca4a13b3e6d6b
                                          • Instruction ID: 578ee1326ebd57cfd2ac1361640e815cc6d91ee4acc2c97323b32807c88e0e0b
                                          • Opcode Fuzzy Hash: 7846e7f03211c7ce0ea54ae6f30c24f4d9109e5153526bd650cca4a13b3e6d6b
                                          • Instruction Fuzzy Hash: F71108367082555FCF4A6FB858251AE3EA3AFC9250B44486AE409DB3C5DF388D0183E2
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19d28f97454d0c990d2de0d1b6dbab749f0f44c5f500b8fffb680cfa8db259d4
                                          • Instruction ID: ec29bf04784df1bef5da3171de7514042c3c633992d2a8592d436e218519d757
                                          • Opcode Fuzzy Hash: 19d28f97454d0c990d2de0d1b6dbab749f0f44c5f500b8fffb680cfa8db259d4
                                          • Instruction Fuzzy Hash: 9421A1326041099FCB199F69E494B6B3BB2EF48720F144469FA058B250DB78DD55CBE0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5537caa8cbdfe2cf75fe5e7baae3a89c5c7515d4494037197702d966f26b676a
                                          • Instruction ID: 83c6f0f32edb2b3de6cf5b30de09cbd6acd25a60a5374258c7bc76a4c3596f4f
                                          • Opcode Fuzzy Hash: 5537caa8cbdfe2cf75fe5e7baae3a89c5c7515d4494037197702d966f26b676a
                                          • Instruction Fuzzy Hash: 59114671E002099BDF08DFAAD8086EEBBB2EFCD301F08D065D518A72A9DB305546CF65
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6eaaaadda303f99e78a7b05b85fea3d9c79073b166d184333ff456dd81d867d6
                                          • Instruction ID: 7084e1861ba2126173eea75e0789051b9c8373412ccab621b1a16cf5706bdaa9
                                          • Opcode Fuzzy Hash: 6eaaaadda303f99e78a7b05b85fea3d9c79073b166d184333ff456dd81d867d6
                                          • Instruction Fuzzy Hash: 7F0108757182248FD7054B7A585C2ABAEABAFCA210B1944B7E106C73C5DE388C068370
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26f525a9937a6e48bc05df76777601e4591d952a118ae5df36a44b72dc4b1d04
                                          • Instruction ID: c77a819fd47173393d35a31caccb2aa5c141e403c81e89477bde0e88f028e2e1
                                          • Opcode Fuzzy Hash: 26f525a9937a6e48bc05df76777601e4591d952a118ae5df36a44b72dc4b1d04
                                          • Instruction Fuzzy Hash: 42213571C1420ACFCB04EFA8D5585EDBFB0FF59304F1441AAD849B7264EB301A49CBA1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1dbace0093952ad903835af49fffc10913088b871b2e9d2ed86b93aa29671831
                                          • Instruction ID: 8f6a827025fec0e3caadeaecbc252d6a47fa195e7df39891aac44b5052c4747a
                                          • Opcode Fuzzy Hash: 1dbace0093952ad903835af49fffc10913088b871b2e9d2ed86b93aa29671831
                                          • Instruction Fuzzy Hash: 64213AB0D0120A9FDB85EFB9D55479EBFF2FB44304F1085AAE0449B364EB705A45CB91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 262957195dd215aa6daf5e6280d21da7e2d5c5b3c6f6c796b6a2372eb36fbe21
                                          • Instruction ID: 4ea17ea7b2aa5812df4dc36fbec269db2ea92432306c72aac9294f0a1b91a769
                                          • Opcode Fuzzy Hash: 262957195dd215aa6daf5e6280d21da7e2d5c5b3c6f6c796b6a2372eb36fbe21
                                          • Instruction Fuzzy Hash: 621153B6C0024ADFDB10DF9AC845BEEBFF4EB48320F108459E918A7210C339A954DFA5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ddcedcdc511529f47be00b617783f74418a0f6c5bd1be3f051cce3183303479
                                          • Instruction ID: 4f0f68b4a870c41c13cd9d3a782f5f42837fc644ba95a2396471ce32dd9e2882
                                          • Opcode Fuzzy Hash: 7ddcedcdc511529f47be00b617783f74418a0f6c5bd1be3f051cce3183303479
                                          • Instruction Fuzzy Hash: 4F114CB0D0120ADFDB84EFB9D54479EBBF2FB44304F1085AAD0449B364EB705A45CB91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44b9a6c3e6ef59bdeddd0fdcbdc0f30d8c9d1c3011f30048bfe3d5ca59e36964
                                          • Instruction ID: caa26fec026b06c7cd583be75dd9207733d23845148ca9e736f6430ec2905afa
                                          • Opcode Fuzzy Hash: 44b9a6c3e6ef59bdeddd0fdcbdc0f30d8c9d1c3011f30048bfe3d5ca59e36964
                                          • Instruction Fuzzy Hash: 0B21C274D1120D8FCB44EFB9E9496EDBFF0BF49300F10516AD809B2254EB301A49CBA1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a6356fd9e7666dd7d33837851db6517375bf5434dd9720a5144b8d70aebedd0
                                          • Instruction ID: 3be0da527d07f8970621773ca176962bd3ea2d9d103914198c235300040229de
                                          • Opcode Fuzzy Hash: 6a6356fd9e7666dd7d33837851db6517375bf5434dd9720a5144b8d70aebedd0
                                          • Instruction Fuzzy Hash: 8C113074F001498FDB00EFE9D850BDEBBB2EB58315F409495F908AB359E73499818F61
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e10a48c9c7f0efdc55a23cc1b1d4698e6b215a9162ae92eccc3b03e4bb2c261b
                                          • Instruction ID: f72ab14c7df5e8971118c0bcbb5897ec3243dc7d71fa1a34491ad3cf80c35ba8
                                          • Opcode Fuzzy Hash: e10a48c9c7f0efdc55a23cc1b1d4698e6b215a9162ae92eccc3b03e4bb2c261b
                                          • Instruction Fuzzy Hash: 281112B680024ADFDB10DF9AD845BDEBFF4EB88320F158419E918A7250C339A594DFA1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44b199d0d620c96a39e5b1503eb5122080d1357db4ab9a892a51f83a4f2172cb
                                          • Instruction ID: 2e8676216bdf8a60aa1ac0666a7b4800729dd7facfb9fe903e853b90fc03330a
                                          • Opcode Fuzzy Hash: 44b199d0d620c96a39e5b1503eb5122080d1357db4ab9a892a51f83a4f2172cb
                                          • Instruction Fuzzy Hash: 6501F5726000097BCB528E65E814BEF3BA6EFD8760F588069F614C7280DF7199168BA0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2caebd1e8ea42f34b1ef7132096460c87aea171c98a5f351f3ca30821ff3729
                                          • Instruction ID: adcf792dc59582375e120bb5f2567d4025a266b1a10de26963cb643cd14e0636
                                          • Opcode Fuzzy Hash: e2caebd1e8ea42f34b1ef7132096460c87aea171c98a5f351f3ca30821ff3729
                                          • Instruction Fuzzy Hash: 3F019EB6B10225CFC754DFB8E509A6E7BF4EF4861170101AAF806DB355EB35CD068B91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4679e911a7c44929ad7a91b92ae301a177b6d60d88ebf906ff0ec92349056fa3
                                          • Instruction ID: 9483af758bb75c6b9238964e5c7874ed7c73ec7a66b82c70511561d70d98fdab
                                          • Opcode Fuzzy Hash: 4679e911a7c44929ad7a91b92ae301a177b6d60d88ebf906ff0ec92349056fa3
                                          • Instruction Fuzzy Hash: 3D01FBB1E002199FDF44EFB9C8046AEBBF5AF48200F10856AD519E7250E7385A018BD1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7cf12dc9fd1fccee7303ffb420afa77b7b813d4b32364413632da6a83d816148
                                          • Instruction ID: c9a982ff0bac5ad1ae4aa3f8b66703a9bf84c81eb632dc02d572e2eb489fcd39
                                          • Opcode Fuzzy Hash: 7cf12dc9fd1fccee7303ffb420afa77b7b813d4b32364413632da6a83d816148
                                          • Instruction Fuzzy Hash: B8F0B4723041196F8F055E999C418EF7EABEBC8210B00442AF909D3250CB31481097A5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0dec349ed020ac1904216fca09c7bca6b00aaec87a34840b3938ecf1b39b8663
                                          • Instruction ID: d450060cfaa38bd6840de5c73b90eabc64edc37ff1494f8405cf8bf51bbe3a04
                                          • Opcode Fuzzy Hash: 0dec349ed020ac1904216fca09c7bca6b00aaec87a34840b3938ecf1b39b8663
                                          • Instruction Fuzzy Hash: 17F0A7317102148FE708DB3BE858A2A3BAAEFC475171580A9F706CB3B0DE31DC018B90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6191fa554300ac0b9b8d1041b95c139790566bf3e62a29d3765a7a3d3992e5c2
                                          • Instruction ID: 6141f00e0c424f05c72f859f067bcea500890af82d1d98fc81ee7a0b9c60ff1c
                                          • Opcode Fuzzy Hash: 6191fa554300ac0b9b8d1041b95c139790566bf3e62a29d3765a7a3d3992e5c2
                                          • Instruction Fuzzy Hash: 02F089757142108FD754D639D815A2537E5AFC571171540E6FB05CF771EA31CC058791
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbd61df421d5b3470984361e954843e3149c5817d49e6336f07d7001d48a3d7f
                                          • Instruction ID: 2f56140f3c05dfa337c7bdda669d588c1d1704261107f9784e7126d322f52a3b
                                          • Opcode Fuzzy Hash: fbd61df421d5b3470984361e954843e3149c5817d49e6336f07d7001d48a3d7f
                                          • Instruction Fuzzy Hash: B3F03471A11226CFCB84EF7CD444AAE7BF0AF08220B2145E9D50ADB320EB30DA05CBD0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b3b850770c882b5c677e79cf1544ec83529d852eebc6cabbfc0c7e9dce5157a
                                          • Instruction ID: 23d5d439a7895957fb8e8d6bfd388bf5d583de00011be53a1a77c6b3cb426524
                                          • Opcode Fuzzy Hash: 1b3b850770c882b5c677e79cf1544ec83529d852eebc6cabbfc0c7e9dce5157a
                                          • Instruction Fuzzy Hash: 6BE02270E041459BCF49AFBAAA2D2EEBB78D78A300F085464D644A71A5CB706016C7A1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 437d2a1d60c0700af6815ccc388d4660381544437bdfbf8323cd697aa8319634
                                          • Instruction ID: 6f7ce1750eb24584909ab3b96f9e46969bb08b4b9ba2e3ea935e6a03b1664307
                                          • Opcode Fuzzy Hash: 437d2a1d60c0700af6815ccc388d4660381544437bdfbf8323cd697aa8319634
                                          • Instruction Fuzzy Hash: 78E02230D04206CFCB988F69B91D6FABBB1EBCA300F049466D14062060DBB05219CB55
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 59da32dcea038c08190f7fcbe6bb251127359cbc86dead2e10217b4cbfaba1de
                                          • Instruction ID: 1d93f70cae462d669e153c26ee068a666f5142ca663564de5f89a7c41ea79bb3
                                          • Opcode Fuzzy Hash: 59da32dcea038c08190f7fcbe6bb251127359cbc86dead2e10217b4cbfaba1de
                                          • Instruction Fuzzy Hash: 71E026E3C08142CBD7549FAA65260B8BF30CFE325178860C7D289CB135D628E21ADB11
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a51671cdb28e1d4e5f67806dd202288f89df865d24757c1a334a82a631e5ac5a
                                          • Instruction ID: ae802780eba43a0db4710792b0a055ea4798bee6459d51921aa0c10bb7ecbff4
                                          • Opcode Fuzzy Hash: a51671cdb28e1d4e5f67806dd202288f89df865d24757c1a334a82a631e5ac5a
                                          • Instruction Fuzzy Hash: 67E04F36D2526A52CB01D7B5A8085DEBF38EF93250F54465BD42026056FB70265993A0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3405fbeb3a786502072def63eef3eac1cb0fe980ca3913aa583f65291eba0a9d
                                          • Instruction ID: db8cfe9a5269b80211ebb607dba456c0403f579192cc5d7d749a334f38f8a52d
                                          • Opcode Fuzzy Hash: 3405fbeb3a786502072def63eef3eac1cb0fe980ca3913aa583f65291eba0a9d
                                          • Instruction Fuzzy Hash: F6D01231D2022B968B00A6A5DC044DEB739EE96261B544626D52437154EB70265986E1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction ID: e2049fa48bc3c6e943cccb70727083a77e56c37d3f59a8d5d1a5112bfaf9a5a5
                                          • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction Fuzzy Hash: 1EC08C3320C1382BA674108F7C40EB7BB8CC3C13F4A2501B7FA5CE7200A842AC8441F8
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbe067855447f3e1608b4cfa81d75bf014fd4db9ed5e5d90f26046c04e560354
                                          • Instruction ID: 4e4c92239bb630f4bd6f797e0b6f701829480c0fe13c94a5f6acbb7fa19164a8
                                          • Opcode Fuzzy Hash: cbe067855447f3e1608b4cfa81d75bf014fd4db9ed5e5d90f26046c04e560354
                                          • Instruction Fuzzy Hash: D3D0677AB510189FCB04DF9CEC548DDBBB6FB9C221B048526F925A3261C6319921DB90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c62b193aaf9c8ebeb6fabbba27ab832ad8b6dcc46b612b9784dfefda570f9763
                                          • Instruction ID: f8a93324b2c8a4cc20c4726afcdc70ccbcdbae2755643ca293b59ec7bbcdc396
                                          • Opcode Fuzzy Hash: c62b193aaf9c8ebeb6fabbba27ab832ad8b6dcc46b612b9784dfefda570f9763
                                          • Instruction Fuzzy Hash: FED06C79D0412DDBCB60EFA8EA492ECBBB0EF89301F0014E6D909B3640DA305AA48F11
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b9c3b37d27f6c1e4f5c6406f60e862426ce130a362428d244746aec290ca8db
                                          • Instruction ID: 6db6377ee3f30123e5febe9dad9fd5f934d012081d1bdecc5e22ca8fbfe26bbf
                                          • Opcode Fuzzy Hash: 6b9c3b37d27f6c1e4f5c6406f60e862426ce130a362428d244746aec290ca8db
                                          • Instruction Fuzzy Hash: F5D05EA691834607C316E671E9920543B26BE91204BB8499AB8014E72AE678495A4262
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6305313106a083ae5f82a3a55f0cb53c12575e75e2a94d03e13352bb8b9cd8b
                                          • Instruction ID: 38d95c32a6c59f47d73c51a3fb8eb7e5a938fc86eb4ca0002dacffa5875ee7a4
                                          • Opcode Fuzzy Hash: b6305313106a083ae5f82a3a55f0cb53c12575e75e2a94d03e13352bb8b9cd8b
                                          • Instruction Fuzzy Hash: F1C0127111430F47C601FB76F985559372FBBD0200F744954B40A0A219EF7C199646A1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94e18f9fe59d1d05ac50a5ce5b48de1781adf96216709a23e34314ded99cba2b
                                          • Instruction ID: e03d28112df4edb2b4467da55000167224e9e2637f2f36b8895ab66b6a5b5239
                                          • Opcode Fuzzy Hash: 94e18f9fe59d1d05ac50a5ce5b48de1781adf96216709a23e34314ded99cba2b
                                          • Instruction Fuzzy Hash: CBC08C763000004BCB04CB28EA8BB187B62AB88311F2AC064B044C7B60C620E956C704
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4517575713.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6b60000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "$0oFp$Hgq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq
                                          • API String ID: 0-4227257650
                                          • Opcode ID: 7716a33f9f1153ab4a032816083e6a71dfc9a87efcf9db26982435098e577401
                                          • Instruction ID: c1791900f014264d2bc880283aa2b8981657bb14d77b6e76562ed95ba8eda589
                                          • Opcode Fuzzy Hash: 7716a33f9f1153ab4a032816083e6a71dfc9a87efcf9db26982435098e577401
                                          • Instruction Fuzzy Hash: 0512C3B4E00218CFDB58DF69C984B9DBBB2BF89300F2084A9D909A7355DB359E85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xgq$Xgq$Xgq$Xgq
                                          • API String ID: 0-1951159037
                                          • Opcode ID: c030fa07d56b06d0985793c1052a9ef21977bf94814228f9f8711dbbd6bc9f70
                                          • Instruction ID: 28d0e2dd14b439efc6b395e4d3ee84c8e9d6eb2667bc7aae5576c6be2094b633
                                          • Opcode Fuzzy Hash: c030fa07d56b06d0985793c1052a9ef21977bf94814228f9f8711dbbd6bc9f70
                                          • Instruction Fuzzy Hash: CD318571D0022D8BDFB49B68C95037FBAB6FB48310F2045A9CE45A7284DB308989CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.4507956536.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2bf0000_MB267382625AE.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \;cq$\;cq$\;cq$\;cq
                                          • API String ID: 0-2961067002
                                          • Opcode ID: cc7324a62358cfd246b265d7c532c8c0b190a3adc603c4d4cde7e24525c275b0
                                          • Instruction ID: 6e1f0aec8852e09d82ba469cf7e25c2135964d2621198cba2dc4e5dbd2f0c671
                                          • Opcode Fuzzy Hash: cc7324a62358cfd246b265d7c532c8c0b190a3adc603c4d4cde7e24525c275b0
                                          • Instruction Fuzzy Hash: 8C0171317100158F8BA48E3DC484A2677EAEFD866473541BAEA12CB7B4DB71DC49C750

                                          Execution Graph

                                          Execution Coverage:10.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:207
                                          Total number of Limit Nodes:8
                                          execution_graph 27079 7813bc0 27080 7813be6 27079->27080 27081 7813d4b 27079->27081 27080->27081 27083 7813e40 PostMessageW 27080->27083 27084 7813eac 27083->27084 27084->27080 27257 54e4668 27258 54e467a 27257->27258 27259 54e4686 27258->27259 27263 54e4779 27258->27263 27268 54e3e34 27259->27268 27261 54e46a5 27264 54e479d 27263->27264 27272 54e4888 27264->27272 27276 54e4879 27264->27276 27269 54e3e3f 27268->27269 27284 54e5c44 27269->27284 27271 54e7018 27271->27261 27274 54e48af 27272->27274 27273 54e498c 27273->27273 27274->27273 27280 54e44b4 27274->27280 27278 54e4888 27276->27278 27277 54e498c 27277->27277 27278->27277 27279 54e44b4 CreateActCtxA 27278->27279 27279->27277 27281 54e5918 CreateActCtxA 27280->27281 27283 54e59db 27281->27283 27285 54e5c4f 27284->27285 27288 54e5c64 27285->27288 27287 54e70bd 27287->27271 27289 54e5c6f 27288->27289 27292 54e5c94 27289->27292 27291 54e719a 27291->27287 27293 54e5c9f 27292->27293 27296 54e5cc4 27293->27296 27295 54e728d 27295->27291 27297 54e5ccf 27296->27297 27299 54e858b 27297->27299 27302 54eac3a 27297->27302 27298 54e85c9 27298->27295 27299->27298 27306 54ecd29 27299->27306 27312 54eac5f 27302->27312 27317 54eac70 27302->27317 27303 54eac4e 27303->27299 27307 54ecd59 27306->27307 27308 54ecd7d 27307->27308 27331 54eced8 27307->27331 27335 54ecea5 27307->27335 27339 54ecee8 27307->27339 27308->27298 27313 54eac70 27312->27313 27321 54ead58 27313->27321 27326 54ead68 27313->27326 27314 54eac7f 27314->27303 27319 54ead58 GetModuleHandleW 27317->27319 27320 54ead68 GetModuleHandleW 27317->27320 27318 54eac7f 27318->27303 27319->27318 27320->27318 27322 54ead79 27321->27322 27323 54ead9c 27321->27323 27322->27323 27324 54eafa0 GetModuleHandleW 27322->27324 27323->27314 27325 54eafcd 27324->27325 27325->27314 27327 54ead9c 27326->27327 27328 54ead79 27326->27328 27327->27314 27328->27327 27329 54eafa0 GetModuleHandleW 27328->27329 27330 54eafcd 27329->27330 27330->27314 27332 54ecedb 27331->27332 27333 54ecf2f 27332->27333 27343 54ebaa0 27332->27343 27333->27308 27336 54ecec5 27335->27336 27336->27308 27337 54ebaa0 2 API calls 27336->27337 27338 54ecf2f 27336->27338 27337->27338 27338->27308 27340 54ecef5 27339->27340 27341 54ecf2f 27340->27341 27342 54ebaa0 2 API calls 27340->27342 27341->27308 27342->27341 27344 54ebaab 27343->27344 27346 54edc48 27344->27346 27347 54ed29c 27344->27347 27346->27346 27348 54ed2a7 27347->27348 27349 54e5cc4 2 API calls 27348->27349 27350 54edcb7 27349->27350 27350->27346 27085 7811709 27089 7812a58 27085->27089 27106 7812a49 27085->27106 27086 7811722 27090 7812a72 27089->27090 27123 7813017 27090->27123 27128 7812f77 27090->27128 27133 78135ee 27090->27133 27138 78131ae 27090->27138 27143 7812e4f 27090->27143 27148 7812f0f 27090->27148 27152 7812ea8 27090->27152 27157 7812ee9 27090->27157 27162 7813367 27090->27162 27166 7813327 27090->27166 27174 7813444 27090->27174 27178 7812f64 27090->27178 27187 7812fc2 27090->27187 27192 781317b 27090->27192 27091 7812a96 27091->27086 27107 7812a72 27106->27107 27109 7812fc2 2 API calls 27107->27109 27110 7812f64 4 API calls 27107->27110 27111 7813444 2 API calls 27107->27111 27112 7813327 4 API calls 27107->27112 27113 7813367 2 API calls 27107->27113 27114 7812ee9 2 API calls 27107->27114 27115 7812ea8 2 API calls 27107->27115 27116 7812f0f 2 API calls 27107->27116 27117 7812e4f 2 API calls 27107->27117 27118 78131ae 2 API calls 27107->27118 27119 78135ee 2 API calls 27107->27119 27120 7812f77 2 API calls 27107->27120 27121 7813017 2 API calls 27107->27121 27122 781317b 2 API calls 27107->27122 27108 7812a96 27108->27086 27109->27108 27110->27108 27111->27108 27112->27108 27113->27108 27114->27108 27115->27108 27116->27108 27117->27108 27118->27108 27119->27108 27120->27108 27121->27108 27122->27108 27124 7813040 27123->27124 27125 78137fa 27124->27125 27197 7810f30 27124->27197 27201 7810f38 27124->27201 27129 7812f7d 27128->27129 27205 7810cf0 27129->27205 27209 7810ce9 27129->27209 27130 7812fa3 27130->27091 27136 7810f30 WriteProcessMemory 27133->27136 27137 7810f38 WriteProcessMemory 27133->27137 27134 7813311 27134->27133 27135 7813758 27134->27135 27136->27134 27137->27134 27139 7812eb1 27138->27139 27213 7811020 27139->27213 27217 7811028 27139->27217 27140 781309a 27140->27091 27144 7812e55 27143->27144 27221 78111c0 27144->27221 27225 78111b4 27144->27225 27150 7810f30 WriteProcessMemory 27148->27150 27151 7810f38 WriteProcessMemory 27148->27151 27149 7812f36 27150->27149 27151->27149 27153 7812eb1 27152->27153 27155 7811020 ReadProcessMemory 27153->27155 27156 7811028 ReadProcessMemory 27153->27156 27154 781309a 27154->27091 27155->27154 27156->27154 27158 7812f08 27157->27158 27160 7810cf0 ResumeThread 27158->27160 27161 7810ce9 ResumeThread 27158->27161 27159 7812fa3 27159->27091 27160->27159 27161->27159 27163 781309a 27162->27163 27164 7811020 ReadProcessMemory 27162->27164 27165 7811028 ReadProcessMemory 27162->27165 27163->27091 27164->27163 27165->27163 27229 7810da0 27166->27229 27233 7810d99 27166->27233 27167 78132e7 27167->27166 27168 7812eb1 27167->27168 27172 7811020 ReadProcessMemory 27168->27172 27173 7811028 ReadProcessMemory 27168->27173 27169 781309a 27169->27091 27172->27169 27173->27169 27237 7810e71 27174->27237 27241 7810e78 27174->27241 27175 7813462 27179 7812f71 27178->27179 27180 7812f08 27178->27180 27183 7810da0 Wow64SetThreadContext 27179->27183 27184 7810d99 Wow64SetThreadContext 27179->27184 27181 78132a9 27180->27181 27185 7810cf0 ResumeThread 27180->27185 27186 7810ce9 ResumeThread 27180->27186 27181->27091 27182 7812fa3 27182->27091 27183->27180 27184->27180 27185->27182 27186->27182 27188 7812eb1 27187->27188 27188->27187 27190 7811020 ReadProcessMemory 27188->27190 27191 7811028 ReadProcessMemory 27188->27191 27189 781309a 27189->27091 27190->27189 27191->27189 27193 7813040 27192->27193 27193->27192 27194 78137fa 27193->27194 27195 7810f30 WriteProcessMemory 27193->27195 27196 7810f38 WriteProcessMemory 27193->27196 27195->27193 27196->27193 27198 7810f38 WriteProcessMemory 27197->27198 27200 7810fd7 27198->27200 27200->27124 27202 7810f80 WriteProcessMemory 27201->27202 27204 7810fd7 27202->27204 27204->27124 27206 7810d30 ResumeThread 27205->27206 27208 7810d61 27206->27208 27208->27130 27210 7810cf0 ResumeThread 27209->27210 27212 7810d61 27210->27212 27212->27130 27215 7811026 ReadProcessMemory 27213->27215 27216 78110b7 27215->27216 27216->27140 27219 7811073 ReadProcessMemory 27217->27219 27220 78110b7 27219->27220 27220->27140 27222 7811249 CreateProcessA 27221->27222 27224 781140b 27222->27224 27226 78111c0 CreateProcessA 27225->27226 27228 781140b 27226->27228 27230 7810de5 Wow64SetThreadContext 27229->27230 27232 7810e2d 27230->27232 27232->27167 27234 7810de5 Wow64SetThreadContext 27233->27234 27236 7810e2d 27234->27236 27236->27167 27238 7810e78 VirtualAllocEx 27237->27238 27240 7810ef5 27238->27240 27240->27175 27242 7810eb8 VirtualAllocEx 27241->27242 27244 7810ef5 27242->27244 27244->27175 27245 54ed000 27246 54ed046 GetCurrentProcess 27245->27246 27248 54ed098 GetCurrentThread 27246->27248 27249 54ed091 27246->27249 27250 54ed0ce 27248->27250 27251 54ed0d5 GetCurrentProcess 27248->27251 27249->27248 27250->27251 27254 54ed10b 27251->27254 27252 54ed133 GetCurrentThreadId 27253 54ed164 27252->27253 27254->27252 27255 54ed650 DuplicateHandle 27256 54ed6e6 27255->27256

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 496 76234b8-76234e0 497 76234e2 496->497 498 76234e7-76235a3 496->498 497->498 501 76235a5-76235a6 498->501 502 76235a8-76235b5 498->502 503 76235c7-76235cb 501->503 502->501 502->503 504 76235d1-76235fb 503->504 505 7623abb-7623afd 503->505 508 7623601-7623619 504->508 509 7623cc8-7623cd4 504->509 514 7623b00-7623b04 505->514 510 7623cda-7623ce3 508->510 511 762361f-7623620 508->511 509->510 517 7623ce9-7623cf5 510->517 513 7623cae-7623cba 511->513 515 7623cc0-7623cc7 513->515 516 7623625-7623631 513->516 518 76236d6-76236da 514->518 519 7623b0a-7623b10 514->519 522 7623633 516->522 523 7623638-7623653 516->523 528 7623cfb-7623d07 517->528 520 76236ec-76236f2 518->520 521 76236dc-76236ea 518->521 519->505 524 7623b12-7623b6d 519->524 526 7623737-762373b 520->526 525 762374a-762377c 521->525 522->523 523->517 527 7623659-762367e 523->527 543 7623ba4-7623bce 524->543 544 7623b6f-7623ba2 524->544 549 76237a6 525->549 550 762377e-762378a 525->550 529 76236f4-7623700 526->529 530 762373d 526->530 527->528 541 7623684-7623686 527->541 536 7623d0d-7623d14 528->536 533 7623702 529->533 534 7623707-762370f 529->534 537 7623740-7623744 530->537 533->534 539 7623711-7623725 534->539 540 7623734 534->540 537->525 542 76236bc-76236d3 537->542 546 762372b-7623732 539->546 547 7623689-7623694 539->547 540->526 541->547 542->518 557 7623bd7-7623c56 543->557 544->557 546->530 547->536 551 762369a-76236b7 547->551 556 76237ac-76237d9 549->556 553 7623794-762379a 550->553 554 762378c-7623792 550->554 551->537 558 76237a4 553->558 554->558 563 76237db-7623813 556->563 564 7623828-76238bb 556->564 571 7623c5d-7623c70 557->571 558->556 572 7623c7f-7623c84 563->572 579 76238c4-76238c5 564->579 580 76238bd 564->580 571->572 573 7623c86-7623c94 572->573 574 7623c9b-7623cab 572->574 573->574 574->513 581 7623916-762391c 579->581 580->579 582 76238c7-76238e6 581->582 583 762391e-76239e0 581->583 584 76238e8 582->584 585 76238ed-7623913 582->585 594 76239e2-7623a1b 583->594 595 7623a21-7623a25 583->595 584->585 585->581 594->595 596 7623a66-7623a6a 595->596 597 7623a27-7623a60 595->597 598 7623aab-7623aaf 596->598 599 7623a6c-7623aa5 596->599 597->596 598->524 601 7623ab1-7623ab9 598->601 599->598 601->514
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'cq$:$pgq$~
                                          • API String ID: 0-1276774758
                                          • Opcode ID: 3e5ff95b2f0ca5a432e227cefee163cb70aeb084bf633354f477cc097e160e63
                                          • Instruction ID: 728adb867f4a998f5594d6af5c3fe3903e6fa959ad385764099b88c8f5704cb7
                                          • Opcode Fuzzy Hash: 3e5ff95b2f0ca5a432e227cefee163cb70aeb084bf633354f477cc097e160e63
                                          • Instruction Fuzzy Hash: B14203B5A00628DFDB55CF69C940B99BBB2FF89300F1580E9E50AAB361D7359D92DF00

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 629 7622106-762210a 630 762210b-7622120 629->630 631 7622acd-7622add 629->631 630->631 632 7622121-762212c 630->632 634 7622132-762213e 632->634 635 762214a-7622159 634->635 637 76221b8-76221bc 635->637 638 76221c2-76221cb 637->638 639 7622264-76222ce 637->639 640 76221d1-76221e7 638->640 641 76220c6-76220d2 638->641 639->631 677 76222d4-762281b 639->677 648 7622239-762224b 640->648 649 76221e9-76221ec 640->649 641->631 643 76220d8-76220e4 641->643 644 76220e6-76220fa 643->644 645 762215b-7622161 643->645 644->645 655 76220fc-7622105 644->655 645->631 650 7622167-762217f 645->650 658 7622251-7622261 648->658 659 7622a0c-7622ac2 648->659 649->631 652 76221f2-762222f 649->652 650->631 657 7622185-76221ad 650->657 652->639 673 7622231-7622237 652->673 655->629 657->637 659->631 673->648 673->649 755 7622832-76228c5 677->755 756 762281d-7622827 677->756 757 76228d0-7622963 755->757 756->757 758 762282d 756->758 760 762296e-7622a01 757->760 758->760 760->659
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: D
                                          • API String ID: 0-2746444292
                                          • Opcode ID: d5a33b2717860845e608835aeca26b922ca28b3310bf96ffbd93b9c114591752
                                          • Instruction ID: a18fe87c7f4d720f47b30d4151963777b69f6ddd9396533e2be14b913cfa8142
                                          • Opcode Fuzzy Hash: d5a33b2717860845e608835aeca26b922ca28b3310bf96ffbd93b9c114591752
                                          • Instruction Fuzzy Hash: A652BC74A002298FCB64DF64C994A9DBBB2FF89311F1141D9D50AA7395DF34AE81CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 7622c38-7622c4a 295 7622c53-7622c5f 294->295 296 7622c4c-7622c4e 294->296 299 7622c61-7622c63 295->299 300 7622c68-7622c7d 295->300 297 7622d26-7622d2b 296->297 299->297 303 7622c91-7622c9d 300->303 304 7622c7f-7622c8a 300->304 307 7622caa-7622cac 303->307 308 7622c9f-7622ca8 303->308 304->303 309 7622cae-7622cba 307->309 310 7622cbc-7622cc0 307->310 308->307 309->310 315 7622cd2-7622cdc 309->315 312 7622cc2-7622ccc 310->312 313 7622cce-7622cd0 310->313 317 7622d38-7622d44 312->317 313->297 319 7622cde-7622cea 315->319 320 7622d2c-7622d36 315->320 322 7622d51-7622d53 317->322 323 7622d46-7622d4f 317->323 327 7622cfc-7622cfe 319->327 328 7622cec-7622cfa 319->328 320->317 322->297 323->297 327->297 328->327 330 7622d00-7622d06 328->330 331 7622d0a 330->331 332 7622d08 330->332 333 7622d0c-7622d0e 331->333 332->333 334 7622d10-7622d1c 333->334 335 7622d55-7622de1 333->335 334->335 338 7622d1e 334->338 348 7622de3-7622ded 335->348 349 7622def-7622e0b 335->349 338->297 348->349 352 7622e28-7622e3c 348->352 355 7622e23-7622e25 349->355 356 7622e0d-7622e21 349->356 360 7622e43-7622e79 352->360 356->355 356->360 364 7622f4e-7622f51 360->364 365 7622e7f-7622e91 360->365 367 7622e93-7622e96 365->367 368 7622ea6-7622ea9 365->368 369 7622f1b-7622f21 367->369 370 7622e9c-7622e9f 367->370 371 7622eab-7622eae 368->371 372 7622eb9-7622ebf 368->372 377 7622f23-7622f25 369->377 378 7622f27-7622f33 369->378 373 7622ea1 370->373 374 7622eea-7622ef0 370->374 375 7622eb4 371->375 376 7622f4a-7622f4c 371->376 379 7622ec1-7622ec3 372->379 380 7622ec5-7622ed1 372->380 373->376 381 7622ef2-7622ef4 374->381 382 7622ef6-7622f02 374->382 375->376 376->364 383 7622f52-7622fe5 376->383 384 7622f35-7622f48 377->384 378->384 385 7622ed3-7622ee8 379->385 380->385 386 7622f04-7622f19 381->386 382->386 401 7622fe7 383->401 402 7622fec-7623000 383->402 384->376 385->376 386->376 401->402 403 7623006-762300b 402->403 404 76230f4 402->404 405 7623011-7623016 403->405 406 76230c6 403->406 407 76230fa-76230fb 404->407 408 7623100 405->408 409 762301c-762301d 405->409 434 76230c9 call 76284fa 406->434 435 76230c9 call 7628508 406->435 407->403 438 7623100 call 76232c2 408->438 439 7623100 call 76232d0 408->439 442 7623020 call 7623d30 409->442 443 7623020 call 7623d21 409->443 444 7623020 call 7623d9e 409->444 410 76230cf-76230da 416 76230e3 410->416 417 76230dc-76230e0 410->417 411 7623106-7623107 411->409 412 7623026-7623033 414 7623039-762303d 412->414 415 762310c-7623113 412->415 418 7623043-762305b 414->418 419 7623118-762311f 414->419 415->414 436 76230e3 call 7813b48 416->436 437 76230e3 call 7813b58 416->437 420 76230e2 417->420 421 7623086-7623087 417->421 425 7623061-7623064 418->425 426 7623124-762312b 418->426 419->418 420->416 445 762308a call 7626c28 421->445 446 762308a call 7626c18 421->446 423 76230e9-76230f1 447 7623067 call 76243c0 425->447 448 7623067 call 76243b0 425->448 426->425 427 7623090-762309c 449 762309f call 7627f50 427->449 450 762309f call 7627f41 427->450 451 762309f call 7627ef9 427->451 428 762306d-762307a 430 7623130-7623137 428->430 431 7623080 428->431 429 76230a5-76230b2 429->416 432 76230b4 429->432 430->431 431->421 440 76230b7 call 76283c8 432->440 441 76230b7 call 76283d8 432->441 433 76230bd-76230c3 433->406 434->410 435->410 436->423 437->423 438->411 439->411 440->433 441->433 442->412 443->412 444->412 445->427 446->427 447->428 448->428 449->429 450->429 451->429
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'cq$4'cq$4'cq$4|hq$4|hq$$cq
                                          • API String ID: 0-3911544005
                                          • Opcode ID: 1d07a727a365a1b40269d9e4dfd3383054ceeae8a0a41c9650d36bb4d590cb9d
                                          • Instruction ID: ecc7bfe932e948d2658fa089ea84ca0f64888aa3163e431e319aa83f09d888b5
                                          • Opcode Fuzzy Hash: 1d07a727a365a1b40269d9e4dfd3383054ceeae8a0a41c9650d36bb4d590cb9d
                                          • Instruction Fuzzy Hash: D2E1BBB1B106268FCB55DB79D86856E7BE2BF89201B164469E007DB3A1DF34CC42DF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 452 54ecff1-54ed08f GetCurrentProcess 456 54ed098-54ed0cc GetCurrentThread 452->456 457 54ed091-54ed097 452->457 458 54ed0ce-54ed0d4 456->458 459 54ed0d5-54ed109 GetCurrentProcess 456->459 457->456 458->459 460 54ed10b-54ed111 459->460 461 54ed112-54ed12d call 54ed5d9 459->461 460->461 465 54ed133-54ed162 GetCurrentThreadId 461->465 466 54ed16b-54ed1cd 465->466 467 54ed164-54ed16a 465->467 467->466
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 054ED07E
                                          • GetCurrentThread.KERNEL32 ref: 054ED0BB
                                          • GetCurrentProcess.KERNEL32 ref: 054ED0F8
                                          • GetCurrentThreadId.KERNEL32 ref: 054ED151
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: df8bd059a7b10dd51709140245ae1de86780a091bd93d331af69c0a0b57f286a
                                          • Instruction ID: 1e68d6d353017aef495f4c2289ce5c7914e8037cddc946da5be0965cda2adb9a
                                          • Opcode Fuzzy Hash: df8bd059a7b10dd51709140245ae1de86780a091bd93d331af69c0a0b57f286a
                                          • Instruction Fuzzy Hash: D45145B0D006498FDB14CFA9D948BDEBBF1BF88315F24845EE409A73A0DB345984CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 474 54ed000-54ed08f GetCurrentProcess 478 54ed098-54ed0cc GetCurrentThread 474->478 479 54ed091-54ed097 474->479 480 54ed0ce-54ed0d4 478->480 481 54ed0d5-54ed109 GetCurrentProcess 478->481 479->478 480->481 482 54ed10b-54ed111 481->482 483 54ed112-54ed12d call 54ed5d9 481->483 482->483 487 54ed133-54ed162 GetCurrentThreadId 483->487 488 54ed16b-54ed1cd 487->488 489 54ed164-54ed16a 487->489 489->488
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 054ED07E
                                          • GetCurrentThread.KERNEL32 ref: 054ED0BB
                                          • GetCurrentProcess.KERNEL32 ref: 054ED0F8
                                          • GetCurrentThreadId.KERNEL32 ref: 054ED151
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: c9c17d24c8a7e7e39c032b5ac2eabbcdc4d4f463f4d7b6cc8c26a70e8cd03fd1
                                          • Instruction ID: 655e9fcfbac5c163f8e1d1beb7f47efcff4e1a933190fcaa07a2df826e6e306e
                                          • Opcode Fuzzy Hash: c9c17d24c8a7e7e39c032b5ac2eabbcdc4d4f463f4d7b6cc8c26a70e8cd03fd1
                                          • Instruction Fuzzy Hash: 495143B0D006098FDB14CFA9D948B9EBBF1BB88315F24845EE419A73A0DB745984CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 995 78111b4-7811255 998 7811257-7811261 995->998 999 781128e-78112ae 995->999 998->999 1000 7811263-7811265 998->1000 1006 78112b0-78112ba 999->1006 1007 78112e7-7811316 999->1007 1001 7811267-7811271 1000->1001 1002 7811288-781128b 1000->1002 1004 7811273 1001->1004 1005 7811275-7811284 1001->1005 1002->999 1004->1005 1005->1005 1008 7811286 1005->1008 1006->1007 1009 78112bc-78112be 1006->1009 1015 7811318-7811322 1007->1015 1016 781134f-7811409 CreateProcessA 1007->1016 1008->1002 1010 78112e1-78112e4 1009->1010 1011 78112c0-78112ca 1009->1011 1010->1007 1013 78112cc 1011->1013 1014 78112ce-78112dd 1011->1014 1013->1014 1014->1014 1017 78112df 1014->1017 1015->1016 1018 7811324-7811326 1015->1018 1027 7811412-7811498 1016->1027 1028 781140b-7811411 1016->1028 1017->1010 1020 7811349-781134c 1018->1020 1021 7811328-7811332 1018->1021 1020->1016 1022 7811334 1021->1022 1023 7811336-7811345 1021->1023 1022->1023 1023->1023 1025 7811347 1023->1025 1025->1020 1038 78114a8-78114ac 1027->1038 1039 781149a-781149e 1027->1039 1028->1027 1041 78114bc-78114c0 1038->1041 1042 78114ae-78114b2 1038->1042 1039->1038 1040 78114a0 1039->1040 1040->1038 1044 78114d0-78114d4 1041->1044 1045 78114c2-78114c6 1041->1045 1042->1041 1043 78114b4 1042->1043 1043->1041 1047 78114e6-78114ed 1044->1047 1048 78114d6-78114dc 1044->1048 1045->1044 1046 78114c8 1045->1046 1046->1044 1049 7811504 1047->1049 1050 78114ef-78114fe 1047->1050 1048->1047 1052 7811505 1049->1052 1050->1049 1052->1052
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 078113F6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 1b55768b97e461a1d71759bcde6a84c643d0c3f62afcbe3d4b115388f2f1c565
                                          • Instruction ID: 229f3ffba7f1694bce069ddb0fc7fbe32c8ee450ab5017f8744d4ed55db24893
                                          • Opcode Fuzzy Hash: 1b55768b97e461a1d71759bcde6a84c643d0c3f62afcbe3d4b115388f2f1c565
                                          • Instruction Fuzzy Hash: 4BA14BB1D0021ECFDB20CFA9C8457DDBBB6BB58314F1485A9D909E7280DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1053 78111c0-7811255 1055 7811257-7811261 1053->1055 1056 781128e-78112ae 1053->1056 1055->1056 1057 7811263-7811265 1055->1057 1063 78112b0-78112ba 1056->1063 1064 78112e7-7811316 1056->1064 1058 7811267-7811271 1057->1058 1059 7811288-781128b 1057->1059 1061 7811273 1058->1061 1062 7811275-7811284 1058->1062 1059->1056 1061->1062 1062->1062 1065 7811286 1062->1065 1063->1064 1066 78112bc-78112be 1063->1066 1072 7811318-7811322 1064->1072 1073 781134f-7811409 CreateProcessA 1064->1073 1065->1059 1067 78112e1-78112e4 1066->1067 1068 78112c0-78112ca 1066->1068 1067->1064 1070 78112cc 1068->1070 1071 78112ce-78112dd 1068->1071 1070->1071 1071->1071 1074 78112df 1071->1074 1072->1073 1075 7811324-7811326 1072->1075 1084 7811412-7811498 1073->1084 1085 781140b-7811411 1073->1085 1074->1067 1077 7811349-781134c 1075->1077 1078 7811328-7811332 1075->1078 1077->1073 1079 7811334 1078->1079 1080 7811336-7811345 1078->1080 1079->1080 1080->1080 1082 7811347 1080->1082 1082->1077 1095 78114a8-78114ac 1084->1095 1096 781149a-781149e 1084->1096 1085->1084 1098 78114bc-78114c0 1095->1098 1099 78114ae-78114b2 1095->1099 1096->1095 1097 78114a0 1096->1097 1097->1095 1101 78114d0-78114d4 1098->1101 1102 78114c2-78114c6 1098->1102 1099->1098 1100 78114b4 1099->1100 1100->1098 1104 78114e6-78114ed 1101->1104 1105 78114d6-78114dc 1101->1105 1102->1101 1103 78114c8 1102->1103 1103->1101 1106 7811504 1104->1106 1107 78114ef-78114fe 1104->1107 1105->1104 1109 7811505 1106->1109 1107->1106 1109->1109
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 078113F6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: f38477c6c97d72bf47254334ebc1be4366a7326d5950133df8ed637f392cbf92
                                          • Instruction ID: 31d88ecc5e00fb124422c4a01c58d0780ab357d0547f4097f8738c178edfeb23
                                          • Opcode Fuzzy Hash: f38477c6c97d72bf47254334ebc1be4366a7326d5950133df8ed637f392cbf92
                                          • Instruction Fuzzy Hash: 5A915BB1D0021ECFDB20CFA8C845BDDBBB6BB58310F1481A9D908E7280DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1110 54ead68-54ead77 1111 54ead79-54ead86 call 54ea08c 1110->1111 1112 54eada3-54eada7 1110->1112 1119 54ead9c 1111->1119 1120 54ead88 1111->1120 1113 54eadbb-54eadfc 1112->1113 1114 54eada9-54eadb3 1112->1114 1121 54eadfe-54eae06 1113->1121 1122 54eae09-54eae17 1113->1122 1114->1113 1119->1112 1165 54ead8e call 54eaff0 1120->1165 1166 54ead8e call 54eb000 1120->1166 1121->1122 1123 54eae3b-54eae3d 1122->1123 1124 54eae19-54eae1e 1122->1124 1126 54eae40-54eae47 1123->1126 1127 54eae29 1124->1127 1128 54eae20-54eae27 call 54ea098 1124->1128 1125 54ead94-54ead96 1125->1119 1129 54eaed8-54eaf98 1125->1129 1132 54eae49-54eae51 1126->1132 1133 54eae54-54eae5b 1126->1133 1130 54eae2b-54eae39 1127->1130 1128->1130 1160 54eaf9a-54eaf9d 1129->1160 1161 54eafa0-54eafcb GetModuleHandleW 1129->1161 1130->1126 1132->1133 1134 54eae5d-54eae65 1133->1134 1135 54eae68-54eae71 call 54ea0a8 1133->1135 1134->1135 1141 54eae7e-54eae83 1135->1141 1142 54eae73-54eae7b 1135->1142 1143 54eae85-54eae8c 1141->1143 1144 54eaea1-54eaea5 1141->1144 1142->1141 1143->1144 1146 54eae8e-54eae9e call 54ea0b8 call 54ea0c8 1143->1146 1149 54eaeab-54eaeae 1144->1149 1146->1144 1150 54eaeb0-54eaece 1149->1150 1151 54eaed1-54eaed7 1149->1151 1150->1151 1160->1161 1162 54eafcd-54eafd3 1161->1162 1163 54eafd4-54eafe8 1161->1163 1162->1163 1165->1125 1166->1125
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 054EAFBE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 4f12890536f58ff83c70d89dbe7aeda8d1faea4bfe3cd7ff3a2243b6bd0b9033
                                          • Instruction ID: 9e82a36e6122d9bcba310d0dbc28efcb3872846a1b642ace82cf052c1399eb76
                                          • Opcode Fuzzy Hash: 4f12890536f58ff83c70d89dbe7aeda8d1faea4bfe3cd7ff3a2243b6bd0b9033
                                          • Instruction Fuzzy Hash: 8D7114B0A00B058FD724DF2AD44979ABBF2BF88305F10896ED48A97B40D775E849CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1167 54e590c-54e59d9 CreateActCtxA 1169 54e59db-54e59e1 1167->1169 1170 54e59e2-54e5a3c 1167->1170 1169->1170 1177 54e5a3e-54e5a41 1170->1177 1178 54e5a4b-54e5a4f 1170->1178 1177->1178 1179 54e5a60 1178->1179 1180 54e5a51-54e5a5d 1178->1180 1182 54e5a61 1179->1182 1180->1179 1182->1182
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 054E59C9
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: f92a958069a83a4a2a86216774803b7452bdcd12e5ba45b1bc1d0aaf17739e5a
                                          • Instruction ID: 623d9cbebf7d4ec07d4ef1d3571a88f3c42ea4bbfd63d986c6b6033799385162
                                          • Opcode Fuzzy Hash: f92a958069a83a4a2a86216774803b7452bdcd12e5ba45b1bc1d0aaf17739e5a
                                          • Instruction Fuzzy Hash: FF41E0B0D0062DCBDB24DFA9C885BCEBBF5BF49308F20845AD409AB251DB756946CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1183 54e44b4-54e59d9 CreateActCtxA 1186 54e59db-54e59e1 1183->1186 1187 54e59e2-54e5a3c 1183->1187 1186->1187 1194 54e5a3e-54e5a41 1187->1194 1195 54e5a4b-54e5a4f 1187->1195 1194->1195 1196 54e5a60 1195->1196 1197 54e5a51-54e5a5d 1195->1197 1199 54e5a61 1196->1199 1197->1196 1199->1199
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 054E59C9
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 71b52877109e8e67745d322a9972aeceacac1a0a5b4b399cb0f646769d38ca9d
                                          • Instruction ID: 015ce70e7abbc07a64ae40439089668bf8b0467a03e6cacc01823296ec71e809
                                          • Opcode Fuzzy Hash: 71b52877109e8e67745d322a9972aeceacac1a0a5b4b399cb0f646769d38ca9d
                                          • Instruction Fuzzy Hash: A841BFB0D0062DCBDB24DFA9C884BDEBBF5BF49304F20805AD409AB251DB756946CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1200 7810f30-7810f86 1203 7810f96-7810fd5 WriteProcessMemory 1200->1203 1204 7810f88-7810f94 1200->1204 1206 7810fd7-7810fdd 1203->1206 1207 7810fde-781100e 1203->1207 1204->1203 1206->1207
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07810FC8
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 1805f6f62320e81f548ee7bf93adbdfc6ef6a19a9fe62afd5e72d74458a49eaa
                                          • Instruction ID: cdd02721587760c32852b3868c605c149684f0ffcef010a4427ebdb4109777e5
                                          • Opcode Fuzzy Hash: 1805f6f62320e81f548ee7bf93adbdfc6ef6a19a9fe62afd5e72d74458a49eaa
                                          • Instruction Fuzzy Hash: 8D2126B1D003099FCB10DFA9C885BDEBBF5FF48314F10842AE919A7241D7789955CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1211 7811020-7811024 1212 7811026-7811089 1211->1212 1213 781108a 1211->1213 1212->1213 1215 7811098-78110b5 ReadProcessMemory 1213->1215 1216 781108c-7811093 1213->1216 1217 78110b7-78110bd 1215->1217 1218 78110be-78110ee 1215->1218 1216->1215 1217->1218
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078110A8
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 34b5f4aa6eed0110dfece967f246e97e92243348d7f1b685140d0a913c77008b
                                          • Instruction ID: 8c8b6ca896fc167b5fbc922525d2f134c25c583ea0fb174fc6da6003042a2147
                                          • Opcode Fuzzy Hash: 34b5f4aa6eed0110dfece967f246e97e92243348d7f1b685140d0a913c77008b
                                          • Instruction Fuzzy Hash: 152126B2D003499FCB10DFAAD845AEEBBF5FF58320F20842AE519A7240C7749945DBA1
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07810FC8
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 1b2910b37056f2ab3aea3ee5f9b245af4c2efc37dc604f1be0ed02a35ebd4c49
                                          • Instruction ID: 843b84d0c1e70e48f7c134ab678fe1d0a5d786e1d98c2a22d64179d387f77e72
                                          • Opcode Fuzzy Hash: 1b2910b37056f2ab3aea3ee5f9b245af4c2efc37dc604f1be0ed02a35ebd4c49
                                          • Instruction Fuzzy Hash: 202127B1D003499FCB10DFA9C985BDEBBF5FF48314F108429E919A7240D7789945CBA1
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07810E1E
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 7b1551ee210d201b75d4fded5884759c3f34bf064b6e039ccaa706a23d643a57
                                          • Instruction ID: 04cccfc87daa97e2c6420d3f2f0bd2d5d3b4fe043782a2c001c6363cb9b40da8
                                          • Opcode Fuzzy Hash: 7b1551ee210d201b75d4fded5884759c3f34bf064b6e039ccaa706a23d643a57
                                          • Instruction Fuzzy Hash: 112139B1D002098FDB10DFAAC4857EEBFF4EF88324F148429D459A7240C7789985CBA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 054ED6D7
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 8254eadb0754aeec10fac0243098b7cdd5eeb7cee8ad45d9cd349835b1bc3023
                                          • Instruction ID: 1d53a6a18e538f4e99f8897e1bf04f6f272aa5b5d6088b5db6a791f0e7f1fcdf
                                          • Opcode Fuzzy Hash: 8254eadb0754aeec10fac0243098b7cdd5eeb7cee8ad45d9cd349835b1bc3023
                                          • Instruction Fuzzy Hash: 0621E0B5D002099FDB10CFAAD585ADEBBF4EB48320F24841AE919A7350D378AA44CF65
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07810E1E
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: b0bdaaef0236c9177ffcc763b6711881b8b6f38e5deea45e13cf824c12bae17c
                                          • Instruction ID: ab4bb8bbb4d4a640727bbf199afba02236e0f094ae381ec15324de64be0e3a01
                                          • Opcode Fuzzy Hash: b0bdaaef0236c9177ffcc763b6711881b8b6f38e5deea45e13cf824c12bae17c
                                          • Instruction Fuzzy Hash: 802107B1D003098FDB10DFAAC4857AEBFF5AB98324F148429D559A7240DB78A985CBA1
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078110A8
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 13f73bac2e8c38c244da9f28afb1c174f258155169020f30060c0573aaa98ea6
                                          • Instruction ID: 98619f301e29fb260f94c77810497b07c865b33a7796c2cb7fa5c0337a978981
                                          • Opcode Fuzzy Hash: 13f73bac2e8c38c244da9f28afb1c174f258155169020f30060c0573aaa98ea6
                                          • Instruction Fuzzy Hash: DA2139B1D003599FCB10DFAAC845ADEFBF5FF88310F108429E519A7240C7799945DBA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 054ED6D7
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: ac2b98c9a8a2159b3694e9c68c93b6d1a515d532c760da57171244b96c5f5e22
                                          • Instruction ID: 151d1ae1db99d67e66d3682b7acee018cff9a742037b2b19f2c6bddab71b2835
                                          • Opcode Fuzzy Hash: ac2b98c9a8a2159b3694e9c68c93b6d1a515d532c760da57171244b96c5f5e22
                                          • Instruction Fuzzy Hash: D321C2B5D002499FDB10CFAAD984ADEBFF8FB48310F14841AE919A7350D378A954CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07810EE6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 746c574aa47a1bb1e0ec3805bc630706d0b501d501482d88e3e4f30936251831
                                          • Instruction ID: 2cf667f1ceb21f3ad5f59bccdbcbc2bd9c4ae15315036abff0a81d45fa86c040
                                          • Opcode Fuzzy Hash: 746c574aa47a1bb1e0ec3805bc630706d0b501d501482d88e3e4f30936251831
                                          • Instruction Fuzzy Hash: 421189B2D002499FCB10DFAAD845AEFBFF5EB88324F10841AE519A7240C775A541CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 3a2fb28a39c16ebc106a078428f31009f737168985c30103a70621b87107646d
                                          • Instruction ID: 78cdb0ed840ea18e1e6cb3819980dedf331df140b191ada306fd98f700c02fd2
                                          • Opcode Fuzzy Hash: 3a2fb28a39c16ebc106a078428f31009f737168985c30103a70621b87107646d
                                          • Instruction Fuzzy Hash: 1DE1A3B4E006299FDB60CFA8C880A9DBBF1FB49310F1481AAD819E7346D7359D96CF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: a1b023b49595912e1b7ea7215e2910b68ba8dce626bfa3bbc2a74dc9efa00886
                                          • Instruction ID: 218df0c8f9c3329deb72f26a9f92f88173bb33e20ec619adc38beb7e60149fea
                                          • Opcode Fuzzy Hash: a1b023b49595912e1b7ea7215e2910b68ba8dce626bfa3bbc2a74dc9efa00886
                                          • Instruction Fuzzy Hash: 4A1128B1D003498BCB20DFAAD4497EEFFF8EF88324F24841AD519A7640CB75A545CBA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07810EE6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 4c3d6f7bd4ef3b9dbe228439bf22940cdee1f8dcb2cf31bb80a1c215dfe60ab0
                                          • Instruction ID: add077e7c50f72562c77ab70ecaad56a5b9fea07a9a1d699eaee9d5f8517c1f9
                                          • Opcode Fuzzy Hash: 4c3d6f7bd4ef3b9dbe228439bf22940cdee1f8dcb2cf31bb80a1c215dfe60ab0
                                          • Instruction Fuzzy Hash: 511126B2D002499FCB10DFAAC845ADFBFF5EB88324F248419E519A7250C775A554CBA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: c41cb95cc53cc162600ca692dcb77ab2e2f58363eca64fc8f454a4f00eb79806
                                          • Instruction ID: ee4b3c5d21bd52cd8ed3addd8254f1ef42ccd186cb434fbd61e1af68be566b34
                                          • Opcode Fuzzy Hash: c41cb95cc53cc162600ca692dcb77ab2e2f58363eca64fc8f454a4f00eb79806
                                          • Instruction Fuzzy Hash: A21128B1D003498BCB20DFAAC44979EFFF8AB88324F248419D519A7240CB75A545CB91
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 054EAFBE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2133367816.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_54e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e87ba5b1803993ceb846cee068361d0bcd6bbbbd7a3f4f8ee523aac0a2359e64
                                          • Instruction ID: 3bff8cc19ef7740b000d8b7b0aff8c0af819f8938b8191cd3a1fc608b6420293
                                          • Opcode Fuzzy Hash: e87ba5b1803993ceb846cee068361d0bcd6bbbbd7a3f4f8ee523aac0a2359e64
                                          • Instruction Fuzzy Hash: 681110B5C003498FCB10CF9AD448BDEFBF4EB88314F11845AD419A7600C379A545CFA1
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 07813E9D
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138559689.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7810000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: c9d64d0371bf810828a0431fbfa7c96a6199a3456a957c8db66d7f0f9b80d06f
                                          • Instruction ID: dc31bbce743b30fe35bfe3995ae22f95f31632a82ce95257f6ffefe96ca37e61
                                          • Opcode Fuzzy Hash: c9d64d0371bf810828a0431fbfa7c96a6199a3456a957c8db66d7f0f9b80d06f
                                          • Instruction Fuzzy Hash: 9B11D3B5C003499FDB10DF9AD549BDEBBF8EB48310F108459D919A7640C375A544CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: 7a9ad9f208e0166dacfb388bf85d553d699f0101572ba2025c07215e3e2a9ee7
                                          • Instruction ID: f1fb863a4d872c8cd9f2919bfb2301679df2e13c6ee8805b96a02bdc52edfdf2
                                          • Opcode Fuzzy Hash: 7a9ad9f208e0166dacfb388bf85d553d699f0101572ba2025c07215e3e2a9ee7
                                          • Instruction Fuzzy Hash: 1D91D5B4E046199FCF54CFA9D8806ADBBF2FB89310F14856AD819EB341DB399942DF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 55b1f7e6236fb98f99e9b8226f7419e9cdde158e4ad66dd97f05f4175456807d
                                          • Instruction ID: f08e21055a76e8db1c749d62f42de3c85b337456a79407a457e093d69c2959e5
                                          • Opcode Fuzzy Hash: 55b1f7e6236fb98f99e9b8226f7419e9cdde158e4ad66dd97f05f4175456807d
                                          • Instruction Fuzzy Hash: CA51D471B0461A8FCB15DF7998544BFBBF7EFC5220714896AE416CB391DB309D068B90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8gq
                                          • API String ID: 0-1984363304
                                          • Opcode ID: cc5b8895efa0992711066eb7e6c61f0dd29dc259e309f2f814ac4192264ad38c
                                          • Instruction ID: 75ce771e42f8f69f8ba5c435277ab93ff434b0ff11d598836b58275194d2e5b3
                                          • Opcode Fuzzy Hash: cc5b8895efa0992711066eb7e6c61f0dd29dc259e309f2f814ac4192264ad38c
                                          • Instruction Fuzzy Hash: 0241E4B4E015199FCF44DFA8D980AAEBBB2FB89300F10846AE816B7340DB359D42DF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8gq
                                          • API String ID: 0-1984363304
                                          • Opcode ID: f02da9f1652468637ad878f285a8c7e857597b6511f4de2be13cdd90e18a38f2
                                          • Instruction ID: 837bcfbd9db953209521b799b8ab42cbcfff49d124633943b59954631e82c8cd
                                          • Opcode Fuzzy Hash: f02da9f1652468637ad878f285a8c7e857597b6511f4de2be13cdd90e18a38f2
                                          • Instruction Fuzzy Hash: 94412775E011599FCF45DFA8D890AEEBBB2FB89200F10846AE816BB350DB359D46CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 9fc9a48d5c22044e09d0383df1d1fbea0df8397e4c99c80cfc1a71de21e58ecb
                                          • Instruction ID: 6cde5a946fb18f707641c3ee6cf1c7090178c533ded34b2d75b6f1773afa9a40
                                          • Opcode Fuzzy Hash: 9fc9a48d5c22044e09d0383df1d1fbea0df8397e4c99c80cfc1a71de21e58ecb
                                          • Instruction Fuzzy Hash: B23102B4E14219CFCB44CFE9C5809EDBBB6FB89301F20902AE90AAB255C7706946DF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: cd343453375e2e73b6560217fda902eecd2f8d311771e4ca7cf832ca64355fd0
                                          • Instruction ID: 246332300f122c1f436c92185b8cae81eeeee0228c3cb21361f75e9b670ac4dd
                                          • Opcode Fuzzy Hash: cd343453375e2e73b6560217fda902eecd2f8d311771e4ca7cf832ca64355fd0
                                          • Instruction Fuzzy Hash: 8E31D2B4E11619CFCB44CFE9C8849ADFBB2FB89311F208429E90AAB254C7719946DF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 5d6a4f54769375b9705c174667962e5b6eeecb617022957b0cc8dfef97228497
                                          • Instruction ID: cf3aadef607d16c8cad9ab0fc56df7d5a1b4040cf2142821c46d2a4c7263d659
                                          • Opcode Fuzzy Hash: 5d6a4f54769375b9705c174667962e5b6eeecb617022957b0cc8dfef97228497
                                          • Instruction Fuzzy Hash: 2B3118B4E146588BDB04CFE6C8546EEBBB6AF89300F14C02AD819AB359DB701906CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 05c653d786aa5317ee115ff327bf085d8a12dcafe7b8c80478dd5a5c2a8b5257
                                          • Instruction ID: f0b9e6752c022173457fa3324268940033f56469fd1d52271aae5e9b84a7db01
                                          • Opcode Fuzzy Hash: 05c653d786aa5317ee115ff327bf085d8a12dcafe7b8c80478dd5a5c2a8b5257
                                          • Instruction Fuzzy Hash: 9121F7B4E146588BDB04CFEAC8546EEFBB6BF89300F10C02AD819AB358DB705806CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tecq
                                          • API String ID: 0-1122318316
                                          • Opcode ID: 2ee41d8d9e85e1a24cf49f5b37eb9432f2f1d50147da9105088b650a14962d02
                                          • Instruction ID: b213797d30bff60e20c01ad0d1f2476fb6cfd52ea5e87e896292b90d7ad81083
                                          • Opcode Fuzzy Hash: 2ee41d8d9e85e1a24cf49f5b37eb9432f2f1d50147da9105088b650a14962d02
                                          • Instruction Fuzzy Hash: 3B114CB1B0061A8BDB54EFB998005EFB6B6AB88311B204079C506F7354EF318E139BA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: G
                                          • API String ID: 0-985283518
                                          • Opcode ID: 60e9bb322e6555f9b0a8d77a7a3ac59069cccf265f07cabd462b5d1630bcb713
                                          • Instruction ID: 09e598becfddeaa29d1bc2d2a8bb0d8cb3ef3a2dee62d3add2f6c2afd293e4ca
                                          • Opcode Fuzzy Hash: 60e9bb322e6555f9b0a8d77a7a3ac59069cccf265f07cabd462b5d1630bcb713
                                          • Instruction Fuzzy Hash: D7018FB9A0421ADFCF11DFA4E8417DDBB70EB85215F2045AAD909BB380C7395D1ACB45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: m
                                          • API String ID: 0-3775001192
                                          • Opcode ID: cab1ca30cb0ca070849eee837b301d2dca9dff2568f531c318f3b7cefba69de6
                                          • Instruction ID: dfa8cb39991b87ef7e708daebd619d02fa0f2a9656c310c91e9eba9c6b280661
                                          • Opcode Fuzzy Hash: cab1ca30cb0ca070849eee837b301d2dca9dff2568f531c318f3b7cefba69de6
                                          • Instruction Fuzzy Hash: D6E0C2B0D05219DBCB44EFB4D405BAD7FB89B01300F400199C44657340DB300A4AEEA2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 6
                                          • API String ID: 0-498629140
                                          • Opcode ID: 23cd38102730dcc967ddeda54f2d827854d9740cfcd1212bfc15edd1c2b1deb9
                                          • Instruction ID: 91bf415e9c98fa5b1ca54ef5ec851e13ae9c4b5b37e8799c046508d3dcdfbfdf
                                          • Opcode Fuzzy Hash: 23cd38102730dcc967ddeda54f2d827854d9740cfcd1212bfc15edd1c2b1deb9
                                          • Instruction Fuzzy Hash: 14E0C2B0808218EBCF10EFB5D5092ADBFB8AB09201F108596D40693340EF354B43EB41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 7
                                          • API String ID: 0-1790921346
                                          • Opcode ID: eb51f511de1b137a6c23a2e432425e501b55423c62c7e809f7c759cc1b5d3d53
                                          • Instruction ID: 607f47a3af418a6e4e61aca070e532b618bc48da61d287d32a06bdbea9985481
                                          • Opcode Fuzzy Hash: eb51f511de1b137a6c23a2e432425e501b55423c62c7e809f7c759cc1b5d3d53
                                          • Instruction Fuzzy Hash: B8E08CB0805169DBCB50EBB4A4056AD7EB8AB01200F400199C40753340DB340E86EA52
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f27c652faa242a61d7e8bf3c2ed920ddb09ccce8d269268956a505d7d032075d
                                          • Instruction ID: ddfb41c56ba0ba3c95de46b56237580246893a8b0068d89bb1ac4f29d7e8c0be
                                          • Opcode Fuzzy Hash: f27c652faa242a61d7e8bf3c2ed920ddb09ccce8d269268956a505d7d032075d
                                          • Instruction Fuzzy Hash: 9DA142F0E1521ADBCB40DFA8D880ADDBBB6FF89300F108615E419AB355DB346946CF50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc6331030fcd743056a841cb62f373433b8bf7a8a47d2e0d1f5a5fe216fab3d6
                                          • Instruction ID: f72fa6d4c018b49daf793c4f7ac7fd9ebbc89ef7a72e6e592c8f2c47def333dc
                                          • Opcode Fuzzy Hash: fc6331030fcd743056a841cb62f373433b8bf7a8a47d2e0d1f5a5fe216fab3d6
                                          • Instruction Fuzzy Hash: 5C912EF0E1521ADBCB44DFA8D890ADDBBB6FF89300F208619E419AB355EB745846CF50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c271359a829688de41691d78695bb3ce5d58ea44e61db85501d6bd840822c8b5
                                          • Instruction ID: d65e521ec984ca6b9b746723ac1dc665a59264948682c47d11630dfc37bffee6
                                          • Opcode Fuzzy Hash: c271359a829688de41691d78695bb3ce5d58ea44e61db85501d6bd840822c8b5
                                          • Instruction Fuzzy Hash: 9FA106B4A18628CFCB60DF64C584AEDBBB5FF49310F519495E81AAB351DB30AD82DF10
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae15b1e1dd9aa35a28a6820576573574d3506603071e500a6b68e8c6190c7c75
                                          • Instruction ID: 6b4ceb231018744b5f8a002e924292644910d6c43e27a6350e4626d78eb88709
                                          • Opcode Fuzzy Hash: ae15b1e1dd9aa35a28a6820576573574d3506603071e500a6b68e8c6190c7c75
                                          • Instruction Fuzzy Hash: 0B81B5B5E046299FCF51CFA8C880AADBBB2FF49304F1084A9D819EB701D7359946DF40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87dfb7050fadea4d1a8abb2f9fc14714fe93157791dd9180e86d1016bc9eeaac
                                          • Instruction ID: 64896100ae1292680ac604ec39e2aa3a73f14ca8caaff81329983f11c6012ba5
                                          • Opcode Fuzzy Hash: 87dfb7050fadea4d1a8abb2f9fc14714fe93157791dd9180e86d1016bc9eeaac
                                          • Instruction Fuzzy Hash: FF41E8B4E0051A9FCB44DFA8C880AAEBBB2EB89310F14846AD816F7350DB359942CF55
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f915793ac6252b16a047ea9a4e19fcc701662dbbdb207a1c4ef842aa3f7db0a5
                                          • Instruction ID: c8d9fa5536639cf887dd50d8cebad8e3bb2baf05b6689f190d24d99794866b8d
                                          • Opcode Fuzzy Hash: f915793ac6252b16a047ea9a4e19fcc701662dbbdb207a1c4ef842aa3f7db0a5
                                          • Instruction Fuzzy Hash: 5441F5B4E1061A8FCB45DFBAD9595AEBFF1AF49201F108465E902E3350EB34D942CF60
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bea9bf2a6af679a8699fdc3c2605bae64fbcc26cbc7ba6e2f319d6b4ec1b634
                                          • Instruction ID: ceed85d5869390dae525c5b4ee874de094b1a1fc23a9f688519977135c36009c
                                          • Opcode Fuzzy Hash: 4bea9bf2a6af679a8699fdc3c2605bae64fbcc26cbc7ba6e2f319d6b4ec1b634
                                          • Instruction Fuzzy Hash: AE412CB4E0061A9FCB84DFA8C84069EBBB2EB89210F14C56AD816F7351DB359D42CF55
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26d638feb24f0e422bb8c7db64d1f100994ccc49ad5ead01d97652e284cf5716
                                          • Instruction ID: d236fe982349ecb85a95bc8750d0f9992a854872adc9ce4ea76ff090a307534b
                                          • Opcode Fuzzy Hash: 26d638feb24f0e422bb8c7db64d1f100994ccc49ad5ead01d97652e284cf5716
                                          • Instruction Fuzzy Hash: C13158B29007264BC711EB3D9C512ABBFF6EFD1350B140869D85BCB302EA30A50AC796
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b8c353b2191dcf96089dc28fd7537c2d97bdd97d297f51ab296d0eace05f59bc
                                          • Instruction ID: f189cfed1e3ddf275e7a0aa3d54c042bf78a937a464f2ce81130322941ed7cef
                                          • Opcode Fuzzy Hash: b8c353b2191dcf96089dc28fd7537c2d97bdd97d297f51ab296d0eace05f59bc
                                          • Instruction Fuzzy Hash: 79317AB1E002599FCB10CFA9D848ADEBFF5EF49320F14846AE905E7210C7359945DFA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef2a2ff1028ad7938dfeef5bb71fab13661ead8ed62ec084f2b0ed9a19bad6ea
                                          • Instruction ID: 5851ee85f35e0b2c809cf2544e39da14fbe7370543ad2cd185a9a2bae810d778
                                          • Opcode Fuzzy Hash: ef2a2ff1028ad7938dfeef5bb71fab13661ead8ed62ec084f2b0ed9a19bad6ea
                                          • Instruction Fuzzy Hash: CE4108B4A14629CFCB54CF64C580AEDBBB6FB09310F609595E80EA7355D730AE82DF20
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a40940ec16cd70b5cb0b319bc6c761edf1dc6cf7d8b8a3d4115fb05711288cac
                                          • Instruction ID: 760e5d2a690b5360a1bff0195d4dca110fb3bd35b4a52fe3e438217edf1d0733
                                          • Opcode Fuzzy Hash: a40940ec16cd70b5cb0b319bc6c761edf1dc6cf7d8b8a3d4115fb05711288cac
                                          • Instruction Fuzzy Hash: 3631E5B4A18628CFCB54CB64C580AEDBBB6FB4E310F505594D40AB7355D731AE82DF50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1b0826352a1435d90561e6e0ab5cb4b2065a26bc5f6f8fe694e3c1a80c60f60
                                          • Instruction ID: cf2e5c9953a79e7fd8560265745b46e3c4555edb492c73fa56f3656cb2fb5bba
                                          • Opcode Fuzzy Hash: e1b0826352a1435d90561e6e0ab5cb4b2065a26bc5f6f8fe694e3c1a80c60f60
                                          • Instruction Fuzzy Hash: 6A3137B4D0069A8FCB41CFB8D5456EEBFF0EB49210F1485AAD851E7340EB348A42DF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 227f898d654ad6793a17557f80a9942affad038a42a2ddaf4af79e0aeb02e1df
                                          • Instruction ID: 50d917caf721b5c8e64b0d19433276b7120aa927b51d09b9559362b536baec69
                                          • Opcode Fuzzy Hash: 227f898d654ad6793a17557f80a9942affad038a42a2ddaf4af79e0aeb02e1df
                                          • Instruction Fuzzy Hash: 98317CF0D1592ADBCB80DFA9C4505BEFBB9BF49300F589159D40AA3201D7309A43EFA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0084bb75333e9b1a84c99cc8581c2888f2051c3ee7a4d52563e4069e97a3c13e
                                          • Instruction ID: 6bf0fe6682507ff2e4110e7657b52abfbc14a8c527aa390ff42cf892dd0737bc
                                          • Opcode Fuzzy Hash: 0084bb75333e9b1a84c99cc8581c2888f2051c3ee7a4d52563e4069e97a3c13e
                                          • Instruction Fuzzy Hash: CA3107B4A18628CFCB54CB54C580AEDB7B6FB4A311F505594D40AB7351D730AE82DF20
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 767fa12d929c73ff544e4b8d9cedfca648a843dcc396143739f7d167d4056d98
                                          • Instruction ID: 1ef3ef78e6faf08eb8c871b4ce803dd02f6ccea0f98e6b6863d46398be4b2dd0
                                          • Opcode Fuzzy Hash: 767fa12d929c73ff544e4b8d9cedfca648a843dcc396143739f7d167d4056d98
                                          • Instruction Fuzzy Hash: BF2129B6A007624FC712EF7C98501FF7FB2EFC5261B15496AD459CB341DA308A0ACBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8bd57c161904d7f9f3da6878c79678021eb1b43ee9f4dfd3f8b1b7fdae49fae5
                                          • Instruction ID: 83cbfdf6404965d9c550c7e33548673aee53bcd0f0ca4e2862b096f4392885e6
                                          • Opcode Fuzzy Hash: 8bd57c161904d7f9f3da6878c79678021eb1b43ee9f4dfd3f8b1b7fdae49fae5
                                          • Instruction Fuzzy Hash: F321A1B1504244DFDB06DF98D9C4B2ABF65FBC8324F64C569EE090A256C336D416CBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42e3c21bfe8eb6df238ea0cd0f8689ad15dcf1fe1417c113c9b8b955cbee2c99
                                          • Instruction ID: b8242d55714c120a14a8b5920ae9e015b8f45b44cc790249d6dcb188fc47d44c
                                          • Opcode Fuzzy Hash: 42e3c21bfe8eb6df238ea0cd0f8689ad15dcf1fe1417c113c9b8b955cbee2c99
                                          • Instruction Fuzzy Hash: 2F2121B1504200EFDB01DF98D9C0B6ABFA5FBC8324F64C569E90A0B247C336E416CAA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44795dba516c5df4eba946341575f4ec86ba79e2cda5746faf90e9d6321d1940
                                          • Instruction ID: 3cafc583f76ba8a2d09fb170dd325ad87be5a1c179daac828b940165eb030905
                                          • Opcode Fuzzy Hash: 44795dba516c5df4eba946341575f4ec86ba79e2cda5746faf90e9d6321d1940
                                          • Instruction Fuzzy Hash: 74316FB4E1065ADFCB40DFB9D5856EEBBF4AB88200F14846AE815F3340EB349A41DF61
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130814655.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_164d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc6b84c28c1a524b449dc2aa9c6a20fe7203820c4023c5869f0ca7b36b3e6526
                                          • Instruction ID: d372681cd47550b887de4580d78f7865d789b79e03e50d4fcc9eafbe377fea81
                                          • Opcode Fuzzy Hash: bc6b84c28c1a524b449dc2aa9c6a20fe7203820c4023c5869f0ca7b36b3e6526
                                          • Instruction Fuzzy Hash: 092126B1A04200EFDB05DF98DDC0B26BBA5FB94324F24C66DEA0A4B356C336D406CA61
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130814655.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_164d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9fd40d28aea37ddb820d3e46bf31df51a5b4d9cfc08183d87a13e73a865c2f71
                                          • Instruction ID: 0d80f2ffb4527e87b81bfa12f3b3f8f972286c99b3744a5d0e5f98a88fa2ec7a
                                          • Opcode Fuzzy Hash: 9fd40d28aea37ddb820d3e46bf31df51a5b4d9cfc08183d87a13e73a865c2f71
                                          • Instruction Fuzzy Hash: B42134B1A04200DFDB15DF98D9C4B26BFA5FB94B14F24C56DD80A0B386C33AD407CA61
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5394224866fd95e5edb1419881a81d8a0624f9096c1ca31ad368d1cdc2db7b53
                                          • Instruction ID: eedc848ac22700f5e8b0081ac3a21a9617fdd95507f92356bbd103009473abdd
                                          • Opcode Fuzzy Hash: 5394224866fd95e5edb1419881a81d8a0624f9096c1ca31ad368d1cdc2db7b53
                                          • Instruction Fuzzy Hash: 712149B0A18628CFCB54CB64C5809EDB7B6FB4A311F605594D40BA7251DB31AD83DF20
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 68b66ca469829e81757c13adf5f177dd5db9e833f9f4e9b18e944555e0563eb4
                                          • Instruction ID: 9452d3f0dcc3a309e60cb19ff86c69b873bd0690f68065ab52c5dcc83d1db2b7
                                          • Opcode Fuzzy Hash: 68b66ca469829e81757c13adf5f177dd5db9e833f9f4e9b18e944555e0563eb4
                                          • Instruction Fuzzy Hash: B02192F0E1522A8BCB40DBA4C9116FEBBB5FF89300F208565D419BB341EA746D46CBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 200033d6ac3f91b33bd81c21cf509f58dac2224c19978752e1be416ee8e72365
                                          • Instruction ID: 52955bda4977c10eea2c360bb7976f6531c5f23d270526e0fb0674f2618b08ad
                                          • Opcode Fuzzy Hash: 200033d6ac3f91b33bd81c21cf509f58dac2224c19978752e1be416ee8e72365
                                          • Instruction Fuzzy Hash: 7A31C0B5C012589FDB20CFA9D589BCEBFF4AB08314F24885AE416BB241C7B55886CF95
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9fa48b5af4c01483e772654b8221d81fe4ebc4cfd927d993b394d2b43053e33b
                                          • Instruction ID: b7840f12cf0fbd442b08844113583b1ad33dd18be98ecbd462b343082d2c5110
                                          • Opcode Fuzzy Hash: 9fa48b5af4c01483e772654b8221d81fe4ebc4cfd927d993b394d2b43053e33b
                                          • Instruction Fuzzy Hash: 7711D3F1A1D659DFCB41DBA8D8001FD7FB4EB46320F148196C859E7752D6301A07DB81
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: deb53781d17f4e48f9c9db392f159b0e31eabd02db8280a0e94eaae303fd46f0
                                          • Instruction ID: 92893ad9d18bcac19285dd3f3a0fbecee387212de2a3d3a44419cac488e00f70
                                          • Opcode Fuzzy Hash: deb53781d17f4e48f9c9db392f159b0e31eabd02db8280a0e94eaae303fd46f0
                                          • Instruction Fuzzy Hash: 5F11B275A0D3C89FDB06CBB49D654AD3FB5DF4221072448EBE806CB243EA358D0AD761
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92f36ec0335cbe72ab035b388af805ad3cecd3eabf48d4e68808af14af073ea8
                                          • Instruction ID: 482fdc5e0d1259f52ceaad63821e88d7b4ccc3f5185f3d5815acff22b92eeacd
                                          • Opcode Fuzzy Hash: 92f36ec0335cbe72ab035b388af805ad3cecd3eabf48d4e68808af14af073ea8
                                          • Instruction Fuzzy Hash: 2A3100B0D00318DFDB20CF9AC588B9EBFF4AB08310F24845AE416BB241C3B55846CF95
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 992eae7decef5e94440e536e4a90fe367d4fc8dc1600e1d3abcbc646d8984412
                                          • Instruction ID: df4de2bc4f71c34e9c18dc251b6b275584eccecc9d65cd3a5b1d22fd2cd8ab6e
                                          • Opcode Fuzzy Hash: 992eae7decef5e94440e536e4a90fe367d4fc8dc1600e1d3abcbc646d8984412
                                          • Instruction Fuzzy Hash: 92215EB0E1522A8BCB40DBA8C5416FEBBB5FF89300F208625D41977340EB746D46CBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38defdaf9c121146c6db12d4838a981be1cd4c472389a8c41e55ea9b3ce93d1b
                                          • Instruction ID: c57a6fdac23324fa02d95294d0a16802fe690c1e2d0e2781c0baed684922bc5a
                                          • Opcode Fuzzy Hash: 38defdaf9c121146c6db12d4838a981be1cd4c472389a8c41e55ea9b3ce93d1b
                                          • Instruction Fuzzy Hash: F31194B0B14526CBCB949A7998106BF7AB2FB84750F049539E80787781EA3489429FD1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c531ce8dabeeb65dac767cbba546f0f56ec2ead30d08d1eea48b2732b65c76e6
                                          • Instruction ID: af7c998aec71a1710d4be96e84cb627cfa00954f4c115ecdcc0fd718a0f41fd2
                                          • Opcode Fuzzy Hash: c531ce8dabeeb65dac767cbba546f0f56ec2ead30d08d1eea48b2732b65c76e6
                                          • Instruction Fuzzy Hash: 242129B1D056588FEB19CFA7D9553DEBFF2AF89310F04C06AD409B6264EB7409468F90
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 137f5766051e4324e45f0217ede9c43a14289fab1ea42f994ba2cff73d56ee7c
                                          • Instruction ID: 5b0f18c058ccdffe1626a2472cd1292749aee8496ceaaa2f2592954937cbe941
                                          • Opcode Fuzzy Hash: 137f5766051e4324e45f0217ede9c43a14289fab1ea42f994ba2cff73d56ee7c
                                          • Instruction Fuzzy Hash: E9219D76504240DFDB06CF54D9C4B16BF72FB84324F24C5A9DD490A656C33AD42ACBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 30f762a5abdc6c13a704f2a6d9faecdfbea2bbffa3af98368d4e14f6341c980e
                                          • Instruction ID: 0fc8c78044a6125f5c088b2e5b1171cb03fc845b1a25e4c8fe4457d5ae0d0ea2
                                          • Opcode Fuzzy Hash: 30f762a5abdc6c13a704f2a6d9faecdfbea2bbffa3af98368d4e14f6341c980e
                                          • Instruction Fuzzy Hash: F12100B5D003499FCB10CF9AD888ADEBFF4FB49310F14842AE919A7210C374AA55CFA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                          • Instruction ID: ae9feeb2431fe1624005dbe3f3812d0151e84ecb072860802b65a45da1c9ee61
                                          • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                          • Instruction Fuzzy Hash: D911DC72404280DFDB02CF54D9C4B5ABF72FB84324F24C2A9D9490B657C33AE45ACBA2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130814655.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_164d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction ID: 192035b8378ed87f2d771dd9222e8213198b8363e9b8e4dd3922aa2a1cbe0497
                                          • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction Fuzzy Hash: BB11BB75904280CFDB16CF58D9C4B15BBA2FB84714F24C6AAD8494B796C33AD40ACBA2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130814655.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_164d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction ID: d6b20e46ad696ad2fd0227c8568aab9dc523b8ec4498f42a0550ba43b45b7024
                                          • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                          • Instruction Fuzzy Hash: 2711BB75904280DFDB02CF54D9C4B16BBA1FB84224F24C6A9D9494B796C33AD40ACB61
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92f33266cefb42d11e06636b9e5472b4135e00714da856b422f84a6fe7e35df7
                                          • Instruction ID: d15fc3f7bce174395be7d8de94ece4c56f2142c1157519f6bb96ec27a63625d4
                                          • Opcode Fuzzy Hash: 92f33266cefb42d11e06636b9e5472b4135e00714da856b422f84a6fe7e35df7
                                          • Instruction Fuzzy Hash: F001B1B6E092598FCB02CFB4D9419AEBBB1EB06210F248497D815D7311D7308A02DF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: deaadfcfc0f9582588ec80979fa4c286fd254f77ce37a69d0f63f2b89ace15b4
                                          • Instruction ID: e3261290b57b3a045388214ca0139a08955f5c3daa9b78afc5bb3529a5b36e3a
                                          • Opcode Fuzzy Hash: deaadfcfc0f9582588ec80979fa4c286fd254f77ce37a69d0f63f2b89ace15b4
                                          • Instruction Fuzzy Hash: 6E11E8B5E15618DFDB48CF6AD5449AEBBF7AF8A300F10D069E409A7710DB309902DF90
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd91aadae229064e64650117c76fff596127b739d98e230be069fc9042af785a
                                          • Instruction ID: 9e8290683168573eceec96ee3e28f6f0e7b5e5c79f1b808d8ebe0b9ea7286b79
                                          • Opcode Fuzzy Hash: cd91aadae229064e64650117c76fff596127b739d98e230be069fc9042af785a
                                          • Instruction Fuzzy Hash: 3E11E3B1D006189BEB18CFABC9453DEBFF6AFC8300F04C06AD50976254EB7509468F90
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2a21ec3bf398b8c011e314a26f7f3a1a5450f6299a37d6fc323e345414f6d19
                                          • Instruction ID: 76ee3672468498b58b28df552dba4b75a8cd5dcd58bc761f336181684c7e6ca3
                                          • Opcode Fuzzy Hash: b2a21ec3bf398b8c011e314a26f7f3a1a5450f6299a37d6fc323e345414f6d19
                                          • Instruction Fuzzy Hash: 8B0126710043809AE7128BAADCC4B77FFF8DF81320F58C81AED080A386C3789841C6B1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2004297cb3023ddfcce746e0ef0785dd0117a46b63495455a98b7c2a5722d2f7
                                          • Instruction ID: 02ed5b08d58577f433227f5e0eb5aab88376c089efdbcb3b709975cc691d1a3d
                                          • Opcode Fuzzy Hash: 2004297cb3023ddfcce746e0ef0785dd0117a46b63495455a98b7c2a5722d2f7
                                          • Instruction Fuzzy Hash: 5401D7B4A18624CFC758CB54C590AEC7BB6FB4E311F545498E40EA7252DB31AD83DF10
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dda6b90993d0d66a2c2575543fd5e95c625411994579cb402c5f6b5bde44d5c0
                                          • Instruction ID: f87bebe4786c04dbbf6311b90871b93636cf5e7b12fefcea19e1ca03a6da5840
                                          • Opcode Fuzzy Hash: dda6b90993d0d66a2c2575543fd5e95c625411994579cb402c5f6b5bde44d5c0
                                          • Instruction Fuzzy Hash: CE014F74A18518DFCB84DFA9C644AADBFF5FB49300F14C49494099B351DB309E02EF50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 76cf741a19916b44aeba69a7deb510f4223af01620d451101fe5a135f4c8b9bf
                                          • Instruction ID: ce8a29baefb1fad38f081b9af97b05ac9c1945fcbefd957688e22d1675f09f90
                                          • Opcode Fuzzy Hash: 76cf741a19916b44aeba69a7deb510f4223af01620d451101fe5a135f4c8b9bf
                                          • Instruction Fuzzy Hash: EB01ECB4E0561ADFCB40DFA8C9406AEBBF5FB49300F1085AA9819E3341EB359A06DF51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1936bdb3d9bf2f259780ce4a364b3498d3df4581b99e79b6087590c14017bcc8
                                          • Instruction ID: 18f8ace08822964579d94e7197aa93c7db61cc0ed0582fc3496976d2a08d6961
                                          • Opcode Fuzzy Hash: 1936bdb3d9bf2f259780ce4a364b3498d3df4581b99e79b6087590c14017bcc8
                                          • Instruction Fuzzy Hash: 9D0108B4E053599FCB41DFB9D5052EEBFF1EB49210F1084AAD845E3751EB308A05DB51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7a27ffec781be79a10fe4b53d1ada54174e62328daebbb5c416cc12e4cf8d52
                                          • Instruction ID: 03043276962fd1fed81639e39e54eb68c043b15023d887df3dcc08a75a047dc2
                                          • Opcode Fuzzy Hash: f7a27ffec781be79a10fe4b53d1ada54174e62328daebbb5c416cc12e4cf8d52
                                          • Instruction Fuzzy Hash: 11F0C2B5D0821ADFCB01CFB4D5015ADBFF4AB06321F2485A7E454E7341DB304602DB50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: adaf339ea16fcc24f60631ff71e89717e512cf84997764c7611427a280d86e90
                                          • Instruction ID: 259653ccaa2602edd5645297f087dd72a8d16839dcd43f339f974dca09785946
                                          • Opcode Fuzzy Hash: adaf339ea16fcc24f60631ff71e89717e512cf84997764c7611427a280d86e90
                                          • Instruction Fuzzy Hash: A0F0A4B091C518DBC784CF6AD5419BCBBB9AB5A340F10D595A40A57611D7704E03FF60
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0662333a8551284cb26282ee910672508e1add042e911295b1cdfe4aeea88255
                                          • Instruction ID: 003b20eb00891ea6f52cfe9b2e943825131e71938af2ff5bf2673514736595cd
                                          • Opcode Fuzzy Hash: 0662333a8551284cb26282ee910672508e1add042e911295b1cdfe4aeea88255
                                          • Instruction Fuzzy Hash: 5B018FB4E0565A9FCB41DFA8C94069EBBB1EB45310F2481AE8814B7381EB358A06CB42
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 240bb64f1192d211311a10bc7f9f0ceba0eabcfcaad13e3a0dd7c6764a6b1a80
                                          • Instruction ID: 6fe51ac70a7a9760561da000263ce990978219dc2493c33b9724ca30a14c5239
                                          • Opcode Fuzzy Hash: 240bb64f1192d211311a10bc7f9f0ceba0eabcfcaad13e3a0dd7c6764a6b1a80
                                          • Instruction Fuzzy Hash: D2012CB0A14624CFC754CF14C584A9C7BBAFB4A311F545494E40FAB225DB31AD83DF10
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b33df6b67a1bc2f73d51c42e63e7ccc4f7d7fd844bd3032495fc8c360d08c4c1
                                          • Instruction ID: f5d2ab392b16b6052044bf0cf2a69ffb87940fcb7f6eb9299a40f7f7350f1059
                                          • Opcode Fuzzy Hash: b33df6b67a1bc2f73d51c42e63e7ccc4f7d7fd844bd3032495fc8c360d08c4c1
                                          • Instruction Fuzzy Hash: 0C01FBB4E14219DFCB54EFB8C5052AEBBF4EB08300F1084AA9805E3750EB308A02DF51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab7fd2cf151437fa7e3009f4ac5bad1e85fcc08425797f9ffff91984f0174924
                                          • Instruction ID: e3730c3dd4c9bfc1df662c2fff1bc72907630f284455ed69ee525ddd7efe4993
                                          • Opcode Fuzzy Hash: ab7fd2cf151437fa7e3009f4ac5bad1e85fcc08425797f9ffff91984f0174924
                                          • Instruction Fuzzy Hash: 31F0E973A08554EFEB45CFA4EC419DE7FB5DF0513071485AFE006DB221D2319D518B54
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2130705056.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_163d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b5ede4c91f3eaa84e733daa9ccb0f77ed775f0599547bd42c7a47d6d9dac0781
                                          • Instruction ID: 3f323dc4c01b46fa6aa6542d641f307af7cfd11654a4d376d7efaac6155a79ff
                                          • Opcode Fuzzy Hash: b5ede4c91f3eaa84e733daa9ccb0f77ed775f0599547bd42c7a47d6d9dac0781
                                          • Instruction Fuzzy Hash: A4F062714053849EE7118A1ADD84B62FFA8EF91624F18C45AED085B396C379A844CAB1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cb610949e29895185e2d874bd170f0c418ba9ba4a3996146772fea5451773515
                                          • Instruction ID: 817c03f4b6c51f505389a204c5a45b2801c2eea3337eba22e5c41dc6c20e4c96
                                          • Opcode Fuzzy Hash: cb610949e29895185e2d874bd170f0c418ba9ba4a3996146772fea5451773515
                                          • Instruction Fuzzy Hash: 6DF0B4B48082569FCB11CFB8D9051DDBFB0EF06224F1486E7E855E7352C7344646DB41
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d9f713d4e1ff32b62a7a7b81a78a1475732b65b6ffdfb639cdc44a80eb8e5e5a
                                          • Instruction ID: b4d6b0e612ac9c521a4e7e44cf244d9770cafedf01a5ac8d405208143f5fcffa
                                          • Opcode Fuzzy Hash: d9f713d4e1ff32b62a7a7b81a78a1475732b65b6ffdfb639cdc44a80eb8e5e5a
                                          • Instruction Fuzzy Hash: 3AF03CB4E052199FCB40DFB9C5406AEBBF4EB45300F0085AAC855E3340DB75DA02CF40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e36d137a202e4fa79b36cd547cf3e8cf289d6a56b89e32d9de4e40cff35e567
                                          • Instruction ID: f826ba348de1590e37b62e742fa2b816fa57a675e310c0391cf8c84cc9077d86
                                          • Opcode Fuzzy Hash: 2e36d137a202e4fa79b36cd547cf3e8cf289d6a56b89e32d9de4e40cff35e567
                                          • Instruction Fuzzy Hash: 4EF0A9B4D0925ADFCB05CFA8C9411ADBFB0FB46311F1481AAD854A3351DB348A0BDB00
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5c5c541d8d8b18986e967cf054406a653ed2d1a744b32a0e871cb7d781085354
                                          • Instruction ID: 324f4df01613e160dad689e4cbbbd98a58b1cf9496b8ade849ed041d7039ad45
                                          • Opcode Fuzzy Hash: 5c5c541d8d8b18986e967cf054406a653ed2d1a744b32a0e871cb7d781085354
                                          • Instruction Fuzzy Hash: 14F0C4B4D0521ADBCB44DFA9D5416AEBFF4BB48300F1095AA9819A3300EB309A06DF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 255a88891f04fe42703f0f270daf41fba468645ee5d1c05e777545b7eba5bf2d
                                          • Instruction ID: 6ce44071bd24df937febb4360e2a020739a342a097d609a33c8d7c9146e9c58c
                                          • Opcode Fuzzy Hash: 255a88891f04fe42703f0f270daf41fba468645ee5d1c05e777545b7eba5bf2d
                                          • Instruction Fuzzy Hash: 4EF01DB4D0821ADFCB40DFB9C505AAEBBF4BF48300F1485AA9819E3300EB309A02DF51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f0c52215015fea7186c72c1404408e3d2454a3d5a02b34ad8ac36093c1196285
                                          • Instruction ID: d9086a442afbac8e67646aa411aee8ce1b05152aa7eceb434da84307ec19854f
                                          • Opcode Fuzzy Hash: f0c52215015fea7186c72c1404408e3d2454a3d5a02b34ad8ac36093c1196285
                                          • Instruction Fuzzy Hash: DAF0F0B48082999FCB12CFB8C54519CBFF0EF02210F0489DBD854EB7A2C7340542DB01
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e60ed9a2234158833e71501991dabb5a5f2baa9637dda220406deadab4123601
                                          • Instruction ID: 01b79df77a6cfa39ecb9e443b35ce2ae2c65c0c72e22b8fa52f1acf305d19572
                                          • Opcode Fuzzy Hash: e60ed9a2234158833e71501991dabb5a5f2baa9637dda220406deadab4123601
                                          • Instruction Fuzzy Hash: B1F0B7B4D1461ADFCB40DFB9D9456ADBBF4EB09300F0099AAD819E3300E7705656DF41
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 97e43f5a9edab83fd23f086fc856bafeee7eff55113dd253ff7210aa8f78817a
                                          • Instruction ID: 5c1f2dceddba315f447cfa3aa34a1c34569278bda92b1e236b8e000435fcff5a
                                          • Opcode Fuzzy Hash: 97e43f5a9edab83fd23f086fc856bafeee7eff55113dd253ff7210aa8f78817a
                                          • Instruction Fuzzy Hash: 14F0B7B4D14619EFCB80DFBAD5456ADBBF4AB09300F0099AAD829E3310E7745642DF40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca87d8ddec55bb47b443b39b7593911b0f5c5198089a2eb47c72450e6e1d9b8e
                                          • Instruction ID: 3499e77b857d00ff48d4f492a4f9e9fa83fe910e4fe00860adc7ef3a5e1e716c
                                          • Opcode Fuzzy Hash: ca87d8ddec55bb47b443b39b7593911b0f5c5198089a2eb47c72450e6e1d9b8e
                                          • Instruction Fuzzy Hash: 78F0DAB0E0461A9FDB54DFA9C841AAEBBF4AB48300F1085AAD919E7310D77195018FA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00cfd9e7cf4b466c7ab23f132b93108f2cf9080f29b2b8d95e5bda603ffa51ee
                                          • Instruction ID: 05d38a09e09889552591be7debdcea0b5ca1590221c9c7c5d023c56796eba33a
                                          • Opcode Fuzzy Hash: 00cfd9e7cf4b466c7ab23f132b93108f2cf9080f29b2b8d95e5bda603ffa51ee
                                          • Instruction Fuzzy Hash: 8AF0DAF0624624CFC758CB24D594AAC7B7AFB4A315F545494E40F6B261EB31AD83DF10
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a95a201e94da47d8cf3853e50b15ea64edcc273b8426dd168d516d7d30696ca
                                          • Instruction ID: 0ae992a1719696a82a22a1c9d887e8060cbe9c5eab0dacbc194b406a638906ed
                                          • Opcode Fuzzy Hash: 7a95a201e94da47d8cf3853e50b15ea64edcc273b8426dd168d516d7d30696ca
                                          • Instruction Fuzzy Hash: 27F0EDB4D15619EFCB90EFB8D5456ADBFF4AB09200F1085A9D449F3300EB345A41DF45
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33cdaaf469c607a526b08274997d4f8031804a1c6ba60ba370f6f7cf9a237dd9
                                          • Instruction ID: 2c04c1247f6e51a33532baa412b18dba736c4938c7c72c6a0a62f95f5d3b3112
                                          • Opcode Fuzzy Hash: 33cdaaf469c607a526b08274997d4f8031804a1c6ba60ba370f6f7cf9a237dd9
                                          • Instruction Fuzzy Hash: 97F030F4E5A925CBD784CFD4C980AEC77BAEB4A300F10E668D81BA3511CBB41887DE55
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7a4380463e3f5e7bee5380f7412c44d02aead0ce40309476e84416c39f7ab9c
                                          • Instruction ID: 042cabb99c2782a5dd86a4c7c3212ab554432880b37c05a183dfdda7a0b56e99
                                          • Opcode Fuzzy Hash: a7a4380463e3f5e7bee5380f7412c44d02aead0ce40309476e84416c39f7ab9c
                                          • Instruction Fuzzy Hash: 5FF059F0A1A521CFC750CFD4C8C19E87BB6EB05200F11C6A9C807A7521CA744943CF00
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d220d22bb04b4cd322a9b4d1c2c5248b24ac18a8515e1730b3b4ae4771b23ec3
                                          • Instruction ID: 2f9c3e34580e7dcd79cd1cc3a37d36350a397998b4b34f9c332c5aeb39013a7e
                                          • Opcode Fuzzy Hash: d220d22bb04b4cd322a9b4d1c2c5248b24ac18a8515e1730b3b4ae4771b23ec3
                                          • Instruction Fuzzy Hash: 3BE02BF08195168FC790A6E7D8097E83BA99B45300F108434D40666241EE761857DF62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35f97561a21f080b8115c764da9a1ccce52460bb7201c56609753953e29105f5
                                          • Instruction ID: dc19d0151da4341c26d6d9468b5267e33baa236f6dd2a8a56f9f347846e42cda
                                          • Opcode Fuzzy Hash: 35f97561a21f080b8115c764da9a1ccce52460bb7201c56609753953e29105f5
                                          • Instruction Fuzzy Hash: 86E0C27248D6890FCB1286B07E564F97FA4C60726232806C7EC4CC6542E022455A86D1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f5f16abe40dbf08d8818076a296c7483ab2e212b890d129dbe41ab17e8bcedf
                                          • Instruction ID: 21dfe4d751e9c69ebd899a7172d7e50e60de8649b0933985327a8855e9f7ee99
                                          • Opcode Fuzzy Hash: 8f5f16abe40dbf08d8818076a296c7483ab2e212b890d129dbe41ab17e8bcedf
                                          • Instruction Fuzzy Hash: 07E030F4A56926CBD780CED4C9806AC7675EB05200F10D568D80BA3511CAB40943DE55
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd116bd00d12535be75183b8fb6001af105814d676c66ce6200870af35243e66
                                          • Instruction ID: 19df7ff0e1981ba48b24f770cda0a809eb573f00c38dcb619592cc59c8a81c23
                                          • Opcode Fuzzy Hash: bd116bd00d12535be75183b8fb6001af105814d676c66ce6200870af35243e66
                                          • Instruction Fuzzy Hash: D3F03974D0020CEBCF40EFA9D405A9DBFB5EB88301F40C0AAE818A3340DA355A51DF55
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19878e2f05140e58029adb0450619ce864dc51a9b22f1dba3226fca127faa4db
                                          • Instruction ID: c89f9ff5d349875f3adc87b9b9c730c970e6bb61db12f582f5bdbbbf7a642b84
                                          • Opcode Fuzzy Hash: 19878e2f05140e58029adb0450619ce864dc51a9b22f1dba3226fca127faa4db
                                          • Instruction Fuzzy Hash: 96E08CBBC001259B8B10AAE5A9021EEFF70EB04621B414512E902A7A00C23006B69BD1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a810fad94c287ea0bf90e1c6142a94a2e757da8e42753a08da4ed81bcd58520
                                          • Instruction ID: a385f85005ec05b84bc9b5eca5ac7a48688f9d94e29cbc7c3248b1026d35b50e
                                          • Opcode Fuzzy Hash: 0a810fad94c287ea0bf90e1c6142a94a2e757da8e42753a08da4ed81bcd58520
                                          • Instruction Fuzzy Hash: 5EE08CB0801228EBDB40EAB484046AD7EB4AB01300F504598D88663340DF300E4AEA82
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7832fe467774e2989a2aeeb962916dba4adeec831d8e7f4992f48f93f1adaa0e
                                          • Instruction ID: a7343c9e8c0f504d1b6643acd1dfc69bbb0fd73664e7b0ce3312a2f9543800e0
                                          • Opcode Fuzzy Hash: 7832fe467774e2989a2aeeb962916dba4adeec831d8e7f4992f48f93f1adaa0e
                                          • Instruction Fuzzy Hash: 23E0B6B0D40619DFDB80EFB9CA45A5EBBF1BF08700F1185AAD41AE7311EBB496058F91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d830aca41223cb8acff002b4cb9fae439edaea751a8ad3321e34f548981b552
                                          • Instruction ID: 65c97f774e2e38b346241d6c964ef079b291f58c8155d9cf31e6c47e762984ae
                                          • Opcode Fuzzy Hash: 4d830aca41223cb8acff002b4cb9fae439edaea751a8ad3321e34f548981b552
                                          • Instruction Fuzzy Hash: B2D0127B00D5D05EF207B650B8298613F68DAD2255315C983D881C9033C804892DA762
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                          • Instruction ID: 616d9f70d9e0bd50f35bc0c56de044be1bfba7c60d8e7102a0e83367bfb726c4
                                          • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                          • Instruction Fuzzy Hash: A2D09E72D00139978B10AFE9DC054DFFF79EF05650F418166E916A7101D3715A21DFD1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84316c669096bd3b66b55d5c5df27ca810d05b25b1c6e26fb19e2003f5662ad1
                                          • Instruction ID: ea1e3cec0a41d646d9c903f76099bd7dda187e692a7bd7446aadbc9603b06a50
                                          • Opcode Fuzzy Hash: 84316c669096bd3b66b55d5c5df27ca810d05b25b1c6e26fb19e2003f5662ad1
                                          • Instruction Fuzzy Hash: 9CD012762501089E9B81EEE5E845C567BDDBB14650740C422F509C7120E621E429FF52
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d42b80a2d6da9d9be514367bcb0e5f2aeb0a622724a80498d6c7ed5cb2a1faca
                                          • Instruction ID: edb057afd01f35f0bd62a4391dc06758ebb4fb87661998ad345b95842ecedfbe
                                          • Opcode Fuzzy Hash: d42b80a2d6da9d9be514367bcb0e5f2aeb0a622724a80498d6c7ed5cb2a1faca
                                          • Instruction Fuzzy Hash: C8C08CB0002A188BC3047BE6F50F3A87FA85701612F444011B84E10950EEE2545ADFB6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f429deeae2ff5929454038a96d8b2da268c934609bf1675901ba8bb18c851cf
                                          • Instruction ID: 1713667df061c373d1c0c4566402cd10443215848d69a8f45c14783e0caad40c
                                          • Opcode Fuzzy Hash: 4f429deeae2ff5929454038a96d8b2da268c934609bf1675901ba8bb18c851cf
                                          • Instruction Fuzzy Hash: 5BB012775144526670059070AC426944B10D1E0738334C603E603D0003C54051379067
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2138340283.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7620000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec1c449321d0e176ce9485c27a242231a83133395631d667dc5ad43d5bd4f270
                                          • Instruction ID: 02f5df92b3dd9d4b72dee0d4a915c608139a7a473ea2a56d96e445986216a757
                                          • Opcode Fuzzy Hash: ec1c449321d0e176ce9485c27a242231a83133395631d667dc5ad43d5bd4f270
                                          • Instruction Fuzzy Hash: 76B012F5975961F24558A3B84C80F7F5811EFB3710F609C49334742001C560483BFA6F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 5acc71c7dd595c55ee37fd458b2af318e1251c2f88217d98d9df95526d368852
                                          • Instruction ID: 915c04a486121b27248237fa29cb078173795552d14df94b0963da36b130e5dd
                                          • Opcode Fuzzy Hash: 5acc71c7dd595c55ee37fd458b2af318e1251c2f88217d98d9df95526d368852
                                          • Instruction Fuzzy Hash: 5FE1EB74E00618DFDB14DFA9C984A9DBBB1FF49314F15806AE816AB362DB70AC41CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 9621d94109efc8d4ff46a8593ef354c8bec64a755a8a03a6962fb783907ebb7c
                                          • Instruction ID: fd0e284db2ed3dea1b9a710d794e04dad1682e87136495064bd05918a42e9116
                                          • Opcode Fuzzy Hash: 9621d94109efc8d4ff46a8593ef354c8bec64a755a8a03a6962fb783907ebb7c
                                          • Instruction Fuzzy Hash: A291D374E00218DFDB14DFA9D984ADDBBF2BF88310F14906AE419AB365DB309985CF20
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 1fecfa2a9a82d4c1548b417a7de523bbf6a9e971a75f01028b4f1f9e4e41c196
                                          • Instruction ID: 15c774749e63e5f71243ebfcb7ab5175e63f7ac3166842e32c4d8077e510ad4d
                                          • Opcode Fuzzy Hash: 1fecfa2a9a82d4c1548b417a7de523bbf6a9e971a75f01028b4f1f9e4e41c196
                                          • Instruction Fuzzy Hash: AA91A374E10218DFDB14DFAAD944A9DBBF2BF89300F14D06AE819AB365DB309941CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 68f4c27dfbe8f13996924e24ae8406d6a58e0b6ad7437bf07d8c2c3e0e9eb7aa
                                          • Instruction ID: 2ff960d950af007832c395358b8af510a8b7db56ab5dce241a09be9f5b186bc4
                                          • Opcode Fuzzy Hash: 68f4c27dfbe8f13996924e24ae8406d6a58e0b6ad7437bf07d8c2c3e0e9eb7aa
                                          • Instruction Fuzzy Hash: 1B81D374E00218DFDB14DFA9D944ADDBBB2FF89310F14806AE44AAB365DB749941CF20
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 7760965739324b3d2339dd0d72e4d19ec7f0397c9882f02cc89fb600da5d3912
                                          • Instruction ID: 1723ba6606c0b3f1f183e2b2a22f4e7d3913820bb60f165c563d2dc463522d8e
                                          • Opcode Fuzzy Hash: 7760965739324b3d2339dd0d72e4d19ec7f0397c9882f02cc89fb600da5d3912
                                          • Instruction Fuzzy Hash: 9D81C474E10218DFDB14DFAAD984A9DBBF2BF89300F14D069E849AB365DB309941CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 95557d106cd147a38f34e35bbb3152a95c8c03cd78a939631c98b67b4a1c8cc2
                                          • Instruction ID: d1d33dd82616ffdbb779ac2e7a9f922dd22efcad87f120c7a167541f9492f62f
                                          • Opcode Fuzzy Hash: 95557d106cd147a38f34e35bbb3152a95c8c03cd78a939631c98b67b4a1c8cc2
                                          • Instruction Fuzzy Hash: D7819274E10218DFDB14DFA9D984A9DBBF2BF89300F149069E819AB365DB34A941CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 8ffa19b8eeda2ebc18d7deff8755d72901f8f4e4c0f95d7c08de5ff2d2d47246
                                          • Instruction ID: 8ac3df13a80c86f0d26976f533ed023e331a37641e18e3072c83817072bbaef6
                                          • Opcode Fuzzy Hash: 8ffa19b8eeda2ebc18d7deff8755d72901f8f4e4c0f95d7c08de5ff2d2d47246
                                          • Instruction Fuzzy Hash: 73819374E01218DFDB14DFAAD984A9DBBF2BF88300F14C069E819AB365DB349945CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                          • API String ID: 0-3391486992
                                          • Opcode ID: 8e718d5c7e2d013f460646c57f7f4465cd3aa93cdc35063d4be5619bcf96a3c1
                                          • Instruction ID: fcddf43fcefbc877b50e262ae06b02731b6badf635abebe078ded2990fd125a0
                                          • Opcode Fuzzy Hash: 8e718d5c7e2d013f460646c57f7f4465cd3aa93cdc35063d4be5619bcf96a3c1
                                          • Instruction Fuzzy Hash: 5081A374E10218DFDB14DFAAD984A9DBBF2BF88300F14D069E819AB365DB349941CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$(ocq$,gq$,gq
                                          • API String ID: 0-2401767512
                                          • Opcode ID: 3ecd971844cc980cbe23fca7a133b7fd2705018c97ae54bf0aa834bf78c81a21
                                          • Instruction ID: 512a41aa96642f347f0eb402f65c92d2fecae06b7f0c0eece8e63326b647d1f9
                                          • Opcode Fuzzy Hash: 3ecd971844cc980cbe23fca7a133b7fd2705018c97ae54bf0aa834bf78c81a21
                                          • Instruction Fuzzy Hash: 03D1E871A00119DFCF14CFA9C984AEDBBB2FF88340F198069E456AB261DB34ED41CB64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oFp$PHcq$PHcq
                                          • API String ID: 0-775545523
                                          • Opcode ID: 891fc176bd594c798716c7fb81d1ff9169f8648c7445fe3485dfc395c0e937d2
                                          • Instruction ID: 3170671d3de9ebaf6a442f065242dc1dd45fd7a951e8f18a4a310f2e5875beab
                                          • Opcode Fuzzy Hash: 891fc176bd594c798716c7fb81d1ff9169f8648c7445fe3485dfc395c0e937d2
                                          • Instruction Fuzzy Hash: E061A274E00618DFDB14DFAAD984A9DBBF2FF89310F14806AE409AB365DB745941CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$4'cq
                                          • API String ID: 0-3004416391
                                          • Opcode ID: 9b566c4cb4674ba2dde5135be6452f45942d90ef73780e20c25a0414fb65c368
                                          • Instruction ID: c84942ab5905adb9f793e24254de67e735e34c5316016f55248da3923eb65896
                                          • Opcode Fuzzy Hash: 9b566c4cb4674ba2dde5135be6452f45942d90ef73780e20c25a0414fb65c368
                                          • Instruction Fuzzy Hash: B7727B71A00249DFCB15CF68C994AEEBBF2FF88310F158559E9469B2A1D730ED81CB61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$Hgq
                                          • API String ID: 0-2239030825
                                          • Opcode ID: e4b0d6df215c950e2c444f695bdb986a5818c92d40690fb95f2e78eda4eb6395
                                          • Instruction ID: bac1750acbb3b80d6b49a581dbb9237f39dee9c6116f213396df19a61d47d605
                                          • Opcode Fuzzy Hash: e4b0d6df215c950e2c444f695bdb986a5818c92d40690fb95f2e78eda4eb6395
                                          • Instruction Fuzzy Hash: C8127B70A00219DFDB14DF69C954AAEBBF6BF88304F248569E5069B391DF34DD81CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHcq$PHcq
                                          • API String ID: 0-4229179212
                                          • Opcode ID: 744c8cc17e73590bd36f6d23285e85f0f74e29eda4a63ecc25832572e42a8ad1
                                          • Instruction ID: 46d4002580d710e0328eee76c5124320e52102c48ca7abd45b8c5dafb78cf769
                                          • Opcode Fuzzy Hash: 744c8cc17e73590bd36f6d23285e85f0f74e29eda4a63ecc25832572e42a8ad1
                                          • Instruction Fuzzy Hash: 44A13371E14218CFDB18CFA9C8947ADBBB2FF89300F64806AD889AB395DB745945CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0b68d3d405fc35837f7169ce496ab8e199896fdd4e2ced310f077820d58b1ebe
                                          • Instruction ID: da61fb0fc359cd8dc794946dc2f283f5bae00f1a91e5630431eb9092899b604f
                                          • Opcode Fuzzy Hash: 0b68d3d405fc35837f7169ce496ab8e199896fdd4e2ced310f077820d58b1ebe
                                          • Instruction Fuzzy Hash: A172CD74E01229CFDB64DF69C984BE9BBB2BB49300F2491EAD449A7355DB309E81CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 314c9d8d5cee5f22adc9a96ce3c817433d798914f88aa5b3ffb0e7ba649a9320
                                          • Instruction ID: 9c6090e1c0d1dcaa3081414857ad8161d2dcd086741b991dc99f2c645cd69c1d
                                          • Opcode Fuzzy Hash: 314c9d8d5cee5f22adc9a96ce3c817433d798914f88aa5b3ffb0e7ba649a9320
                                          • Instruction Fuzzy Hash: 9EE1C174E00218CFEB64DFA5D944BDDBBB2BF89304F2081AAD409AB394DB755A85CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5f0456630905944f74a91a02bd3ecdff9ec65cdc92e3e50938b9ee0c08d64ef2
                                          • Instruction ID: 8c490f1274583db72d8334e63030584c7f4e0ec53bd8294203e34870daa7d0c7
                                          • Opcode Fuzzy Hash: 5f0456630905944f74a91a02bd3ecdff9ec65cdc92e3e50938b9ee0c08d64ef2
                                          • Instruction Fuzzy Hash: D8A1AE74E112288FEB28CF6AC944B9DBBF2BF89300F54C0AAD40DA7255DB345A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c3bee958b50195b73858dea8a67fbc45bed09622f4d3f8c91356dae2784d6db
                                          • Instruction ID: ed8ffbca3a55f211653bcdfe77399542ebacd707d188c761e34950a32865ffc8
                                          • Opcode Fuzzy Hash: 8c3bee958b50195b73858dea8a67fbc45bed09622f4d3f8c91356dae2784d6db
                                          • Instruction Fuzzy Hash: F1A1B171E112288FEB28CF6AD944B9DBAF2BF89300F54D0AAD40DB7254DB345A85CF15
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e885acbf71427a3c607529b3489aaba22bb5dec5b0aad986a0eada9f40ba371
                                          • Instruction ID: 6c794c628ad7955840f2f0015ea7bd5c1d8a967d4dbe2d3002c9be1e4319cf6c
                                          • Opcode Fuzzy Hash: 9e885acbf71427a3c607529b3489aaba22bb5dec5b0aad986a0eada9f40ba371
                                          • Instruction Fuzzy Hash: 74A1B174E112288FEB28CF6AC944B9DBBF2BF89300F54C0AAD40DA7254DB745A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6e34084cf85798c4ee8493e55d7254df0bfe66a629841a7f540d5f7d1b8cdc0
                                          • Instruction ID: 94c2362cc89337c219ed3c371ae573c71d74b55cf3933f15970d4da10baf4ef8
                                          • Opcode Fuzzy Hash: b6e34084cf85798c4ee8493e55d7254df0bfe66a629841a7f540d5f7d1b8cdc0
                                          • Instruction Fuzzy Hash: 84A1A1B0E112188FEB28CF6AC944B9DBAF2BF89300F54C0AAD40DB7254DB745A85CF15
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4496f1763cc4b9e381fbb9b051d8369f07d6047207acd22d7b9fa8465e6c14fb
                                          • Instruction ID: 94f84824391e79a4c9b4140867d4d00582621ff1c99acf7c53db59c1a46036c7
                                          • Opcode Fuzzy Hash: 4496f1763cc4b9e381fbb9b051d8369f07d6047207acd22d7b9fa8465e6c14fb
                                          • Instruction Fuzzy Hash: EBA1AF74E112288FEB28DF6AD944B9DBBF2BF89300F54C0AAD40DA7254DB745A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94a21b7838720ce122c8a16e7657b399f454ae145340c5e800414ef061669c9c
                                          • Instruction ID: 9397248bfb82b5419a9f8424a25c3df7c819a33d7e0df69c6f70987d2a6ba368
                                          • Opcode Fuzzy Hash: 94a21b7838720ce122c8a16e7657b399f454ae145340c5e800414ef061669c9c
                                          • Instruction Fuzzy Hash: 6CA1A274E112288FEB28DF6AD944B9DBBF2BF89300F54C0AAD40DA7254DB745A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c330cfee57eaa7ca1ccc05ca9f9cc4034a541fb7e19965707444aab3647a2853
                                          • Instruction ID: d88295308b12270fc305e26a6136fc0b9671fbb7fb7c324642dfec57de7114b4
                                          • Opcode Fuzzy Hash: c330cfee57eaa7ca1ccc05ca9f9cc4034a541fb7e19965707444aab3647a2853
                                          • Instruction Fuzzy Hash: 23A1A074E112288FEB28DF6AD944B9DBBF2BF89300F14C0AAD40DA7255DB345A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fefefca5e0b95423114884e491ed89d765eebfb2d24ff73e414d5dd698683d97
                                          • Instruction ID: 3684d6d2c4f4f3c7f15d0e03fd47f4794b9fc72e308088f461c6fc7655506034
                                          • Opcode Fuzzy Hash: fefefca5e0b95423114884e491ed89d765eebfb2d24ff73e414d5dd698683d97
                                          • Instruction Fuzzy Hash: F4A1A074E116288FEB28DF6AD944B9DBBF2BF89300F14C0AAD40DA7254DB345A85CF15
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 260770ffe2f5e75d3c04e4de961b2c9dca39a2b6433cf53572f5f3a84d1f5797
                                          • Instruction ID: 718e687e0013d0c32be755217154e414e00937f0448f214e3add3dd1159e49c4
                                          • Opcode Fuzzy Hash: 260770ffe2f5e75d3c04e4de961b2c9dca39a2b6433cf53572f5f3a84d1f5797
                                          • Instruction Fuzzy Hash: 31A1BF71E116288FEB28CF6AC944B9DBAF2BF89300F14D0AAD40DB7254DB345A85CF11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ceda6c0320de3a4b74b6f3f088459be8b013205e9483e2c94d338469a931fb20
                                          • Instruction ID: 27db078f0ef8ada2ec7913fef59ff4c377930a95392b6eacce6e884b58d5128e
                                          • Opcode Fuzzy Hash: ceda6c0320de3a4b74b6f3f088459be8b013205e9483e2c94d338469a931fb20
                                          • Instruction Fuzzy Hash: EF81B7B1E006188FEB28CF6AC944B9DFBF2AF89300F14C1AAD50DA7255DB305A85CF51
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 636052217a17c71f61e709002ba2c59baadb613234a893e9364896bbf820ee00
                                          • Instruction ID: 9ce34de83cc83ae45c7e17e1e26be67071c9822582e46045d73e44f984126842
                                          • Opcode Fuzzy Hash: 636052217a17c71f61e709002ba2c59baadb613234a893e9364896bbf820ee00
                                          • Instruction Fuzzy Hash: 1B718371E016188FEB68CF6AD944B9DFBF2AF89300F14C0AAD40DA7255DB744A85CF51
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6166204b765843e11a78a795d3798f7e952a28d75b6086797494d4823eeacdef
                                          • Instruction ID: f2aa05fdd868588cc276d5f3b9d936be08a02cbea2b32d0758ede14125304a2d
                                          • Opcode Fuzzy Hash: 6166204b765843e11a78a795d3798f7e952a28d75b6086797494d4823eeacdef
                                          • Instruction Fuzzy Hash: D6718371E006188FEB68CF6AC944B9DFBF2BF89300F14C0AAD50DA7254DB744A858F51
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7f86806fbd198f52a401941407c012d5b9646eb194158906a1d9145a67de084
                                          • Instruction ID: 1188ce614d73d43c2078597ad3c85f71961f081d0fe319e23f8bbe5ffbb6b3b2
                                          • Opcode Fuzzy Hash: a7f86806fbd198f52a401941407c012d5b9646eb194158906a1d9145a67de084
                                          • Instruction Fuzzy Hash: FF418971E016188BEB58CF6BDD457D9FAF3AFC9310F04C0AAC50CA6264DB740A858F55
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9a51030f0a416bb3e8d8dbcdb0a26de9abe1c98168b55bd0e0797769dd3de161
                                          • Instruction ID: ae4b8b4d6000e5493ffe386e75a1f8b9504ac03eda50d6a13e86cbe8a225cd54
                                          • Opcode Fuzzy Hash: 9a51030f0a416bb3e8d8dbcdb0a26de9abe1c98168b55bd0e0797769dd3de161
                                          • Instruction Fuzzy Hash: C441E2B1E00608CBEB18DFAAD9547DEBBB2BF88300F14C06AC459BB254DB754946CF64
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: afce4ee5617139c575bd398b6fb6a2be085cb60679dc7e8d6f2e07c454969c88
                                          • Instruction ID: fbba14dc644b5f6fadd57bad2541aabf989b4bed90285206487684fef4e5f5e7
                                          • Opcode Fuzzy Hash: afce4ee5617139c575bd398b6fb6a2be085cb60679dc7e8d6f2e07c454969c88
                                          • Instruction Fuzzy Hash: 8C415BB1D016188BEB58CF6BD9457D9FAF3BFC8300F14C1AAC50CA6264DB740A858F51
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af3cd452fb1d01ed02d85e53dc56732d2955d7fec7802fedf6a15139feaf0247
                                          • Instruction ID: b260732f13f537f640f0898c93078cd32dc97340df78f2be6fb9f5f414132525
                                          • Opcode Fuzzy Hash: af3cd452fb1d01ed02d85e53dc56732d2955d7fec7802fedf6a15139feaf0247
                                          • Instruction Fuzzy Hash: 364169B1D016188BEB58CF6BCD4579AFAF3AFC8300F04C1AAD50CA6264DB740A868F51
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 85aa0178edb08a4a7fc31723572b7eb64f59fe8f265185f4d7b7b767984be5a6
                                          • Instruction ID: b80cfc6ec8acdb53ea0527c71bc38c5da08e45b0dcc9edb9f7012dfc921a59af
                                          • Opcode Fuzzy Hash: 85aa0178edb08a4a7fc31723572b7eb64f59fe8f265185f4d7b7b767984be5a6
                                          • Instruction Fuzzy Hash: D84158B1E016188BEB58CF6BCD457CAFAF3AFC9310F14C1AAC50CA6264DB740A858F55
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: edfbdf53f4534d9a99765242090c0ccdaf909e783ca47182c8879e36004bbd9b
                                          • Instruction ID: d041286495162bf049a546b396dcbda7704dc500ebf4fb4d932229bfa35bf95d
                                          • Opcode Fuzzy Hash: edfbdf53f4534d9a99765242090c0ccdaf909e783ca47182c8879e36004bbd9b
                                          • Instruction Fuzzy Hash: 024148B1E016188BEB58CF6BC9457D9FBF3AFC8310F14C1AAD50CA6265DB740A868F11
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49a9ae43025cce966e1a0e17cee6578bca03906ee34e72c32f0a3f44bb454734
                                          • Instruction ID: 3bb50f49614061503a0d76aa745c2f97ac5b32a776e361f81a4b8a118d229cbd
                                          • Opcode Fuzzy Hash: 49a9ae43025cce966e1a0e17cee6578bca03906ee34e72c32f0a3f44bb454734
                                          • Instruction Fuzzy Hash: E54159B1E016188BEB58CF6BCD4578AFAF3AFC8310F14C1AAC50CA6264DB744A858F55
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq$(ocq$(ocq$(ocq$(ocq$(ocq$,gq$,gq
                                          • API String ID: 0-3338910979
                                          • Opcode ID: b5b022390655aaf789b125bba22f283a79f51405b0b518173676085300c2993d
                                          • Instruction ID: dc041e0ce954e84fb6ecf9568e28bc23ecb6c7eece0f484315dfe0511b447efe
                                          • Opcode Fuzzy Hash: b5b022390655aaf789b125bba22f283a79f51405b0b518173676085300c2993d
                                          • Instruction Fuzzy Hash: E5121A30A04249DFCB14DF69D984A9EBBF2FF88314F258559E8569B3A1DB30ED41CB60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $cq$$cq
                                          • API String ID: 0-2695052418
                                          • Opcode ID: ae03df48638d9d23491270914701d61818776d60a9edcd6f71057d650300a7df
                                          • Instruction ID: d53a49c64641f90cb8af1862a127964583d6d0f898ab5d4fe1ff009cc22f6b3e
                                          • Opcode Fuzzy Hash: ae03df48638d9d23491270914701d61818776d60a9edcd6f71057d650300a7df
                                          • Instruction Fuzzy Hash: FB522174A00219CFEB15EBA4C850BAEBB77EF88300F1180AAD50A6B355DF345E85DF65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'cq$4'cq
                                          • API String ID: 0-60795322
                                          • Opcode ID: 822f82cd33b66b9f379e7ed6728de513e21236ed7d13298394711269c73e8142
                                          • Instruction ID: 03ebfefa8cb82ee28cf2587957ca4782a859ec4921eb4694df62df5abab57349
                                          • Opcode Fuzzy Hash: 822f82cd33b66b9f379e7ed6728de513e21236ed7d13298394711269c73e8142
                                          • Instruction Fuzzy Hash: 1DB14AB1714101CFDB159A38C958BB937AEAF85704F2944AAE143CF3A1EE35CC42E766
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hgq$Hgq
                                          • API String ID: 0-3391890871
                                          • Opcode ID: 4cbaef3901f98fe98579008e4226a1d7a1d57d8da95d36cd76c43d1f66ac2d91
                                          • Instruction ID: 0f1905bd9a06657886d670fe61c0f387b3a4f55de10fbdb20876919154350448
                                          • Opcode Fuzzy Hash: 4cbaef3901f98fe98579008e4226a1d7a1d57d8da95d36cd76c43d1f66ac2d91
                                          • Instruction Fuzzy Hash: 5791AD35704654DFDB169F28E854BAE7BA2BB88300F188869E5478B399DF34CC41CBB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,gq$,gq
                                          • API String ID: 0-2533611571
                                          • Opcode ID: ab6ab4f63eb524569f678740f65555739a2037bf41aa6ff9ea4186d73c5ef8ad
                                          • Instruction ID: a1a19eeac63f80a41b574e2d6aee3cad95bfc8724070cfdd7d76efdc1ba315e7
                                          • Opcode Fuzzy Hash: ab6ab4f63eb524569f678740f65555739a2037bf41aa6ff9ea4186d73c5ef8ad
                                          • Instruction Fuzzy Hash: DD816135A00A05DFCB14DF69E484AAAB7F2BF89310B298165E407DB369D731ED41CB71
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (&cq$(gq
                                          • API String ID: 0-4012885273
                                          • Opcode ID: 2b76b0104bd3eb26cf64d4eb1493fb74a0e831a7a89691b13c09b77cd81913f5
                                          • Instruction ID: 7d981542d47d4635a3b058f986d82ab371a2d5110a9bafafe444fdde38bbaf8a
                                          • Opcode Fuzzy Hash: 2b76b0104bd3eb26cf64d4eb1493fb74a0e831a7a89691b13c09b77cd81913f5
                                          • Instruction Fuzzy Hash: 26719131F102199FDB15DFA9D8506EEBBB2BF89310F54442AE406AB380DF349E46C7A5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xgq$Xgq
                                          • API String ID: 0-2113765878
                                          • Opcode ID: 812b0e130edfebe1f23fdcb3abaa28698a4dd42d94629a3406f6c4414c87f667
                                          • Instruction ID: cdfc201b27629ecddb2557b1df81d8fbc287e485a41bb0f2bb9fdac70a8312d1
                                          • Opcode Fuzzy Hash: 812b0e130edfebe1f23fdcb3abaa28698a4dd42d94629a3406f6c4414c87f667
                                          • Instruction Fuzzy Hash: CA312675B00325CBDF2D4A6989942BF66DAABC4710F284439D847C7390DFB4CE45B6B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: 10666369fc8acdb3cf1da13c976d4315d234b109ebf80e8b95ff2dd7e5b0529e
                                          • Instruction ID: 024a1439a6ebb66a15dc16d70140a69997fd76b3d404454ecefa12082a0b7b51
                                          • Opcode Fuzzy Hash: 10666369fc8acdb3cf1da13c976d4315d234b109ebf80e8b95ff2dd7e5b0529e
                                          • Instruction Fuzzy Hash: 1522BA74900619CFCB54EF64E994A9DBBB2FF88301F1099E9E809AB368DB705D85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRcq
                                          • API String ID: 0-4134321033
                                          • Opcode ID: 8de0f4c63abd95f8d00ceffd0bddde61c443916205a1ae4cad622cbd5d2c9c21
                                          • Instruction ID: 99801b950516b84833f1ef3c40486f2058bc46f8d622c8ea605b80b15b1a6c2a
                                          • Opcode Fuzzy Hash: 8de0f4c63abd95f8d00ceffd0bddde61c443916205a1ae4cad622cbd5d2c9c21
                                          • Instruction Fuzzy Hash: CD229A74900619CFCB54EF64E994A9DBBB2FF88301F1099E9E809AB368DB705D85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ocq
                                          • API String ID: 0-1855696158
                                          • Opcode ID: f7e739437717041434ac8cb03f5eabd59605b98de9353c724b35d178797d656d
                                          • Instruction ID: 92ba5be18a00b0c14377e85bc67f6c4b056e2d4bf6e9efe377bd8b890836e45e
                                          • Opcode Fuzzy Hash: f7e739437717041434ac8cb03f5eabd59605b98de9353c724b35d178797d656d
                                          • Instruction Fuzzy Hash: D6419135B04204DFDB14AB6CD855AEE7BB6ABCC311F158469E506DB391DE319C0287B1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e308222fc2d926c51bb008cc582851b0080ae9f8870b6aa108ccb52dc821786
                                          • Instruction ID: acc86d2ebae19b466cb1d7c24c85f039ebea964fe12fe7b2245c05218af47d8a
                                          • Opcode Fuzzy Hash: 5e308222fc2d926c51bb008cc582851b0080ae9f8870b6aa108ccb52dc821786
                                          • Instruction Fuzzy Hash: FAF1F875E00615CFCB14CF6CC9889ADBBF2BF88310B5A8059E516AB361DB35EC81CB65
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5584aa1af82a71c98af4c1e9d0a127aae974689638d32edc75f14e8e392ae5f8
                                          • Instruction ID: a90f0962aba3b5fd44523920658d9dbdad4f13ae20c7fd496cb60055a93ee97c
                                          • Opcode Fuzzy Hash: 5584aa1af82a71c98af4c1e9d0a127aae974689638d32edc75f14e8e392ae5f8
                                          • Instruction Fuzzy Hash: 5271F834704605CFCB65DF28C498AAA7BE5AF89701F1944A9E906DB3B1DB70EC41CBA0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc40423dc367b3ca8a54bd0787f77a378faa8441efd8d20248819d1fc35594e2
                                          • Instruction ID: 5b65c944f98df74f8c6ec9dfc279cc4a981c398b009c6f04046b81f67651d0c6
                                          • Opcode Fuzzy Hash: fc40423dc367b3ca8a54bd0787f77a378faa8441efd8d20248819d1fc35594e2
                                          • Instruction Fuzzy Hash: 4851D0718A1707CFCB242B20B9AC46ABBA8FF2F367701AD00E41EC91259B715466CE30
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f63a56d3f22c660cdb6a5e95bc138d6ffdeb68fea639c01d14bc53a3c0f0a86
                                          • Instruction ID: 07342f0404085d190ca253ec78b062133b9d460665439d7bc828ff1789c26a80
                                          • Opcode Fuzzy Hash: 4f63a56d3f22c660cdb6a5e95bc138d6ffdeb68fea639c01d14bc53a3c0f0a86
                                          • Instruction Fuzzy Hash: 5851BF708A1707CFCB242B60B5AC57ABBA9FF2F367741AD00E41EC91289B715466CE30
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0be09d9bb1328acc6a99f36cab05a8708a99492c25dd5823378ccf19ba2dd3cb
                                          • Instruction ID: 85311c1292ef85c38ed33485323333b613a4b3385860ee2835d9231eb2c6ef58
                                          • Opcode Fuzzy Hash: 0be09d9bb1328acc6a99f36cab05a8708a99492c25dd5823378ccf19ba2dd3cb
                                          • Instruction Fuzzy Hash: 09611174D01218DFDB14DFA4D998AEEBBB2FF88300F208529D806AB395DB355986CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47d84ec4fb01b8dbe476a794e417b81163f70d23f1fac359c6222320f2c73069
                                          • Instruction ID: f75721eed28ae951066007c04b540a2c527e0f201b0193738ddb0118c114249b
                                          • Opcode Fuzzy Hash: 47d84ec4fb01b8dbe476a794e417b81163f70d23f1fac359c6222320f2c73069
                                          • Instruction Fuzzy Hash: E2517F74E01218DFDB54DFAAD9849DDBBF2BF89310F249169E819AB364DB30A901CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4ac69213a5886befb87737f9db8fac193dda93a648d56dcfa4f01d3d5d95f78
                                          • Instruction ID: 012fff023e9aa8a92a2c3ba924011523fd2916c2077451ab0978cdb567df857d
                                          • Opcode Fuzzy Hash: e4ac69213a5886befb87737f9db8fac193dda93a648d56dcfa4f01d3d5d95f78
                                          • Instruction Fuzzy Hash: A4415D3691171ACFDB04AF71E45C7FE7BB1FB59315F105858D106A22A4CBB80A85CFA1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 305d0ced38c7c35b10be682bcbccea0f9316bb6a3a7e97bd0cfaeb8b41a1536f
                                          • Instruction ID: 4fa6dfc5e323bca7540a61f818fbcbd537001f7f7ed53e659501ab84ba4a3af4
                                          • Opcode Fuzzy Hash: 305d0ced38c7c35b10be682bcbccea0f9316bb6a3a7e97bd0cfaeb8b41a1536f
                                          • Instruction Fuzzy Hash: 0B51A574E01608CFCB48DFA9D99499DBBB2FF89300B20946AE805AB364DB31A945CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbcdd45e4df8b1aa329b61b0ea4863f64780a1cf91d4fc9d628643695e26cd0b
                                          • Instruction ID: 78c71ac1bf3d7584d5e887cbe27c5ef0f215665439bbbc4d8de4acd6452c6c9d
                                          • Opcode Fuzzy Hash: dbcdd45e4df8b1aa329b61b0ea4863f64780a1cf91d4fc9d628643695e26cd0b
                                          • Instruction Fuzzy Hash: 71518B74E01228CFCB64DF68D984BEDBBB2BB89301F1055AAD40AA7354D735AE85CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9cbf210390e9163b4bcc511014f01bcee5a064f07d37fbbeaaeb066f4a0b8964
                                          • Instruction ID: 967bdb82fec36247f4ccd791b4a1d9ad9c10cab9baa1341910fac418c162cfc7
                                          • Opcode Fuzzy Hash: 9cbf210390e9163b4bcc511014f01bcee5a064f07d37fbbeaaeb066f4a0b8964
                                          • Instruction Fuzzy Hash: 0451E179E11219CFDB14DFA9D5846EDBBF2BF88300F20902AD819A7394D7789A46CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7cdf67cbdad5d7b06d44c39f31512da851269ea1efa8378a544d9f37549bd6f0
                                          • Instruction ID: 0da431437bd0d8dfbf7b96f52fa3c0ab58fe048debd95c0f7d222dde7d5a7fa4
                                          • Opcode Fuzzy Hash: 7cdf67cbdad5d7b06d44c39f31512da851269ea1efa8378a544d9f37549bd6f0
                                          • Instruction Fuzzy Hash: 0F419D31A04289DFCF11CFA8D8A4ADDFFB2AF49310F148555EA169B291D330E911CBB0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 190291654b9d5d323f1f397c3678cf4806b1354613cd97cc29868f58d87050fd
                                          • Instruction ID: c9ed9a81f317e042434c3a65a6142c5f9b375a5e2251b6f878cfb8c17a167547
                                          • Opcode Fuzzy Hash: 190291654b9d5d323f1f397c3678cf4806b1354613cd97cc29868f58d87050fd
                                          • Instruction Fuzzy Hash: 19416671E1020A9BDF14DFA5C980ADEB7F5BF89700F54812AE415B7394EB70A986CB90
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 885ff940567cb083ddbccd5371fd49e43ee8c0ed0df59cbda3b99770b71654d6
                                          • Instruction ID: 589bb56d9df67bc75d4a874877728d8148c210c5107af68d4154deb6eb65879c
                                          • Opcode Fuzzy Hash: 885ff940567cb083ddbccd5371fd49e43ee8c0ed0df59cbda3b99770b71654d6
                                          • Instruction Fuzzy Hash: 2A41D031A04248DFDF109F64C844BAE7BB2FB48304F18846AE4569B281DB78DD45CBB1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a09705a9d4885f28eccabddf562231205074f28a9bc481e574b59cef46b85d7b
                                          • Instruction ID: 1dcaa13a1e64737a8552ac23cc6fb30e9e6e4d147b64b4dcb0f4e84ce41ef223
                                          • Opcode Fuzzy Hash: a09705a9d4885f28eccabddf562231205074f28a9bc481e574b59cef46b85d7b
                                          • Instruction Fuzzy Hash: F2411374D05208CBCB14EFA8D4946EDBBB2FF49300F609569E446AB255DBB1A841CF74
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 385d07bf47307d29f916f03382ad86957cb0ff9912ec15d67185c0b81dc45927
                                          • Instruction ID: 87955c6bd04bd6b682a5cbd9fe06ac2ce5e19992a5952aa2fbbae5ee345cdaf3
                                          • Opcode Fuzzy Hash: 385d07bf47307d29f916f03382ad86957cb0ff9912ec15d67185c0b81dc45927
                                          • Instruction Fuzzy Hash: 61413474D04208CFCB04DFA8D494AEDBBB2FB49301F60956AE44BAB254EB75A841CF74
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0b6ecc567cbd1dc186d81f9480f7a7b1a0252ab0ac898b577c4a4ff1f8fc0510
                                          • Instruction ID: 086c3f6184c1c07d03e069240b4cafc883f631c74977700e64da314a1b0da1b3
                                          • Opcode Fuzzy Hash: 0b6ecc567cbd1dc186d81f9480f7a7b1a0252ab0ac898b577c4a4ff1f8fc0510
                                          • Instruction Fuzzy Hash: AC41B078E11218CFDB14DFA9D5846EDBBF2BF88300F20902AD809A7294DB745A46CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 82b207e523bc55ebd99dc5bc491587ee5da027d28d71f737abbee6f910901de9
                                          • Instruction ID: a19b616fc215bce38a1fc3918408e9ce71dd15031f88bfe73a56d5902d00b112
                                          • Opcode Fuzzy Hash: 82b207e523bc55ebd99dc5bc491587ee5da027d28d71f737abbee6f910901de9
                                          • Instruction Fuzzy Hash: FE410F70D01218CFCB14EFA8D494AEDBBB2FF49300F60A569E446AB255D7B5A881CF64
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f34b09e8e0e057b2e6d9200e9e4535113cdad4993f394c0211f8838bc97e842b
                                          • Instruction ID: 385065a5978e2b6eb87c5c1c8ce8f7068d3d794efe49fc03bffc4aac11eedb64
                                          • Opcode Fuzzy Hash: f34b09e8e0e057b2e6d9200e9e4535113cdad4993f394c0211f8838bc97e842b
                                          • Instruction Fuzzy Hash: 0241F374D01208CFCB04DFA8D494AEDBBF2FB49311F60956AE40AA7254EB759841CF64
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3eecdc24b5e1f242b346b13cf7a500085bdbf664aed4cc3b44d8eb84f593921
                                          • Instruction ID: 9d8bfa5c3cedbbd7cf66da8fd5e51219a6985402f3e74f2508cde6a565b0f69e
                                          • Opcode Fuzzy Hash: e3eecdc24b5e1f242b346b13cf7a500085bdbf664aed4cc3b44d8eb84f593921
                                          • Instruction Fuzzy Hash: 3041F774D01208CBDB04EFAAD444AEEFBF2BF89301F64D56AD406A7254EB759841CF64
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 311181f1a0e3c596b77b2a3a7be829f747f47065021640463818de78845b0319
                                          • Instruction ID: d464cdb746de14df463d9b8d7b1c7014500a898a29f81b5ba1c699895add73e6
                                          • Opcode Fuzzy Hash: 311181f1a0e3c596b77b2a3a7be829f747f47065021640463818de78845b0319
                                          • Instruction Fuzzy Hash: A131F570D01208CBDB18EFAAD4446EEBBF2FF89300F64D529D406A7255EBB19841CF64
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a4f26f1c276281fba9bd30b1567013effde97a35446f8225db1aad0f1c574d8d
                                          • Instruction ID: 6c867677c224b66a4abcfdf823d7e6ed95d35a8aed4b08f236abdda7b61e1957
                                          • Opcode Fuzzy Hash: a4f26f1c276281fba9bd30b1567013effde97a35446f8225db1aad0f1c574d8d
                                          • Instruction Fuzzy Hash: CA311A7160410AEFCF05AF64E854AAF7BA6FB8C314F148425F9168B255CB35CD61DBB0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 649223a9346e8a522bed38f2e8422a2c481c98ddf75fdfe92f8356188a95dd34
                                          • Instruction ID: 84085cf9c96b725395c1eca6918d4a90e37766c66062b0695d338b2662efd111
                                          • Opcode Fuzzy Hash: 649223a9346e8a522bed38f2e8422a2c481c98ddf75fdfe92f8356188a95dd34
                                          • Instruction Fuzzy Hash: D931AF3181531ADFDB05AF71E41C7EEBBB1EF4A315F009859D006A72A4CBB80645CFA1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cca9001878f5201ee7170f606563e96d06179e3d830b51492d30889ab297c461
                                          • Instruction ID: 8e7a8dbac52f6babeb30cd6f16956ee6f581344e46fc14c4ae67a17317001d95
                                          • Opcode Fuzzy Hash: cca9001878f5201ee7170f606563e96d06179e3d830b51492d30889ab297c461
                                          • Instruction Fuzzy Hash: 94212235708201CBEF25163A8898ABE2797AFD8708B184079D507CB795EE24CC43E7A1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 523536ff6b4fac1c041ff86dece6b9b3e36ca24275d90edde6eadca6387beea6
                                          • Instruction ID: f9a12bb721ca538f4bb8883d0fa56af1807de47b2fb0bdcbd21a7188f3dee4b7
                                          • Opcode Fuzzy Hash: 523536ff6b4fac1c041ff86dece6b9b3e36ca24275d90edde6eadca6387beea6
                                          • Instruction Fuzzy Hash: 3321D735708205D7EB151636C854ABE7697AFC8718F288079D507CF794EE25CC82D3A1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507489252.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_d2d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0ccaae12530a9e01324e08d5f190242838dd86c3ec7294071e9587014c8b0500
                                          • Instruction ID: 4fdda196c7cc3227c42c8160c889d9e96e099f5c16f66a6962f5d57f2f539264
                                          • Opcode Fuzzy Hash: 0ccaae12530a9e01324e08d5f190242838dd86c3ec7294071e9587014c8b0500
                                          • Instruction Fuzzy Hash: F0314E3550E3C08FC7038B24D994715BF71AF57214F1985DBD8898F1A7C22A980ACB62
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f029ed34c9acebc0d502ac19b62568955e205644d1f309e601492aa6d44716a
                                          • Instruction ID: bedee82933957bf0fe44693584233de0599a50ff82ff09db4dafc3cb1141fd57
                                          • Opcode Fuzzy Hash: 1f029ed34c9acebc0d502ac19b62568955e205644d1f309e601492aa6d44716a
                                          • Instruction Fuzzy Hash: 0D21A331A00205DFCB14EB24D5409BE77B5EBD8360B64C559D91A8B298EB31EE45CBA1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a53ae7785c5888d8f398cfaca89bd034e9915fba0a4c5960313f71c01f3ba2c7
                                          • Instruction ID: c560e5b7dd0626dfd4ffab2a9a885e05a2fa5b52462c0ca6482dc47a592b4c41
                                          • Opcode Fuzzy Hash: a53ae7785c5888d8f398cfaca89bd034e9915fba0a4c5960313f71c01f3ba2c7
                                          • Instruction Fuzzy Hash: E5219331701A11DBCB199A25E494A6FB7A6EB88751B198579E907DB358CE30EC0287E0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507489252.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_d2d000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 24610fea52a78a4b67d48f10cadb22de06cfc6dbcd742291272f626702fc69b4
                                          • Instruction ID: 447b3077cd2dc54f96140f9d475eccb85a203f6fd8fad6141bc7e5a7fcfdc990
                                          • Opcode Fuzzy Hash: 24610fea52a78a4b67d48f10cadb22de06cfc6dbcd742291272f626702fc69b4
                                          • Instruction Fuzzy Hash: 642107B1504204DFDB15CF14EAC4B26BB66FB94318F34C56DE8494B251C736D856CA71
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72fd8c5fdf1b2266aaeec96e2618521f9e95de26e55c63fa10cc638e5b416fe5
                                          • Instruction ID: 894e1ad8adae4a7c5e7315a8672f7d90b74315cbfbc2ee6261ea40227d7ae885
                                          • Opcode Fuzzy Hash: 72fd8c5fdf1b2266aaeec96e2618521f9e95de26e55c63fa10cc638e5b416fe5
                                          • Instruction Fuzzy Hash: 2D317874E11309DFCB44DFA4E59489DBBB2FF89301B2054AAE905AB368D731AD05CF50
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b477f4d4bc3b6993fc62f37cc325670ca6dad0421685eb59810628b974c65bb3
                                          • Instruction ID: a98d961fe6610f613faaee293b1e43413cc7b43f8e5e1d9db742bdda5caa6390
                                          • Opcode Fuzzy Hash: b477f4d4bc3b6993fc62f37cc325670ca6dad0421685eb59810628b974c65bb3
                                          • Instruction Fuzzy Hash: F421AE71A04105DFDB15EF68E444AAB3BA2FB88714F144469F9078B292CB34CD66CBF0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ccf0ccc19a42b28ea67823bd2eff3d6e3cdafde9a40898d8f4dc34f05630e42
                                          • Instruction ID: 7fb904e6708a436f579a9833b1a72fafa9c7661414437e651f69f671e31d3206
                                          • Opcode Fuzzy Hash: 6ccf0ccc19a42b28ea67823bd2eff3d6e3cdafde9a40898d8f4dc34f05630e42
                                          • Instruction Fuzzy Hash: 8B1126763042955FCB065FBCA8211AE3FB3EF89220744486AE805CB382DE344E4183AA
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a81a966e54b691f134ca87d105bb38dc45970df8605aaafd0249c696a5ce11a
                                          • Instruction ID: 4008a6bc90ebff1b2a221ef536bd4cac8eda916e4819da97b7fdaffa0edef9b0
                                          • Opcode Fuzzy Hash: 0a81a966e54b691f134ca87d105bb38dc45970df8605aaafd0249c696a5ce11a
                                          • Instruction Fuzzy Hash: 87114C75D00609CBDB08EFAAD8456DEBBB3AFCD301F18D425D419A7295E77044068F65
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1dbd288e1883cb65d4b7669f2ebaf1f9e2855f11743bc2281c02b81cdf914637
                                          • Instruction ID: e3030d51d6621c8652ecda1502fc7843cc3f28d433ccd142da3110a410b582d7
                                          • Opcode Fuzzy Hash: 1dbd288e1883cb65d4b7669f2ebaf1f9e2855f11743bc2281c02b81cdf914637
                                          • Instruction Fuzzy Hash: 172188B0D0020ADFDB41EFB8D94169EBFF2FB49300F10D5AAE0159B365EB705A468B91
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c433d5eea1f6e6a8669f0889c5e2a8d2922ec3022621c07f58cbeeca0719d506
                                          • Instruction ID: b19da3ea150245758dabebcaa6ec9972f86eb2ed24d9700c762c09c041f5ce40
                                          • Opcode Fuzzy Hash: c433d5eea1f6e6a8669f0889c5e2a8d2922ec3022621c07f58cbeeca0719d506
                                          • Instruction Fuzzy Hash: 4D1104307142549FDB050A799C185BBBEAFAFCE310B568876E506CB396DD348C568371
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abfc2b813628e30e4526af0f2476e545d454deec4417502f42fe92fc9ce9f6db
                                          • Instruction ID: 44c6c3822a6985a0604b16e8612bc901a457144a3a6d0738314a3c707d520bec
                                          • Opcode Fuzzy Hash: abfc2b813628e30e4526af0f2476e545d454deec4417502f42fe92fc9ce9f6db
                                          • Instruction Fuzzy Hash: 242115B5C0520ACFCB10EFA8C5545EEBFF0BF49300F1445AAD845BB264EB315A45CBA2
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9ac82fbd26dc013738bcdf41339497030cc4a7330a26d70148a97e0dde50419d
                                          • Instruction ID: c5490d36b5d80b92bfac2b5ee211c229abb4c7a71b173b604895778e107d9869
                                          • Opcode Fuzzy Hash: 9ac82fbd26dc013738bcdf41339497030cc4a7330a26d70148a97e0dde50419d
                                          • Instruction Fuzzy Hash: 8121CEB4C05209CFCB01EFA8D9455EEBBF0BF49300F1095AAD805B6220EB305A56CBA2
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67d04828395f09bebffbf18a51bb01f3e8be5741407c51c082586be49c936adb
                                          • Instruction ID: 9cdb4c44737dc9258da029dd6e67e989985ee05a9ca01c0231f247171e1e7daf
                                          • Opcode Fuzzy Hash: 67d04828395f09bebffbf18a51bb01f3e8be5741407c51c082586be49c936adb
                                          • Instruction Fuzzy Hash: D01153B6800249DFCB10CF99C945BEEBFF5EF48320F10841AE918A7210C379A990DFA5
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3194ad13638236cf84c8d1c0b7cd278b0014074957df9121a25e3998f945cff6
                                          • Instruction ID: c374771d7678f727932a6c9189ae7c7b25a90b1545bda31ad7fc0f1a1ce914a7
                                          • Opcode Fuzzy Hash: 3194ad13638236cf84c8d1c0b7cd278b0014074957df9121a25e3998f945cff6
                                          • Instruction Fuzzy Hash: E1113074F101498FDB04EFE8D950BAEBBB2EF48315F849051E948A7359EB3099818F55
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b070bbd857979d6c0900abe8e883b573382820b18b60858d0d731a50b4e69e07
                                          • Instruction ID: 13a3be643c9e4f6696e0d891f9d26bd319b47466499b418b0a22d5adfaea0e06
                                          • Opcode Fuzzy Hash: b070bbd857979d6c0900abe8e883b573382820b18b60858d0d731a50b4e69e07
                                          • Instruction Fuzzy Hash: C2114CB0D0020ADFDB40EFA8D94069EBFF2FF44300F2095AAE4159B364EB745A458B95
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a5078c0c89704b4c2171c1b13eb361cd72900d57d0fb17ad7f933209f6c48b60
                                          • Instruction ID: 8fe3bb8ba94112168f4bae354b192004ccaad87c4e97c8fcc185c26fbbe0c546
                                          • Opcode Fuzzy Hash: a5078c0c89704b4c2171c1b13eb361cd72900d57d0fb17ad7f933209f6c48b60
                                          • Instruction Fuzzy Hash: 001123B680024ADFCB10CF99C945BEEBFF4EF48320F15841AE518A7250C339A594DFA1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2927b8ed80c04cbad6a813d286c2d34f1b9f16c6dad35326040f9b752ad124a
                                          • Instruction ID: 4cbf3359217a63d02653aa19efb960f4ca95f190293e1de7f3f6a7e08da698e5
                                          • Opcode Fuzzy Hash: a2927b8ed80c04cbad6a813d286c2d34f1b9f16c6dad35326040f9b752ad124a
                                          • Instruction Fuzzy Hash: 0801D272A04014AFCF068E68A8006EE3FA6DBCC751B19806AF906C7294CE358D1297B0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47421be7900f9855112c7d11e49b587dea9b1f1accb937be45d62a871a8d5bf1
                                          • Instruction ID: 0de78bdfdb39523fbb317d3121e1c81af9133716fc3d194844ff5ab4e4a86efe
                                          • Opcode Fuzzy Hash: 47421be7900f9855112c7d11e49b587dea9b1f1accb937be45d62a871a8d5bf1
                                          • Instruction Fuzzy Hash: 24E0A230E04204CFEB18FE29FC0A2E9B730DB87310F00A835D600E7290DBB19407CAA2
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4105ca2ec6058f694cc902501f9e4075514bd23e78824a93d01ac0f1a0973789
                                          • Instruction ID: ed3e72cbf070fc5c63ad36a2bb13bd0e681d0b3cd21e0308ece7df2b202c7327
                                          • Opcode Fuzzy Hash: 4105ca2ec6058f694cc902501f9e4075514bd23e78824a93d01ac0f1a0973789
                                          • Instruction Fuzzy Hash: 75E02B30908604DFEF01FA6DE80A6FD7775DF8A310F419861D401D7191DB70D517CAA6
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c13cbd9b9f42f75efc861a646334500e7dc5ab1f7ce85b18e01ce534b6618e16
                                          • Instruction ID: 89f613f75751f668ce7fcafc43bcfcf63bc019a06d8a81d7a82ce43913e2c469
                                          • Opcode Fuzzy Hash: c13cbd9b9f42f75efc861a646334500e7dc5ab1f7ce85b18e01ce534b6618e16
                                          • Instruction Fuzzy Hash: DBF054363001196FCF055E99A8509EF7FABEBC8260B404429FD09D7251DE31991197AA
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f5aaba56db4835399b3d284a175bad2b8d1a4572b08130ebd8c7bbe4a079404
                                          • Instruction ID: 658ab8b329df131791ebb9509e25e0954806d04588f72c67522b81dc1d5afab7
                                          • Opcode Fuzzy Hash: 4f5aaba56db4835399b3d284a175bad2b8d1a4572b08130ebd8c7bbe4a079404
                                          • Instruction Fuzzy Hash: 37F03A75E11125CFCB84EF7CC44459E7BF1AF08210B2144A9E44ADB320EB30DE018BD0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58b40bdf987a6bd84b1a72e3faeecc90db18c617e6ff4eecf1c63e9b51835fd2
                                          • Instruction ID: 7d9300dcc8e89ee98a91173c082205eada393f58fb1fccfd0aabf97b2faae1c9
                                          • Opcode Fuzzy Hash: 58b40bdf987a6bd84b1a72e3faeecc90db18c617e6ff4eecf1c63e9b51835fd2
                                          • Instruction Fuzzy Hash: F3E02275744648AAC750A678B800CEFB715FA892203206B99D56B870E0E9229A068262
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23170107f220de2c53a13dbef95c0b3686633726f6d4957d905989696a68aea2
                                          • Instruction ID: 86731517c5c29e7c3976a4102a8de0b120d16e77cad1062fd66806a72ecf33db
                                          • Opcode Fuzzy Hash: 23170107f220de2c53a13dbef95c0b3686633726f6d4957d905989696a68aea2
                                          • Instruction Fuzzy Hash: FAE0D833C5036A5FCB019AA49C004FEBB38EDA7310B454677D120B7155E7712A0AC7F1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 777f4049383e5c6a40041d7c5fb78aff708b6d40629b77a10da84c95ddb42953
                                          • Instruction ID: f95a7c43237f3be3de81348c463feea0513aaa49119b0a18b5b07c628f1b8af1
                                          • Opcode Fuzzy Hash: 777f4049383e5c6a40041d7c5fb78aff708b6d40629b77a10da84c95ddb42953
                                          • Instruction Fuzzy Hash: 07E0DFA2C08150CBD7209BAA68260F9BF71C9E73617486487D0CBCB125E238E616EB35
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f2d53ff1ecd3945493174d9c1bdce2d5f5bb56976bc8ad6a5f2e6f1a10a94d3f
                                          • Instruction ID: db8cfe9a5269b80211ebb607dba456c0403f579192cc5d7d749a334f38f8a52d
                                          • Opcode Fuzzy Hash: f2d53ff1ecd3945493174d9c1bdce2d5f5bb56976bc8ad6a5f2e6f1a10a94d3f
                                          • Instruction Fuzzy Hash: F6D01231D2022B968B00A6A5DC044DEB739EE96261B544626D52437154EB70265986E1
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction ID: bd612c908d30debb2dbd5cd13c3fe09718784cd01559dcca7cddd0ea6ea9a3c4
                                          • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction Fuzzy Hash: B0C0123750C1246A9624104E7C409E3678CC2C17B4A250137F55DD320058429C8051B8
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 501c3996a92c76da4c58e9f92972ee168b82da683c7781b4fb1f4d16aec37f2d
                                          • Instruction ID: 35b867b910a208149e7d883791df80943a9db1648e478327c45c9c1f08db82fc
                                          • Opcode Fuzzy Hash: 501c3996a92c76da4c58e9f92972ee168b82da683c7781b4fb1f4d16aec37f2d
                                          • Instruction Fuzzy Hash: 38D02B7090C34A5BCB11F338F9550553F26AA80308F6045F1FC078A21BEDBC889647B5
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca9870bb4c23de926ffd2b7b90ebdae28bcf5522a3202d3634701b29640d471f
                                          • Instruction ID: fd3a5b56f2aefb733055a684d1d6f50ff5bd6ceeeba60117560d9fcf9ff32ed4
                                          • Opcode Fuzzy Hash: ca9870bb4c23de926ffd2b7b90ebdae28bcf5522a3202d3634701b29640d471f
                                          • Instruction Fuzzy Hash: 2AD0677BB41018DFCF049F9CE8508DDB7B6FB9C221B048526E915A7261C6319925DBA0
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1e2f5715c35bbaa9c312c456346e43bc6f1a25a30888488721810189e079ae1
                                          • Instruction ID: 2f243bd99f401b1301dcd5c1428b9b4c326767b605e23a3b579a5a13a868b00c
                                          • Opcode Fuzzy Hash: f1e2f5715c35bbaa9c312c456346e43bc6f1a25a30888488721810189e079ae1
                                          • Instruction Fuzzy Hash: 58D06775D4412CCBCB20DF54E9452DCB7B0EB89300F1014E69909B3200D6305AA09F21
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e682ae34a3504161add1d79a7b8a6fca885a3ca52048cb87ba91d29211aef60b
                                          • Instruction ID: 4c81ab50cf512e7532f090bde39e6a992967ffe92551f0fcee71408184934d6f
                                          • Opcode Fuzzy Hash: e682ae34a3504161add1d79a7b8a6fca885a3ca52048cb87ba91d29211aef60b
                                          • Instruction Fuzzy Hash: D3C0127051470A47C701F775F945555372BEBC0304F609960F40B0A219DEBC19D546F1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4516553010.00000000052E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_52e0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "$0oFp$Hgq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq$PHcq
                                          • API String ID: 0-4227257650
                                          • Opcode ID: 1659bfbb022e472007795c59ff369ca8278d04f80f2a2642be30d9f1ad5882ce
                                          • Instruction ID: 1effd2950715551be122a52f262d5a1f52c8d653d874e6597af3f5927eada21c
                                          • Opcode Fuzzy Hash: 1659bfbb022e472007795c59ff369ca8278d04f80f2a2642be30d9f1ad5882ce
                                          • Instruction Fuzzy Hash: 0612C3B4E00218CFDB58DF69C954B9DBBB2BF89300F2080A9D809A7365DB759E85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000E.00000002.4507845241.0000000000DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_14_2_db0000_IFUybmFQxR.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \;cq$\;cq$\;cq$\;cq
                                          • API String ID: 0-2961067002
                                          • Opcode ID: 2cb5971c906c46bfe08e3a7227af89e196a5cac821abe5598430d8089353394d
                                          • Instruction ID: 5cc730cc427fcf3629ddcf420d0ce0d8489bbb88c9769d9f6ddc5a8241fd8f39
                                          • Opcode Fuzzy Hash: 2cb5971c906c46bfe08e3a7227af89e196a5cac821abe5598430d8089353394d
                                          • Instruction Fuzzy Hash: 4D012C31B10015DF8B24AE3EC4449A677E6BFE8760729417AE503CB3B4DA76DC5197A0